Should the IETF do anything about DDoS attacks? Mark Handley



Similar documents
Steps Towards a DoS-resistant Internet Architecture. Mark Handley Adam Greenhalgh University College London

DoS-resistant Internet - progress. Bob Briscoe Jun 2005

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

Distributed Denial of Service Attacks & Defenses

Distributed Denial of Service (DDoS)

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST

Service Description DDoS Mitigation Service

CS 356 Lecture 16 Denial of Service. Spring 2013

Firewalls and Intrusion Detection

Yahoo Attack. Is DDoS a Real Problem?

Cisco Network Foundation Protection Overview

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Network Neutrality and the IETF. Mark Handley

Endpoint Based Policy Management: The Road Ahead

Surviving DDoS. SANOG X 5 September ed.lewis@neustar.biz. 5 Sep '07, SANOG X ed.lewis@neustar.biz 1

Acquia Cloud Edge Protect Powered by CloudFlare

Flow processing and the rise of the middle.

Whitepaper. Controlling the Network Edge to Accommodate Increasing Demand

CloudFlare advanced DDoS protection

Automated Mitigation of the Largest and Smartest DDoS Attacks

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

How To Block A Ddos Attack On A Network With A Firewall

Detection and Controlling of DDoS Attacks by a Collaborative Protection Network

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

Defense In Depth To Fight Against The Most Persistent DDoS

IVCi s IntelliNet SM Network

Automated Mitigation of the Largest and Smartest DDoS Attacks

NAT and Firewall Traversal with STUN / TURN / ICE

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

How Cisco IT Protects Against Distributed Denial of Service Attacks

Web Application Defence. Architecture Paper

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

Lecture 15 - Web Security

Radware s Attack Mitigation Solution On-line Business Protection

Improving the Microsoft enterprise. network for public cloud connectivity

Denial of Service Attacks

Game-based Analysis of Denial-of- Service Prevention Protocols. Ajay Mahimkar Class Project: CS 395T

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

DDoS Overview and Incident Response Guide. July 2014

TDC s perspective on DDoS threats

A Practical Method to Counteract Denial of Service Attacks

Implementing Trust to Trust Using Customer Edge Switching. Raimo Kantola Aalto University Finland

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

Strategies to Protect Against Distributed Denial of Service (DD

Secure Software Programming and Vulnerability Analysis

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

Denial of Service Attacks and Resilient Overlay Networks

PART D NETWORK SERVICES

Testing Network Performance with Real Traffic

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

How To Provide Qos Based Routing In The Internet

DDoS Attack Trends and Countermeasures A Information Theoretical Metric Based Approach

DDoS attacks in CESNET2

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

A S B

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Towards Autonomic DDoS Mitigation using Software Defined Networking

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Announcements. No question session this week

Approaches for DDoS an ISP Perspective.

Firewalls, con t / Denial-of-Service (DoS)

Safeguards Against Denial of Service Attacks for IP Phones

Serro Solutions Enables Managed Security Service Providers to Optimize Networking Performance and Cost

Detecting peer-to-peer botnets

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER

How To Stop A Ddos Attack On A Website From Being Successful

CS 91: Cloud Systems & Datacenter Networks Misc. Topics

Re-ECN: Adding Accountability for Causing Congestion to TCP/IP

Zscaler Internet Security Frequently Asked Questions

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

CMPT 471 Networking II

Hunting down a DDOS attack

Denial of Service Attacks, What They are and How to Combat Them

Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP. Table of Contents

Overview. Firewall Security. Perimeter Security Devices. Routers

A very short history of networking

Malice Aforethought [D]DoS on Today's Internet

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

CS 268: Lecture 13. QoS: DiffServ and IntServ

When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING.

How to launch and defend against a DDoS

Voice Over IP and Firewalls

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Transcription:

Should the IETF do anything about DDoS attacks? Mark Handley

The Problem The Internet architecture was designed to delivery packets to the destination efficiently. Even if the destination does not want them. Congestion control and flow control are our mechanisms to match offered load to available capacity. They re transport-level functions. If the sender misbehaves, they re useless. An attacker that can compromise thousands of end systems can muster enough firepower to overwhelm most victims.

Should the IETF do anything about DDoS? Really two questions: Can the IETF do anything about DDoS? Does anyone care enough to spend money on solutions?

Can the IETF do anything about DDoS? Search Google Scholar for DDoS : 7590 hits. No shortage of solutions. It s starting to become clear there is no magic bullet. No single solution will come along and save us (short of redesigning the Internet from scratch). However, DDoS is not like getting compromised. There s no such thing as a little bit compromised. DDoS defense is progressive; it s a cost/benefit tradeoff. Goal should be to raise the bar for successful attacks.

Examples of Raising the Bar Require more firepower for a successful attack Fewer attacks from a fixed bot pool. Make bot herders easier to track down (fewer but larger botnets, so can devote more resources to each). Prevent spoofing. Make bots easier to track down. Prevent reflection attacks. Enforce congestion control. Bots only get their share. Provide automated filtering of flows at the source. If the receiver can tell a host is bad, it can shut down traffic from it.

Goal for IETF? Force an attacker to make his traffic indistinguishable from a flash crowd. Essentially, move the attack up the stack. Different applications must them tackle the problem using their own application-specific mechanisms. CAPTCHAS, proof-of-work, authorization mechanisms, good application design, etc. Billing for congestion.

Is anyone willing to pay? Are the costs of DDoS great enough to merit additional expense? Depends who has to pay. Depends how expensive it is.

Is anyone willing to pay? For the victims: DDoS is very expensive. Direct loss of business. Collateral damage for edge ISPs. Often just disconnect the victim. Scrubbing solutions work, up to a point, for dumb attacks at lower bandwidths. Victim bears the cost. For the source ISPs: fairly significant costs. Manual cleanup of bots is expensive. Many ISPs don t even go looking for bots on their networks. For transit ISPs: often just more paying packets.

Opportunity costs Ever increasing demands are being placed on the Internet. Internet telephone. Internet television. Critical infrastructure. Food supply Banking Utility management. Options (pick one): 1. The Internet gets robust enough to justify these demands. 2. The demands will be met by parallel networks at increased costs. 3. A large, well resourced DDoS attack will cause huge economic damage (and perhaps worse) at some point in the next decade.

Legislation After the Estonia attacks, governments are starting to wonder if they can legislate solutions. Best way to avoid a mess of inconsistent, incompatible, and ill-thought-out legislation is to solve the problem first. Need to be very careful the medicine isn t worse than the disease.

Architectural Ossification The net is already hard to change in the core. IP Options virtually useless for extension. Slow-path processed in fast hardware routers. NATs make it hard to deploy many new applications. Firewalls make it make to deploy anything new. But the alternative seems to be worse. Now consider the effect of DoS mitigation solutions...

The Big Challenges How can we mitigate DDoS attacks and other security threats without sacrificing the future? How to enable application innovation? How to provide robust network services in the face of attack? Extrapolation of current trends does not bode well...

Future: The Intelligent Network Network understands clients, controls bad traffic. Network-based application recognition Deep packet inspection Network admission control Packet scrubbing Operators them define and control policy for different classes of traffic Security policy QoS policy

Architectural Solutions Can we change the Internet architecture in such a way that the low-level easy attacks become hard/impossible? Tilt the balance of power towards the victim? Prevent bandwidth flooding? Prevent spoofing and reflection attacks? Provide safe automated pushback mechanisms? Preserve the general-purpose nature of the Internet to allow future innovation.

Two examples. Automated filtering framework. Terminus (Felipe Huici, Mark Handley) Improved congestion management framework Re-feedback, Re-ECN (Bob Briscoe) These are intended as examples. I know them well. I think they might be deployable. Others will no doubt have other solutions.

Example 1: Terminus filter detect General idea Identify attack traffic at destination Request that traffic be filtered Block attack traffic at source ISP s filtering box Pretty obvious idea But how to do this robustly and with minimum mechanism? A ISP Internet ISP S

Terminus Architecture C C ISP A BP BM Block A Internet ISP C A FM IDS ISP B S C C C BP BM IDS = intrusion detection BP = border patrol BM = border manager FM = filter manager

Preventing spoofing Need to know real origin of attack packets Must send filter request to the right place IP source address of attack traffic may be spoofed. Dumb idea: Add a true-source bit to packets Only Terminus ISPs with ingress filtering can set bit

Preventing True-Source Bit Spoofing Edge router at Terminus ISP connected to legacy ISP unsets this bit for all packets ISP A ISP B Router E1 TS = 0 Router E2 ISP E Router G1 ISP C Router F1 TS = 0 Router G2 ISP G S ISP F ISP D Router F2 Terminus ISP Legacy ISP

Incremental deployment During initial stages, legacy ISPs will be the norm Use true-source bit to prioritize traffic at the destination ISP s peering routers Implement true-source bit as a diffserv code point Legacy ISP A A ISP C ISP D ISP B R1 R2 TS = 0 Router D1 R3 TS = 1 S C prioritize

Details, details Lots of additional details: Where to send filtering requests? How to prevent spoofed traffic shutting down legit traffic? How to preventing spoofed requests? How to avoid reflection attacks from legacy ISPs? Terminus: god of boundaries Details here: http://nrg.cs.ucl.ac.uk/mjh/tmp/terminus.pdf

Summary: Terminus is cheap and effective. Only needed at the edges. Can do filtering at more than 1Gb/s with minimum sized packets in cheap off-the-shelf 1u rack-mount servers. Should really just be a standard edge-router feature Most have the forwarding plane capability. Just need the control protocol additions. Our test implementation can filter a million node botnet in a few tens of seconds. Bottleneck is likely to be how fast you can identify bots.

Re-feedback (Briscoe) General strategy: Tackle flooding attacks as part of a larger incentive framework. Routers provide explicit information about congestion levels by decrementing a congestion field in packets. Feedback explicit information about downstream congestion to the data sender. Data sender-reinserts this feedback information into the packets. Goal is for the sender to set the field correctly so the remaining value is zero at the receiver. Policy at ingress and egress to provide incentive for sender to send at the correct rate for the network congestion level.

Incentive framework downstream path metric, ρ i policer /scheduler congestion pricing routing i dropper Snd Rcv

Summary: re-feedback Long-term approach to re-architecting the congestion-control framework for the Internet. Nice alignment of incentive with mechanism Pushes the costs for misbehaviour towards the origin network of the malicious traffic, but provides the mechanism to throttle it. Incremental deployment should be possible, though longer term than Terminus. See proposals on Re-ECN. Re-ECN bar-bof here (Weds, 1pm, Red Lacquer room).

Should the IETF do anything about DDoS? Who else will? Effective solutions requires protocol changes. That s our business. Doing nothing: Hurts everyone through deployment of changes that harm innovation. Costs real money in both mitigation and workarounds. Risks legislated solutions.

The enemy of the good is the perfect - Voltaire We can raise the bar for DDoS attackers. There are general technical solutions that would help. Some seem economically feasible. The only way to find out is to try.