Denial of Service Attacks and Resilient Overlay Networks



Similar documents
Network Bandwidth Denial of Service (DoS)

The Evolution of Computer Security Attacks and Defenses. Angelos D. Keromytis Columbia University

Security vulnerabilities in the Internet and possible solutions

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

How To Block A Ddos Attack On A Network With A Firewall

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

Network Performance Monitoring at Minimal Capex

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Arbor s Solution for ISP

LIST OF FIGURES. Figure No. Caption Page No.

Prevention, Detection, Mitigation

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Distributed Denial of Service Attacks & Defenses

Denial of Service Attacks

CS 356 Lecture 16 Denial of Service. Spring 2013

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Security Toolsets for ISP Defense

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

FortiDDos Size isn t everything

How To Protect A Dns Authority Server From A Flood Attack

DoS: Attack and Defense

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

DEFENSE NETWORK FAQS DATA SHEET

Protecting Mobile Devices From TCP Flooding Attacks

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Firewalls and Intrusion Detection

Cyber Security Where Do I Begin?

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

COSC 472 Network Security

Denial of Service. Tom Chen SMU

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Denial of Service (DoS) Technical Primer

Seminar Computer Security

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

WAN Performance Analysis A Study on the Impact of Windows 7

Safeguards Against Denial of Service Attacks for IP Phones

Virtual Privacy vs. Real Security

Network Simulation Traffic, Paths and Impairment

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

TDC s perspective on DDoS threats

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

TalkShow Advanced Network Tips

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Restorable Logical Topology using Cross-Layer Optimization

Cisco Advanced Services for Network Security

Intrusion Detection for Mobile Ad Hoc Networks

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity

Complete Protection against Evolving DDoS Threats

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Network Virtualization

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Octoshape s Multicast Technology Suite:

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

VoIP Over the Internet: Is Toll Quality Achievable?

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Quality Certificate for Kaspersky DDoS Prevention Software

Huawei One Net Campus Network Solution

Content Distribution Networks (CDN)

Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse

Radware s Behavioral Server Cracking Protection

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Multifaceted Approach to Understanding the Botnet Phenomenon

Stop DDoS Attacks in Minutes

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

Colt IP VPN Services Colt Technology Services Group Limited. All rights reserved.

Cisco Network Foundation Protection Overview

BlackRidge Technology Transport Access Control: Overview

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

IP Telephony Management

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

TamoSoft Throughput Test

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Disaster-Resilient Backbone and Access Networks

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

DDoS Protection Technology White Paper

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Injazat s Managed Services Portfolio

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

White Paper. Requirements of Network Virtualization

Wireless Sensor Networks Chapter 14: Security in WSNs

VoIP / SIP Planning and Disclosure

Transcription:

Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University

Motivation: Network Service Availability

Motivation: Network Service Availability

Why Does It Matter? We are increasingly relying on Internet Services Financial services, Voice over IP (VoIP), e- Government, news, Cloud Computing,... But Internet Services are not dependable... Denial of Service attacks can disrupt online service DDoS attack on Estonia (2007) 2 Weeks, 1M computers, 5,000 clicks per second DDoS attacks against Georgia (2008) Storm Worm: 1.7M infected machines used for DDoS (typically extortion) Ease of assembling and controlling botnets means the problem will persist

Defenses End-users/sites: Bandwidth over-provisioning Multi-hosting/multi-homing Use of Content Delivery Networks ISPs: Blackhole routing Anomaly detection & blocking Centralized vs. distributed

Research Activity IP traceback (attribution) IP Pushback (reactive blocking) Collaborative filtering (reactive blocking) Router/receiver capabilities (proactive blocking) Improve host-based protection

Impediments to deployment Few economic incentives for deployment Most schemes require global adoption & deployment End-users lack the means to react DDoS is mostly an externality for ISPs no market opportunity for router manufacturers Cross-ISP collaboration not always feasible Competition concerns

Overlay Networks A different term of distributed system Collection of systems Connected over a wide-area network, such as the Internet Route traffic amongst them without considering physical topology Addressing, neighborhood, other properties may differ from those of the actual network fabric Good way of introducing new functionality into the network without changing routers/protocols (and, sometimes, end-hosts)

Using Overlay Networks Distribute logical function of a firewall across the Internet Allow users to contact any overlay node Any overlay node can validate a legitimate user Once admitted into overlay, user s traffic is treated preferentially Allowed to reach attacked site All other traffic dropped/rate-limited

Advantages of Overlay Networks Difficult to attack with a DDoS due to distributed nature Assumes large enough overlay Does not rely on ISP co-operation or goodwill Can take advantage of such, where it exists A single overlay can provide protection service to different users Commercialization model similar to CDN A large enough distributed organization can create its own overlay

Issues with Overlay Networks How do users discover (accessible) overlay nodes? Largely static content, users (software) can access any node Overlay network becomes obvious target of attack Dedicated nodes, easier to harden Performance issues Higher latency, lower throughput due to non-direct routing How can we tell who is a legitimate user, vs. a bot? How do we effectively discriminate overlay vs. non-overlay traffic?

WebSOS: Protection for Web Services

WebSOS: Protection for Web Services

WebSOS: Protection for Web Services

WebSOS: Protection for Web Services

WebSOS: Protection for Web Services Can we remove Packet Filtering?

Move: An End-to-End Solution for DDoS

Move: An End-to-End Solution for DDoS Attack

Move: An End-to-End Solution for DDoS

Move: An End-to-End Solution for DDoS

Prototype in Planet-Lab

Migration Performance Round Trip time

Limitations of WebSOS & MOVE Time (in seconds) Latency Overhead for various SSL Services 8 7 6 5 4 3 2 Direct Original Request Cached Requests 1 0 Yahoo! Verisign Columbia Columbia (2nd) Latency increase by a factor of 2 when using indirection

Limitations of WebSOS & MOVE Time (in seconds) Latency Overhead for various SSL Services 8 7 6 5 4 3 2 Direct Original Request Cached Requests 1 0 Yahoo! Verisign Columbia Columbia (2nd) Latency increase by a factor of 2 when using indirection Also vulnerable to some more intelligent attacks...

New Attack: Sweeping Attack

New Attack: Sweeping Attack

New Attack: Sweeping Attack

New Attack: Stalker Attack

New Attack: Stalker Attack

New Attack: Stalker Attack

New Attack: Stalker Attack

EXAMPLE: TCP assumes low-latency, stable, fixed capacity, high-quality link Resilience Results: Throughput Throughput vs Degradation Error Rate of in SACK regular with TCP PER 10 9 C7,06;6/8*+-*?-%&"'-B8/9-5!!-I6+;-#F5K RTT: 6ms RTT: 24ms RTT: 104ms Goodput (Mbps) 8 7 6 5 4 3 Performance region of wired networks Performance region of MANETs!"#$%&"'( )*+,-.*+/0*1-1**234-56/7-.*+/0*1-83-/97-* 6;62/6/8*+- <7.96+83<4 2 1 0 0 2 4 6 8 10 Packet Error Rate(%) %*=0.7(-5*>=3/-!"#-?*0-)60,7@A6+;B8;/9-C716:D-#6.E7/-F063=07-6+;-G=1/8@#6/9-F+H80*+<7+/34 %98HE=<60 '61:6+606<6+ I5#JKD-'4'4-56<6E0839+6+ I&!L!-)6>3-573760.9K

Fix attempt: use many entry points But this solution increases the state stored!!!

Ticket-based mechanism to the rescue Move state to the ticket Ticket is issued by the Overlay using a shared key Ticket becomes a contract between the user and the overlay Use of a shared key guarantees honor of the agreement

Key & Ticket Establishment protocol

Ticket Design Random spreading sequence protects against stalker attacks Packet sequence range guarantees traffic control Ticket design and issue protocol prevent replay, spoofing and computational attacks

Client Connection Initiation

Spread Spectrum Architecture - Replication Multi-Path + Spreading + Ticket allows Packet Replication

A2M: Access Assured Mobile Desktop Computing

Performance Results: Latency End-to-End Latency with Client Packet Replication 2.75 8 nodes 16 nodes 32 nodes 76 nodes 2.50 2.25 2.00 Overlay / Direct 1.75 1.50 1.25 1.00 0.75 0.50 No Repl. 1.5x 2x 3x Client Packet Replication

Resilience Results: Throughput Throughput vs Node Failure 600 Direct No Repl. 1.5x 2x 3x 500 400 KB/Sec 300 200 100 0 1% 3% 4% 9% 17% 21% 27% 35% 43% 46% 55% % Node Failure

Resilience Results: Latency (Web) End-to-End Latency vs Node Failure (Web) No Repl. 1.5x 2x 3x

Performance Results: Latency (Web) Web Latency vs Packet Replication Video Quality vs Packet Replication 0.50 80 hosts 8 hosts 100% Size: 352 x 240 80 hosts 8 hosts 0.40 80% Latency (s) 0.30 0.20 Video Quality 60% 40% 0.10 20% 0.00 Direct 0% 50% Replication 100% 200% 0% Direct 0% 50% Replication 100% 200%

Ticket Generation Benchmark

Resilience Results: Video Streaming 100% Video Quality vs Node Failure Video Quality 80% 60% 40% 20% 0% 0% 50% 100% 200% 0 10 20 30 40 50 % Node Failures

Resilience Results: Video Streaming Video Quality vs Node Failure for Wireless 100% 80% Video Quality 60% 40% 20% 0% 0% 50% 100% 200% 0 10 20 30 40 50 % Node Failures

Resilience Results: Video Streaming Video Quality vs Node Failure 100% 80% Video Quality 60% 40% 20% 0% 5 clients - 0% 5 clients - 50% 5 clients - 100% 5 clients - 200% 8 clients - 0% 8 clients - 50% 8 clients - 100% 8 clients - 200% 0 10 20 30 40 50 % Node Failures

TCP Friendliness of Approach Initial implementation non-tcp friendly provided the worst case scenario (use of non-responsive channels) Current implementation encodes path in the TCP options field for acknowledgments generating a different TCP-window for each path Works for regular TCP, UDP, and UDP-encapsulated TCP Existence of multiple paths makes attacks against TCP more difficult

Conclusion Recent events have demonstrated the continued and real threat of DDoS as an effectve instrument of both cyber-warfare and cyber-crime Overlay-based mechanisms can mitigate the impact of large DDoS attacks Topology- and provider-independent deployment at relatively low cost Performance impact low (< 10%), only incurred during attack periods A pan-european DDoS Protection Network? Leverage PlanetLab/GRID sites as seeds

What is the underlying problem? How clients connect to the overlay: Connection to a single indirection node (entry point) Client s state is stored to this entry point End-to-End connection depends on a small but static set of overlay nodes

What is the underlying problem (II)? How the overlay sees the client: User can establish multiple connections to an overlay node An authenticated client can inject any amount of traffic to the overlay network Even if there is access control in the entry point the user can reset that by attacking the entry point