DDoS Attack Traceback



Similar documents
A Hybrid Approach for Detecting, Preventing, and Traceback DDoS Attacks

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Classification and State of Art of IP Traceback Techniques for DDoS Defense

A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks

Packet-Marking Scheme for DDoS Attack Prevention

A Novel Packet Marketing Method in DDoS Attack Detection

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

Firewalls and Intrusion Detection

Tracing Cyber Attacks from the Practical Perspective

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Linköping University Post Print. Impact of Denial of Service Solutions onnetwork Quality of Service

Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking

NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

An IP Trace back System to Find the Real Source of Attacks

Analysis of IP Spoofed DDoS Attack by Cryptography

Announcements. No question session this week

The Internet provides a wealth of information,

Large-Scale IP Traceback in High-Speed Internet

DDoS Attack and Defense: Review of Some Traditional and Current Techniques

Analysis of Traceback Techniques

Network Intrusion Detection Systems. Beyond packet filtering

Port Hopping for Resilient Networks

Denial of Service. Tom Chen SMU

Filtering Based Techniques for DDOS Mitigation

Distributed Denial of Service (DDoS)

A Practical Method to Counteract Denial of Service Attacks

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

How To Mark A Packet With A Probability Of 1/D

CS 356 Lecture 16 Denial of Service. Spring 2013

Chapter 8 Security Pt 2

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Tracing Network Attacks to Their Sources

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Packet Traceback Scheme for Detection IP Based Attack

A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet

Analysis of Automated Model against DDoS Attacks

Game-based Analysis of Denial-of- Service Prevention Protocols. Ajay Mahimkar Class Project: CS 395T

NETWORK SECURITY (W/LAB) Course Syllabus

TRACK: A Novel Approach for Defending Against. Distributed Denial-of-Service Attacks

An Improved IPv6 Trace-Back technique to uncover Denial of Service (DoS) attacks

DDoS Overview and Incident Response Guide. July 2014

DDoS Protection Technology White Paper

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Moderate Denial-of-Service attack detection based on Distance flow and Traceback Routing

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Security vulnerabilities in the Internet and possible solutions

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System

How To Block A Ddos Attack On A Network With A Firewall

SIFF: A Stateless Internet Flow Filter

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Security of IPv6 and DNSSEC for penetration testers

Taxonomy of IP Traceback

Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism

Firewalls, IDS and IPS

An Efficient Filter for Denial-of-Service Bandwidth Attacks

Pi: A Path Identification Mechanism to Defend against DDoS Attacks

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

IPV6 FRAGMENTATION. The Case For Deprecation. Ron Bonica NANOG58

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

Tracing the Origins of Distributed Denial of Service Attacks

Distributed Denial of Service Attacks & Defenses

TRAFFIC REDIRECTION ATTACK PROTECTION SYSTEM (TRAPS)

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

SWAT: Small World-based Attacker Traceback in Ad-hoc Networks

Strategies to Protect Against Distributed Denial of Service (DD

Implementing Trust to Trust Using Customer Edge Switching. Raimo Kantola Aalto University Finland

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Proving Distributed Denial of Service Attacks in the Internet

On Evaluating IP Traceback Schemes: A Practical Perspective

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Forensics Tracking for IP Spoofers Using Path Backscatter Messages

Locating Network Domain Entry and Exit point/path for DDoS Attack Traffic

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Attack Diagnosis: Throttling Distributed Denialof-Service Attacks Close to the Attack Sources

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Vulnerabili3es and A7acks

co Characterizing and Tracing Packet Floods Using Cisco R

Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, 27 th March 2015

Survey of IP Traceback Methods in Distributed Denial of Service (DDoS) Attacks

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Introduction to IP v6

Network Security Algorithms

How To Protect A Dns Authority Server From A Flood Attack

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Chapter 8 Network Security

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Tracers Placement for IP Traceback against DDoS Attacks

ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

Transcription:

DDoS Attack Traceback and Beyond Yongjin Kim

Outline Existing DDoS attack traceback (or commonly called IP traceback) schemes * Probabilistic packet marking Logging-based scheme ICMP-based scheme Tweaking of DDoS attack traceback as a powerful DDoS remedy Conclusion * A. Belenky and Nirwan Ansari, On IP Traceback, IEEE Communication Magazine PAGE 2

Introduction to DDoS attack traceback What DDoS attack traceback does mean? Determine the approximate origin of attack traffic What DDoS attack traceback does not mean? Identifying attackers themselves requires forensic means Why DDoS attack traceback is difficult IP address can be easily spoofed. Morris wrote, The weakness in the [Internet Protocol] is that the source host itself fills in the IP source host ID, and there is no provision in TCP/IP to discover the true origin of a packet. Stateless nature of the Internet architecture PAGE 3

Existing DDoS Attack Traceback Schemes

Probabilistic Packet Marking Routers write their IP address in the IP packet header probabilistically Victim receives the marked packets and reconstructs the attacking path from them Use constant space in the packet header (e.g., IP identification field) to carry traceback-related information PAGE 5

Basic idea PAGE 6

Research issues Compressing traceback-related information to 16 bits of packet identification field Packet identification field is not usable under packet fragmentation or IPv6 Traced packet authentication (MAC, time-released key chain, etc.) Partial deployment with legacy routers Time required for path reconstruction DDoS attack path reconstruction PAGE 7

Logging-based scheme Log packets at routers and use datamining techniques to find path An attack graph is constructed from a set of attack paths Three entities to achieve traceback DGA (Data Generation Agent): Produces packet digests of each departing packet and stores them in a digest table SCAR (SPIE * Collection and Reduction Agent): When attack is detected, SCAR produces attack graph for it s region STM (SPIE Traceback Manager): Interface to the intrusion detection system. Gathers complete attack graph * SPIE: Source Path Isolation Engine PAGE 8

Basic idea PAGE 9

Research issues Privacy and storage size (Use hash and bloom filter) Queries must be done very soon after the attack, unless the routers have some way of offloading historical data For packets transformed through tunnels, NATs,etc., keep TLT (Transform Lookup Table) to allow inversion PAGE 10

ICMP-based scheme Sample packet with low probability (1/20,000) Copy packet data and path information (i.e., next and previous hop information) into a ICMP packet TTL field is set to 255, and is then used to identify the actual path of the attack PAGE 11

Basic idea PAGE 12

Research issues Large number of packets are required for path reconstruction Key distribution to authenticate ICMP packets ICMP packets are differentiated and may be filtered or ratelimited Input debugging to generate ICMP packets is required PAGE 13

Existing schemes comparison Router overhead Victim overhead Protocol change Bandwidth overhead ISP overhead Probabilistic Packet marking High High Required N/A N/A Logging Low Low N/A Low High ICMP-based High High Required High N/A CAVEAT: All the schemes require major infrastructure or protocol change PAGE 14

Tweaking of DDoS Attack Traceback for DDoS Remedy

Dilemma in DDoS defense and detection Defense efficiency drops near victim Defense at the victim is too late to handle large volume Intermediate link is already exhausted Hard to differentiate between legitimate and illegitimate traffic Detection efficiency drops near source Not much clue to accurately detect far from victim Misdetection is highly risky on legitimate traffic High defense efficiency victim High detection efficiency PAGE 16

Tweaking of DDoS attack traceback DDoS attack traceback is a key to resolve the dilemma : Can take countermeasure near attack origin Can increase detection efficiency near attack origin. I.e., reduce legitimate packet filtering However, we need to tweak DDoS attack traceback to make it practical and useful Make traceback simple Use existing infrastructure for traceback Add minimal overhead between ISP s Add defense with traceback information PAGE 17

Tweaked traceback R 1 R 2 A R 3 R 4 STEP 4: Defense with help of traceback information R 5 R 6 R 7 R 8 R 9 STEP 1: Abnormality Detection STEP 2: Abnormality Characterization STEP 3: Abnormality searching R 10 V Utilize already available engines for step 1, 2, 4 Adding step 3 is trivial PAGE 18

Tweak I: Detection-assisted traceback Monitoring sensor (e.g., traffic monitoring system) is readily available in most networks Use spatio-temporal relation of abnormality from monitoring sensor for traceback Abnormality can be as simple as abnormal traffic pattern destined to victim at given time slots Traceback can help distributed detection sensors to reduce false alarm PAGE 19

Cont d Destination addr Abnormality V ψ(t1, t2) ξ(t1, t2) Comparison between ξ(t1, t2) and ψ (t1, t2) PAGE 20

Tweak II: Traceback-assisted defense Traceback allows attack source identification Defense can be taken near attack sources after traceback Intermediate link is not exhausted Attack traffic is filtered out in distributed source networks Tracebackcan help reduce negative impact on legitimate traffic Packets are filtered only when those are from traced routers PAGE 21

Cont d PAGE 22

Tweak III: Traceback-assisted countermeasure Packet filtering Attack packets are filtered out and dropped at the ingress point How to distinguish between good packets and bad packet? Rate-limiting Allows a relay node to control the transmission rate of specific traffic flows Rate-limiting mechanisms are deployed when attack detection has a high false positive or cannot precisely characterize How much rate-limiting we need to apply? Traceback can convey clue for better countermeasure PAGE 23

Cont d Apply countermeasure based on abnormality matching level between victim and source networks Apply packet filtering in good matching. Otherwise apply rate limiting. By doing so, we can reduce negative impact on legitimate traffic and increase attack packet filtering Low matching level High matching level P(drop) Packet filtering 1.0 P = MaxP Matching_level - MinThresh MaxThresh - MinTresh Rate-limiting MaxP MinThresh MaxThresh Matching_level PAGE 24

Conclusion

Conclusion DDoS attack traceback provides key information for effective DDoS remedy Can take defense near attack origin Can reduce legitimate packet filtering by misdetection Can take effective countermeasure Make traceback simple and plug it into existing DDoS detection and defense mechanism Inter-ISP cooperation is minimal but worth doing since it can resolve half-baked detection and defense problem PAGE 26