DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack



Similar documents
Denial of Service (DoS)

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Firewalls and Intrusion Detection

Denial of Service. Tom Chen SMU

SECURING APACHE : DOS & DDOS ATTACKS - I

Seminar Computer Security

Denial of Service Attacks, What They are and How to Combat Them

Secure Software Programming and Vulnerability Analysis

Denial Of Service. Types of attacks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Modern Denial of Service Protection

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Gaurav Gupta CMSC 681

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Yahoo Attack. Is DDoS a Real Problem?

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

SECURITY FLAWS IN INTERNET VOTING SYSTEM

CS 356 Lecture 16 Denial of Service. Spring 2013

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks

A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS

2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks

CS5008: Internet Computing

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Distributed Denial of Service

Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Denial of Service Attacks: Classification and Response

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

First Line of Defense to Protect Critical Infrastructure

Abstract. Introduction. Section I. What is Denial of Service Attack?

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Detailed Description about course module wise:

Intrusion Detection for Mobile Ad Hoc Networks

Denial of Service (DoS) Technical Primer

Strategies to Protect Against Distributed Denial of Service (DD

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

On-Premises DDoS Mitigation for the Enterprise

An Efficient Filter for Denial-of-Service Bandwidth Attacks

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

INSTANT MESSAGING SECURITY

DDoS Protection Technology White Paper

Network Security Demonstration - Snort based IDS Integration -

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

E-BUSINESS THREATS AND SOLUTIONS

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

Network Incident Report

TLP WHITE. Denial of service attacks: what you need to know

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

COB 302 Management Information System (Lesson 8)

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Honeypots for Distributed Denial of Service Attacks

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Network Security Administrator

Frequent Denial of Service Attacks

How To Classify A Dnet Attack

Network- vs. Host-based Intrusion Detection

Name. Description. Rationale

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Security vulnerabilities in the Internet and possible solutions

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

DDoS Attack Trends and Countermeasures A Information Theoretical Metric Based Approach

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Countermeasures against Bots

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CISCO IOS NETWORK SECURITY (IINS)

Firewall and UTM Solutions Guide

Index Terms: DDOS, Flash Crowds, Flow Correlation Coefficient, Packet Arrival Patterns, Information Distance, Probability Metrics.

Barracuda Intrusion Detection and Prevention System

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Threat Events: Software Attacks (cont.)

Payment Card Industry (PCI) Data Security Standard

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Security Issues In Cloud Computing and Countermeasures

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Cyber Security: Beginners Guide to Firewalls

Network Security: Introduction

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Distributed Denial of Service (DDoS)

Transcription:

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack Sugih Jamin EECS Department University of Michigan jamin@eecs.umich.edu

Internet Design Goals Key design goals of Internet protocols: resiliency availability scalability Security has not been a priority until recently.

Security Attacks Two types of security attacks: 1. Against information content: secrecy, integrity, authentication, authorization, privacy, anonymity 2. Against the infrastructure: system intrusion, denial of service

Counter Measures Fundamental tools: Content attack: cryptography Intrusion detection: border checkpoints (firewall systems) to monitor traffic for known attack patterns Denial of service: no effective counter measure

Denial of Service (DoS) Attack An attacker inundates its victim with otherwise legitimate service requests or traffic such that victim s resources are overloaded and overwhelmed to the point that the victim can perform no useful work.

Distributed Denial of Service (DDoS) Attack A newly emerging, particularly virulent strain of DoS attack enabled by the wide deployment of the Internet. Attacker commandeers systems (zombies) distributed across the Internet to send correlated service requests or traffic to the victim to overload the victim.

DDoS Example February 7th and 8th, 2000: several large web sites such as Yahoo!, Amazon, Buy.com, ebay, CNN.com, etc. were taken offline for several hours, costing the victims several millions of dollars.

Mechanism of DDoS [Bellovin 2000] Attacker Zombie Zombie Victim Zombie Zombie Internet Zombie Zombie Zombie coordinator

TheMakingofaZombie Zombies, the commandeered systems, are usually taken over by exploiting program bugs or backdoors left by the programmers. Zombie intrusion done by sending harmless looking legitimate code or data containing hidden malicious code (Trojan Horse) to the vulnerable candidate. Once a host is taken over and made a zombie, the malicious code will run as a background process (daemon) that performs the actual attack. (DDoS problem expected to get worse as more home systems come online and remain connected on DSL or cable modems.)

Weapons of Choice Spoofing: faking the return address of a service request. SYN flood: ties up access to a web server with a large number of false connections with spoofed client addresses. Smurfing: requests a large number of machines on the Internet to send an echo of a message to a spoofed return address. New DDoS tools uses encryption to make detection and tracking of the perpretator harder.

Current Approaches to Counter DoS Rely on the criminal justice system Practice good computer hygiene Limit usage and convenience of usage

Tracking the Perp The US Computer Fraud and Abuse Act makes it a crime to knowingly transmit a program or command that intentionally damages a computer. To help track down perpetrators, systems on the Internet keep traffic logs as a standard operating procedure.

Good Computer Hygiene Install operating system patches that fix bugs and close backdoors. Install intrusion detection software to prevent systems from being taken over. Continually update intrusion detection software to incorporate all the latest known attack patterns. Regularly monitor system logs, network traffic, and system configurations to detect anomalies.

Limiting Harm Install traffic filters to detect spoofed addresses. Install new traffic limiting (congestion control) mechanisms in routers. Deploy new versions of Internet protocols that incorporate authentication.

Limitations of Current Approaches Intrusion detection effective only against known attack patterns. Traffic logs generate large amount of data during normal operation. Traffic filters and traffic limiting mechanisms are expensive to deploy, both financially and performance wise.

Limitations of Current Approaches (cont) There is a fundamental trade-off between security vs. convenience: at one extreme, the most secure, least convenient system is not networked and is placed in a secure locked room. Post facto tracking down of DDoS perpetrator does not help the victim.

The Challenge Can one detect correlated traffic streams across the Internet in a user-transparent manner, in real-time, before they merge into a denial of service attack?

Solution Requirements Fundamental requirement: preserve the original design goals of the Internet, that the Internet continues to be resilient, available, and scalable. More specifically: 1. be transparent to legitimate use of the Internet, 2. detect anomalies in time to devise and deploy effective counter measures to neutralize the attack, 3. require zero or minimal coordination between monitoring/control sites, and 4. be self-configuring with zero or minimal human interaction.

Solution Parameters Internet traffic is very bursty, with self-similarity detected on traffic load over various timescales Internet topology continues to grow and expand There is no central authority to dictate uniform deployment of any mechanism

Summary Analogy to river networks: Can one detect increases in water volume at tributaries, maybe based on historical data, to predict an upcoming inundation downstream on the main stream? Furthermore, can one do this in real-time, with minimal coordination, and minimal false positives?

Further Readings Garber, L., Denial-of-Service Attacks Rip the Internet, IEEE Computer, April 2000, pp. 12-17. Bellovin, S.M., Distributed Denial of Service Attacks, http://www.research.att.com/ smb, 2000.