Large-Scale IP Traceback in High-Speed Internet



Similar documents
Denial of Service. Tom Chen SMU

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

A Hybrid Approach for Detecting, Preventing, and Traceback DDoS Attacks

Efficient Detection of Ddos Attacks by Entropy Variation

Packet-Marking Scheme for DDoS Attack Prevention

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Proving Distributed Denial of Service Attacks in the Internet

A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

A Novel Packet Marketing Method in DDoS Attack Detection

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS

IP Traceback-based Intelligent Packet Filtering: A Novel Technique for Defending Against Internet DDoS Attacks

Tracers Placement for IP Traceback against DDoS Attacks

DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks

Denial of Service and Anomaly Detection

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

An Efficient Filter for Denial-of-Service Bandwidth Attacks

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

How To Mark A Packet With A Probability Of 1/D

Classification and State of Art of IP Traceback Techniques for DDoS Defense

Forensics Tracking for IP Spoofers Using Path Backscatter Messages

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

ATTACKS ON CLOUD COMPUTING. Nadra Waheed

Attack Diagnosis: Throttling Distributed Denialof-Service Attacks Close to the Attack Sources

Tracing Cyber Attacks from the Practical Perspective

How To Protect A Dns Authority Server From A Flood Attack

Distributed Denial of Service Attack Tools

Pi: A Path Identification Mechanism to Defend against DDoS Attacks

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

Protection against Denial of Service Attacks: Attack Detection

An Improved IPv6 Trace-Back technique to uncover Denial of Service (DoS) attacks

Yahoo Attack. Is DDoS a Real Problem?

ForNet: A Distributed Forensic Network

THE Internet is an open architecture susceptible to various

WIRELESS PACKET ANALYZER TOOL WITH IP TRACEROUTE

Port Hopping for Resilient Networks

Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Network Attacks Detection Based on Multi Clustering and Trace back Methods

Digital vs. Analog Volume Controls

Quality of Service Routing Network and Performance Evaluation*

Filtering Based Techniques for DDOS Mitigation

ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

Tracing the Origins of Distributed Denial of Service Attacks

Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds

Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms B. Aravind, (M.Tech) CSE Dept, CMRTC, Hyderabad

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Announcements. No question session this week

The Internet provides a wealth of information,

Signal Processing Methods for Denial of Service Attack Detection

Firewalls and Intrusion Detection

On Evaluating IP Traceback Schemes: A Practical Perspective

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

DDoS Overview and Incident Response Guide. July 2014

PACKET SIMULATION OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK AND RECOVERY

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Evaluation of Flow and Average Entropy Based Detection Mechanism for DDoS Attacks using NS-2

Distributed Denial of Service (DDoS)

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

DNS amplification attacks

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Defending Against Distributed Denial of Service Attacks

Domain Name Abuse Detection. Liming Wang

Analysis of Automated Model against DDoS Attacks

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

A Source Identification Scheme against DDoS Attacks in Cluster Interconnects

Towards Autonomic DDoS Mitigation using Software Defined Networking

Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD.

Basheer Al-Duwairi Jordan University of Science & Technology

DDoS Attack and Defense: Review of Some Traditional and Current Techniques

Transcription:

2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint work with Jun Li, Minho Sung, Li Li)

Introduction Internet DDoS attack is an ongoing threat - on websites: Yahoo, CNN, Amazon, ebay, etc (Feb. 2000) - on Internet infrastructure: 13 root DNS servers (Oct, 2002) It is hard to identify attackers due to IP spoofing IP Traceback: trace the attack sources despite spoofing Two main types of proposed traceback techniques Probabilistic Packet Marking schemes: routers put stamps into packets, and victim reconstructs attack paths from these stamps [Savage et. Al. 00] [Goodrich 02] Hash-based traceback: routers store bloom filter digests of packets, and victim query these digests recursively to find the attack path [Snoeren et. al. 01]

Scalability Problems of Two Approaches Traceback needs to be scalable When there are a large number of attackers, and When the link speeds are high PPM is good for high-link speed, but cannot scale to large number of attackers [Goodrich 01] Hash-based scheme can scale to large number of attackers, but hard to scale to very high-link speed Our objective: design a traceback scheme that is scalable in both aspects above.

Design Overview Our idea: same as hash-based, but store bloom filter digests of sampled packets only Use small sampling rate p (such as 3.3%) Small storage and computational cost Scale to 10 Gbps or 40 Gbps link speeds Operate within the DRAM speed the challenge of the sampling Need many more packets for traceback Independent random sampling will not work: need to improve the correlation factor attacker correlation correlation packet digest Victim

Overview of our hash-based traceback scheme Each router stores the bloom filter digests of sampled packets Neighboring routers compare with each other the digests of the packets they store for the traceback to proceed Say P is an attack packet, then if you see P and I also see P, then P comes from me to you When correlation is small, the probability that both see something in common is small

One-bit Random Marking and Sampling(ORMS) ORMS make correlation factor be larger than 50% ORMS uses only one-bit for coordinating the sampling among the neighboring routers p Sample and mark Sample and not mark 1 0 p/2 p/2 Sample all marked packets Sample unmarked packet with probability p/(2-p) 0 0 0 1 correlation : p + p p = p 2 2 2 p 2 p total sampling probability : p 1 p + p = 2 2 2 p p correlation factor (sampled by both) : ( > 50% because 0<p<1 ) p 1 / p = 2 p 2 p

Traceback Processing 1. Collect a set of attack packets L v 2. Check router S, a neighbor of the victim, with L v 3. Check each router R ( neighbor of S ) with L s attacker packet digest R packet digest Have you seen any of these packets? yes S L s You are convicted! Use these evidences to make your L s packet digest L v Victim

Traceback Processing 4. Pass L v to R to be used to make new L s 5. Repeat these processes attacker R packet digest Have you seen any of these packets? yes S packet digest L s packet digest You are convicted! Use these evidences to make your L s L v Victim

A fundamental optimization question Recall that in the original traceback scheme, the router records a bloom filter of 3 bits for each and every packets There are many different ways of spending this 3 bits per packet budget, representing different tradeoff points between size of digest and sampling frequency e.g., use a 15-bit bloom filter but only record 20% of digests (15*20% =3) e.g., use a 12-bit bloom filter but only record 25% of digests (12*25% =3) Which one is better or where is the optimal tradeoff point? Answer lies in the information theory

Intuitions from the information theory View the traceback system as a communication channel Increasing the size of digest reduces the false positive ratio of the bloom filter, and therefore improving the signal noise ratio (S/N) Decreasing sampling rate reduces the bandwidth (W) of the channel We want to maximize C = W log2 (1+S/N) C is the mutual information maximize the mutual information between what is observed and what needs to be predicted or minimize the conditional entropy Bonus from information theory: we derive a lower bound on the number of packets needed to achieve a certain level of traceback accuracy through Fano s inequality

The optimization problem k* = argmin H( Z X t1 +X f1, Y t +Y f ) k subject to the resource constraint ( s = k p ) s: average number of bits devoted for each packet p: sampling probability k: size the bloom filter digest

Applications of Information Theory Resource constraint: s = k p = 0.4

Verification of Theoretical Analysis Parameter tuning Parameters: 1000 attackers, s = k p = 0.4

Lower bound through Fano s inequality H(p e ) H( Z X t1 +X f1,y t +Y f ) Parameters: s=0.4, k=12, p=3.3% (12 3.3% = 0.4)

Simulation results False Negative & False Positive on Skitter I topology Parameters: s=0.4, k=12, p=3.3% (12 3.3% = 0.4)

Verification of Theoretical Analysis Error levels by different k values Parameters: 2000 attackers, N p =200,000

Future work and open issues 1. Is correlation factor 1/(2-p) optimal for coordination using one bit? 2. What if we use more that one bit for coordinating sampling? 3. How to optimally combine PPM and hash-based scheme a Network Information Theory question. 4. How to know with 100% certainty that some packets are attack packets? How about we only know with a certainty of p?

Conclusions Design a sampled hash-based IP traceback scheme that can scale to a large number of attackers and high link speeds Addressed two challenges in this design: Tamper-resistant coordinated sampling to increase the correlation factor to beyond 50% between two neighboring routers An information theory approach to answer the fundamental parameter tuning question, and to answer some lower bound questions Lead to many new questions and challenges