BEHAVIORAL SECURITY THREAT DETECTION STRATEGIES FOR DATA CENTER SWITCHES AND ROUTERS



Similar documents
OpenDaylight Project Proposal Dynamic Flow Management

NFV ISG PoC Proposal VNF Router Performance with DDoS Functionality

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

Brocade SDN/OpenFlow. Norival Figueira Office of the CTO. January 9, /2015 BROCADE COMMUNICATIONS SYSTEMS, INC. ALL RIGHTS RESERVED.

Network Security Demonstration - Snort based IDS Integration -

Programmable Networking with Open vswitch

Using SDN-OpenFlow for High-level Services

How To Block A Ddos Attack On A Network With A Firewall

Definition of a White Box. Benefits of White Boxes

Flow Based Traffic Analysis

Corero Network Security First Line of Defense Executive Overview

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

WAN Optimization. Riverbed Steelhead Appliances

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

software networking Jithesh TJ, Santhosh Karipur QuEST Global

Software Defined Network (SDN)

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Analysis of a DDoS Attack

Ten Things to Look for in an SDN Controller

Arbor s Solution for ISP

Towards Smart and Intelligent SDN Controller

Restorable Logical Topology using Cross-Layer Optimization

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe

Acquia Cloud Edge Protect Powered by CloudFlare

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

TDC s perspective on DDoS threats

How To Understand The Power Of The Internet

FortiDDos Size isn t everything

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

CloudFlare advanced DDoS protection

APV9650. Application Delivery Controller

Understanding Slow Start

Complete Protection against Evolving DDoS Threats

Flow Analysis Versus Packet Analysis. What Should You Choose?

Cisco Integrated Services Routers Performance Overview

How To Attack A Website With An Asymmetric Attack

Cheap and efficient anti-ddos solution

Designing Virtual Network Security Architectures Dave Shackleford

VALIDATING DDoS THREAT PROTECTION

Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26

PROFESSIONAL SECURITY SYSTEMS

The promise of SDN. EU Future Internet Assembly March 18, Yanick Pouffary Chief Technologist HP Network Services

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

Qualifying SDN/OpenFlow Enabled Networks

Application Latency Monitoring using nprobe

Innovative, High-Density, Massively Scalable Packet Capture and Cyber Analytics Cluster for Enterprise Customers

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

Introducing FortiDDoS. Mar, 2013

Software Defined everything Internet of Things

Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS

Application Defined E2E Security for Network Slices. Linda Dunbar Diego Lopez

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe

NETWORK ORCHESTRATION AND AUTOMATION WITH SOFTWARE DEFINED NETWORKING. Christopher Feussner Systems Engineer WHD.global 2014,

Use Cases for the NPS the Revolutionary C-Programmable 7-Layer Network Processor. Sandeep Shah Director, Systems Architecture EZchip

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

Performance of Network Virtualization in Cloud Computing Infrastructures: The OpenStack Case.

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

How To Orchestrate The Clouddusing Network With Andn

Building an Open, Adaptive & Responsive Data Center using OpenDaylight

Business Case for Data Center Network Consolidation

SDN Applications in Today s Data Center

DDoS Overview and Incident Response Guide. July 2014

Securing Local Area Network with OpenFlow

SDN. WHITE PAPER Intel Ethernet Switch FM6000 Series - Software Defined Networking. Recep Ozdag Intel Corporation

SHARE THIS WHITEPAPER

What is SDN all about?

Dynamic Service Chaining for NFV/SDN

UKCMG Industry Forum November 2006

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Automated Mitigation of the Largest and Smartest DDoS Attacks

ExamPDF. Higher Quality,Better service!

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Virtualized Network Services SDN solution for enterprises

Software Defined Networks

On-Premises DDoS Mitigation for the Enterprise

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Software Defined Networking What is it, how does it work, and what is it good for?

IBM. Vulnerability scanning and best practices

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Securing and Monitoring BYOD Networks using NetFlow

SBSCET, Firozpur (Punjab), India

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Orchestrating the next generation data center

DoS: Attack and Defense

IPFIX IE Extensions for DDoS Attack Detection draft-fu-dots-ipfix-extension-01

What's New in Cisco ACE Application Control Engine Module for the Cisco Catalyst 6500 and Cisco 7600 Series Software Release 2.1.0

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

SDN Architecture and Service Trend

Mock RFI for Enterprise SDN Solutions

Transcription:

BEHAVIORAL SECURITY THREAT DETECTION STRATEGIES FOR DATA CENTER SWITCHES AND ROUTERS Ram (Ramki) Krishnan, Brocade Communications Dilip Krishnaswamy, IBM Research Dave Mcdysan, Verizon

AGENDA Introduction Layer 2-4 DDoS detection/mitigation strategies Behavioral Security Threat Detection Assists Emerging Research Topics in NFV

Introduction

Motivation Summary form David Holmes, The DDoS Threat Spectrum F5 White paper, 2012.

Simple Network Attack Summary Summary from David Holmes, The DDoS Threat Spectrum - F5 White paper -, 2012.

Additional types of attacks* DNS attacks UDP floods Legitimate queries (NSQUERY) - hierarchical lookup to resolve names Legitimate queries against non-existent hosts (NXDOMAIN) HTTP attacks Floods - over 80% of DDoS attacks appear to be HTTP floods Repeat request, Recursive gets for web pages Low-bandwidth HTTP denial of service attacks Slowloris sends enough data (5 bytes) every 299 secs to keep connections active fills up connections table Slowpost starts an HTTP post and fills data slow can impact online Java gaming applications for example HashDos creates form variable names that map to the same hash value, posting a request containing the names, CPU time in handling collisions SSL renogtiation exploits asymmetry in crypto computation between client and server (significantly more computation at server) *David Holmes, The DDoS Threat Spectrum F5 White paper, 2012.

Issues Today Multi-tenant Virtualized DC Present Mode of Operation Need expensive dedicated DDoS appliance for L2-L7 DDoS detection/mitigation Switches /Routers support only static firewall rule (L2-L4 ACL) configuration scalability issues in protecting all servers

Layer 2/3/4 Flow Categorization Short-lived Large Flows Search Applications etc. Long-lived Large Flows Hadoop, File transfers, Tunnels etc. Flexible Any layer 2/3/4 fields Observability, Controllability, Scalability Key to Real-time SDN/NFV Analytics Issues in learning all flows (NetFlow/IPFIX etc.) Flow cache size; CPU utilization Short-lived Small Flows Chat (Twitter), Short form video content (Video clips) etc. Long-lived Small Flows Long form video content (Catch up episodes, Movies) etc.

Real-time Automatic Recognition Recognition External (Collector) e.g. sflow-rt E.g. FTP, Observation Interval 2s Minimum Bandwidth Threshold above 10% link bandwidth LONG-LIVED LARGE FLOWS HW Switches/Routers Recognition Programmable Parameters Observation Interval; Minimum Bandwidth Threshold SW - Virtual Switches/Routers Recognition Sampling technologies (minimal router overhead) e.g. sflow, sampled NetFlow/IPFIX In-line line-rate techniques (faster detection) e.g. FTP, Observation Interval 200ms Minimum Bandwidth Threshold above 10% link bandwidth IPFIX std. in progress, new IEs Other Methods - User Application Notification e.g. scheduled backups Reference: IETF OPSAWG Working Group Draft - http://datatracker.ietf.org/doc/draft-ietf-opsawg-large-flow-load-balancing/

SDN AND NFV SDN innovation/value added services SDN + NFV untapped -- key to driving innovation/value added services to the next level Source: ETSI NFV White Paper

Layer 2-4 DDoS DETECTION/MITIGATION

SDN - LAYER 2-4 DDoS ATTACK DETECTION/MITIGATION Future Mode of Operation DDoS Attacks -- Layer 2-4 long-lived large flow! examples below a. UDP Flood (DNS, SNMP, NTP etc.) Attack - <Destination IP address>, UDP Protocol, UDP Src Port b. Classic Large flow (IP 5 tuple), e.g. P2P OpenFlow-hybrid QoS actions (Policy) independent of forwarding Benefits: -Works on Hybrid OF (future I2RS) capable high speed routers, lightweight sampling techniques -Attack detection/mitigation typically couple of seconds

SDN - LAYER 2-4 DDoS ATTACK DETECTION/MITIGATION Simulation Results Topology: Border Router with Hybrid Openflow, External sflow Collector with real-time large flow detection application, SDN Controller and DDoS SDN Application Border Router with sflow sampling rate of 1:2048 and 4x10Gbps Internet Uplinks Test: Border Router was subject to 20Gbps of traffic on 2 different uplink ports 1Gbps of UDP flood traffic was sent on one of the uplink ports Values chosen for programmable parameters for UDP flood detection pre-filter Minimum Bandwidth threshold (bmin) = 800Mbps. Observation Interval (dmin) = 3s. Result: The UDP flood attack was detected by the DDoS SDN application in ~5s and was rate-limited to 200Mbps in the Border Router based on a configured policy.

NFV/SDN - LAYER 2-4 DDoS ATTACK DETECTION/MITIGATION Future Mode of Operation Benefits: - Attack detection/mitigation typically 100s of ms (order of magnitude faster than sampling) - Flexibility, evolving attacks - Capacity scale on demand - Use OF/SDN (future I2RS) to program upstream/other network nodes References: IETF I2RS Working Group Draft- https://ietf.org/doc/draft-krishnan-i2rs-large-flow-use-case/ Brocade Network Field Day presentation, Brocade s first ETSI NFV PoC on DDoS mitigation

NFV/SDN - LAYER 2-4 DDoS ATTACK DETECTION/MITIGATION Simulation Results Topology: Virtual switch/router was the edge device for 60 virtual servers (each virtual server is a VM). Test: Virtual switch/router was the subject to 8Gbps of traffic; this traffic was switched to different servers. 500Mbps of UDP flood traffic was continuously sent to a single virtual server. Values chosen for programmable parameters for UDP flood detection pre-filter -- Minimum bandwidth threshold (bmin) = 400Mbps. Observation Interval (dmin) = 200ms. Result: Virtual switch/router s throughput was unaffected. The UDP flood attack was detected by the Virtual switch/router in ~400ms and was ratelimited to 50Mbps based on a configured policy.

Behavioral Security Threat Detection Assists

Layer 7 DDoS Assist DC Edge switch/router or Border Router can assist in detecting various Layer 7 DDoS attacks such as HTTP GET Amplification An errant tenant which is being subject to DDoS attack can be detected in the DC Edge switch/router or Border Router. Also, any layer 2-4 DDoS attacks on the errant tenant can be detected in the DC Edge switch/router or Border Router. Tenant traffic can be redirected to a Layer 7 DDoS appliance using a redirection rule specific to the tenant (OpenFlow or vendor specific) in the DC Edge switch/router or Border Router. If the tenant stops misbehaving, the redirection rule specific to the tenant can be removed in the DC Edge switch/router or Border Router. Benefits: Substantially reduce the amount of traffic sent to expensive Layer 2-7 Firewall/DDoS appliances.

Flow Aware Sampling Future Mode of Operation Automatic recognition of classic Layer 2-4 longlived flows such as file transfers, video streaming no sampling Other flows; sampling at normal rate ; potential source of behavioral security threats examined in External Collector Benefit - much lesser samples than sampling all flows equally Source: IETF IPFIX Draft - http://datatracker.ietf.org/doc/draft-krishnan-ipfix-flow-aware-packet-sampling/

NFV/SDN possibilities Allow the bandwidth b min and observation interval d min thresholds to be programmable in a router Allow exposure of flow-specific information Programmable thresholds for each flow? Higher thresholds for flows whose natural requirements are high Bursty flow with long duration of inactivity can have a longer observation interval Flow requiring a large bandwidth naturally may need a higher bandwidth threshold With multiple flows, can consider allocating flows to flow categories i, and specifying thresholds for those each flow category i can have a different bandwidth threshold b min,i and observation interval threshold d min,i.

NFV/SDN possibilities contd. The thresholds for each category i can be exposed via APIs. Metadata associated with a flow can be used to extract the flow category to apply the appropriate threshold for a specific flow in a router. Additional refinement of the thresholds can be performed for each specific type of attack j each DDoS attack j can have attack-specific thresholds b min,i,j and d min,i,j for each flow category i. In Flow-category and DDoS attack type requirements exposed through APIs Can help with smarter configuration in the system and optimized detection/mitigation needs further exploration

Other Public Presentations/Demos/PoCs

Recent recognition for SDN related work ONS SDN Idol Winner SDN DDoS - Ram (Ramki) Krishnan, Brocade ETSI NFV PoC in progress http://nfvwiki.etsi.org/index.php?title=vnf_router_ Performance_with_DDoS_Functionality