Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation



Similar documents
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

CS 356 Lecture 16 Denial of Service. Spring 2013

Denial of Service Attacks and Resilient Overlay Networks

Strategies to Protect Against Distributed Denial of Service (DD

Firewalls and Intrusion Detection

Distributed Denial of Service (DDoS)

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Analysis of Automated Model against DDoS Attacks

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

Service Description DDoS Mitigation Service

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Announcements. No question session this week

Complete Protection against Evolving DDoS Threats

Denial of Service. Tom Chen SMU

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Security vulnerabilities in the Internet and possible solutions

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

DDoS Mitigation via Regional Cleaning Centers

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

Analysis and Detection of DDoS Attacks in the Internet Backbone using Netflow Logs

Should the IETF do anything about DDoS attacks? Mark Handley

CloudFlare advanced DDoS protection

SECURING APACHE : DOS & DDOS ATTACKS - I

DDoS Protection Technology White Paper

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Depth-in-Defense Approach against DDoS

Denial of Service Attacks

NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Denial of Service Attacks

Definition of firewall

Acquia Cloud Edge Protect Powered by CloudFlare

Towards Autonomic DDoS Mitigation using Software Defined Networking

Technical Note. ForeScout CounterACT: Virtual Firewall

DDoS Overview and Incident Response Guide. July 2014

How To Classify A Dnet Attack

DDoS Attack and Defense: Review of Some Traditional and Current Techniques

DDoS attacks in CESNET2

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

A Defense Framework for Flooding-based DDoS Attacks

OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions

Radware s Behavioral Server Cracking Protection

DoS and DDoS Attack Types and Preventions

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Distributed Denial of Service Attacks & Defenses

How to launch and defend against a DDoS

Packet-Marking Scheme for DDoS Attack Prevention

A Practical Method to Counteract Denial of Service Attacks

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

CISCO IOS NETWORK SECURITY (IINS)

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity

DNS amplification attacks

Defending DDoS Attacks Using Traffic Differentiation and Distributed Deployment

Cisco Advanced Services for Network Security

Efficient Detection of Ddos Attacks by Entropy Variation

First Line of Defense

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER

DNS Best Practices. Mike Jager Network Startup Resource Center

Cisco Network Foundation Protection Overview

ATTACKS ON CLOUD COMPUTING. Nadra Waheed

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Cisco IOS Flexible NetFlow Technology

Hunting down a DDOS attack

Internet Content Provider Safeguards Customer Networks and Services

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

How Cisco IT Protects Against Distributed Denial of Service Attacks

Radware Security Research. Reverse Engineering a Sophisticated DDoS Attack Bot. Author: Zeev Ravid

Taxonomic Modeling of Security Threats in Software Defined Networking

A Hybrid Approach for Detecting, Preventing, and Traceback DDoS Attacks

Network Security - DDoS

Port Hopping for Resilient Networks

Network- vs. Host-based Intrusion Detection

Yahoo Attack. Is DDoS a Real Problem?

Kaspersky DDoS Prevention

BT Assure DoS Mitigation UK

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

Transcription:

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation Bernhard Plattner, ETH ZürichZ Joint work with Matthias Bossardt and Thomas Dübendorfer TIK ETH Zürich UK ProgNet Workshop, 1st December 2004

The trouble with AN Landmark technology leading to paradigm shift PCs 2-D Graphical User Interface Ethernet Research / basic technology development Intel 4004: 1971 Xerox Alto, 1972 Xerox Alto, 1972 Xerox, 1970-73 Entry into market IBM 5150 (PC): 1981 Apple Lisa, 1983 Approximately 1980-83 TCP/IP UNIX Active Networks Internet: 1973 Edition 1: 1970 1969? 1982? 1993? 1996? 2004? First commercial routers (Cisco Systems): 1986 System IV: 1982 Sun Workstation with BSD: 1982 Not here yet! TIK ETH Zürich 2

What Went Wrong? Capsule model is scary, a security nightmare: Anybody can inject code into the network! Maintained equality (AN == Capsules) for too long Anything can be done statically, if of broad interest No killer application Did we eliminate the need for standardization? No real business case / business model Did not convince the industry Ran out of funding Challenge of promoting and introducing a disruptive technology was underestimated TIK ETH Zürich 3

Three Ways Out a) Switch to research in life sciences b) Reboot and do purely basic research on AN/mobile code c) Consider non-disruptive approaches b) and c) can be followed in combination TIK ETH Zürich 4

Outline 1. Introduction and problem statement 2. Approaches to denial of service mitigation 3. Distributed Traffic Control: Concepts and approach 4. Deployment Infrastructure 5. Conclusions TIK ETH Zürich 5

Introduction and problem statement Frequency of reported security incidents grows exponentially 1988: 6 2003: 137 529 [CERT] We will have to live with masses of ill-configured hosts Knowledge and tools for attackers abound Danger of massive attacks grows with the number of compromised hosts and the ease of mounting attacks Distributed denial of service (DDoS) attacks will be more frequent Defence focuses on hosts and company networks Need for security services within the network a case for programmable networks! TIK ETH Zürich 6

Direct DDoS attack Attacker Victim Masters Agents/Zombies TIK ETH Zürich 7

Analysis of direct DDoS attack Attacker Masters Zombies Victim From: X i (spoofed) To: Master M i control packet From: X i (spoofed) To: Zombie Z i control packet From: X i (spoofed) To: Victim V attack packet TIK ETH Zürich 8

Reflector DDoS attack (spoofed) TIK ETH Zürich 9

Role of amplification network Increase the rate of attack packets Attacker sends a few control packets, victim gets it all Increase attack traffic by increasing packet size If request packet size < reply packet size Increase the difficulty of counteraction By making traceback difficult Note: Attack traffic has V as a destination address (direct and reflector DDoS attack) Attack packet to reflector has V as the source address (reflector DDoS attack) TIK ETH Zürich 10

Approaches to denial of service mitigation Reactive approaches: Detect identify - react relax Detection of DDoS attack - Sysadmin s experience - Traffic statistics (e.g. entropy of addresses, ports found in packets) Identification - Source addresses are often spoofed - traceback to identify attack source Reaction - Filter incoming attack traffic - Pushback (recursively follow congestion and rate-limit traffic) - Mount counter-attack Proactive approaches Ingress filtering Secure overlay networks, VPNs TIK ETH Zürich 11

Assessment of The State of The Art Current mitigation schemes not effective enough: Detection is often difficult, due to differentiation between good and bad traffic Identification Traceback may be useless, since it identifies zombies or reflectors Reaction Filtering: what, where, and who? Pushback may hit legitimate sources and needs ubiquitous deployment Counter-attacks may hit the wrong targets Ingress filtering: quite simple, but not done (incentive?) Secure overlay networks, VPNs: Scalability problems due to number of trust relations needed Not adequate for generally accessible information services (Google, Yahoo, ) TIK ETH Zürich 12

Distributed Traffic Control: Concepts and Approach What would you want to do as an operator of a service under attack? 1a Direct DDoS attack: block packet coming towards you from certain ASes 1b Reflector DDoS attack: block trigger packets flowing towards reflectors customer-specific ingress filtering 2 Ask trustworthy ISPs/BSPs to install suitable filters Suitable filters Act on packets that have your address as the source, destination or both Definition of traffic ownership Packet is owned by network user who is officially registered to hold either the source or destination address or both You request ISPs/BSPs to take specific action on your (and only your!) packets TIK ETH Zürich 13

Traffic Control Device This path only taken by user s own packets User-programmable action Virtualized per network user TIK ETH Zürich 14

Actions Restricted to prevent misuse Acts only on packets owned by network user No modification of source or destination addresses No change of time to live (TTL) No increase of packet rate and/or size Properties of user-defined functionality checked at installation or run time Context information available to user code Allow for context-specific actions Where am I? What type of traffic am I acting on? Router state and configuration Prevention of collateral damage ISPs/BSPs don t lose control over their network TIK ETH Zürich 15

Actions for DDoS attack mitigation Actions triggered by matching source/dest address, ports, payload, payload hashes Packet dropping Payload deletion Source blacklisting Traffic rate control User-specific ingress control Reactive or proactive Filtering close to source of attack traffic TIK ETH Zürich 16

Other applications Traceback Proactively collect packet hashes Supporting network forensics Locate origin of spoofed network traffic Automated reaction to traffic anomalies Suspicious increase in connection attempts from/to server or network Entropy variations in addresses and or ports Detection of spoofing attempts Network debugging and optimization Measure link delays, packet loss Optimize content distribution network TIK ETH Zürich 17

Deployment Infrastructure: Network Model Internet number authority Traffic control service provider Network user Network management ISP 2 Network management ISP 1 Adapt. Device ISP 2 Adapt. Device Internet Adapt. Device ISP 1 Adapt. Device Servers registration control TIK ETH Zürich 18

Service Registration TIK ETH Zürich 19

Service Deployment TIK ETH Zürich 20

Node Architecture Premium service; few packets are rerouted through adaptive device Authenticated IP address owners can reprogram adaptive devices Filter order: 1. Actions on behalf or owner of source IP address 2. Actions on behalf or owner of destination IP address TIK ETH Zürich 21

Current status and future work International patent application filed (PCT/CH2004/000631) Proof of concept implementation underway PromethOS environment To be ported to Network Processor (Intel IXP line) Commercialisation Box and service business Start-up company Patent licencing Co-operation with interested company: Trade patent against research money. Example of modest active networking. More to follow? TIK ETH Zürich 22

Conclusions Any chance of success? Control remains with the network service providers Incrementally deployable - Add-on box - Function may be integrated in future routers - Not necessary to have complete coverage on all routers Premium (paid) service for large customers (not home users!) Business incentive for network service providers Did we address the issues? Approach not scary for ISPs: Safe, scalable, controllable Ever changing shape of DDoS threat needs adaptive solution Standardization may happen through market forces We have a business model and business proposition Technology is not disruptive TIK ETH Zürich 23

Thank you! Questions? TIK ETH Zürich UK ProgNet Workshop, 1st December 2004