Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond



Similar documents
Large-scale Evaluation of Distributed Attack Detection

A System for in-network Anomaly Detection

Ariba: A Framework for Developing Decentralized Services

Network Security Demonstration - Snort based IDS Integration -

Computer Technology Department, De La Salle University, 2401 Taft Ave., Manila

JAVA FRAMEWORK FOR SIGNATURE BASED NETWORK INTRUSION DETECTION SYSTEM

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

SECURING APACHE : DOS & DDOS ATTACKS - II

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Cisco IOS Flexible NetFlow Technology

inet Enterprise Features Fact Sheet

Seminar Computer Security

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

Firewall Design Principles

Linux MDS Firewall Supplement

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

ΕΠΛ 674: Εργαστήριο 5 Firewalls

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Firewalls and Intrusion Detection

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Kick starting science...

DDoS Protection Technology White Paper

Protecting and controlling Virtual LANs by Linux router-firewall

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity

Firewall Design Principles Firewall Characteristics Types of Firewalls

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

12. Firewalls Content

Internet Security Firewalls

Transport and Network Layer

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Glasnost or Tyranny? You Can Have Secure and Open Networks!

OPNET Network Simulator

CS5008: Internet Computing

How Cisco IT Protects Against Distributed Denial of Service Attacks

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Networks: IP and TCP. Internet Protocol

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

Arbor s Solution for ISP

Application-level simulation for network security

Overview. Firewall Security. Perimeter Security Devices. Routers

IxLoad-Attack: Network Security Testing

In: Proceedings of RECPAD th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal

Software Defined Networking and the design of OpenFlow switches

Lecture 23: Firewalls

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Security Challenges & Opportunities in Software Defined Networks (SDN)

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

Introducing FortiDDoS. Mar, 2013

Network Based Intrusion Detection Using Honey pot Deception

Campus LAN at NKN Member Institutions

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Network Layers. CSC358 - Introduction to Computer Networks

DoS: Attack and Defense

CaptIO Policy-Based Security Device

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Cisco Network Foundation Protection Overview

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

How To Classify A Dnet Attack

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Introduction to Netflow

An Architecture for Concurrent Future Networks

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

IDS / IPS. James E. Thiel S.W.A.T.

Chapter 7. Firewalls

Computer Security: Principles and Practice

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Tools for Peer-to-Peer Network Simulation

TDC s perspective on DDoS threats

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Computer Security DD2395

Research on Errors of Utilized Bandwidth Measured by NetFlow

Quality of Service and Denial of Service

The Bro Network Intrusion Detection System

How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager

Data Sheet. DPtech Anti-DDoS Series. Overview

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

TREK GETTING STARTED GUIDE

CSCE 465 Computer & Network Security

Content Distribution Networks (CDN)

8 Conclusion and Future Work

Transcription:

Distack Towards Understanding the Global Behavior of DDoS Attacks A Framework for and Beyond Thomas Gamer, Christoph P. Mayer, Martina Zitterbart 29. Aug 2008, EURECOM, France, (TH) Karlsruhe Institute of Technology (KIT)

DDoS Huge threat to the Internet New Zealand teenager controlled botnet of 1.3 50 million computers (Heise-Online, Nov. 2007) DDoS attacks and worms pose biggest threat to the Internet (Worldwide Infrastructure Security Report, Arbor Networks, 2007) 1.3 million systems send at Ø 19kbit/s each 1 (Source: Arbor Networks) How can you detect and block such low traffic early? Cooperation between detection instances seems promising!

On the way to Large-scale simulations ReaSE Evaluation PktAnon Real traffic/traces 2 Identification of attacks: anomalies kind of attack Cooperation of distributed detection instances Local traffic analysis and attack detection Self-organization of local detection Management and Visualization

Distack Framework for Distributed Large-scale Attack Detection Large-scale simulations ReaSE Evaluation PktAnon Real traffic/traces 3 Identification of attacks: anomalies kind of attack Cooperation of distributed detection instances Local traffic analysis and attack detection Self-organization of local detection Management and Visualization

Why can`t we cope with DDoS? 4 Some exemplary issues Little knowledge about global behavior of DDoS Attacks highly distributed. Attack detection and countermeasures mostly not! Few directly reusable results Initial challenge: Complex development and evaluation of mechanisms for local and distributed attack detection and traffic analysis Initial development effort as base for your mechanisms is incredibly high!

What you can do with Distack 5 Attack detection and traffic analysis Rapidly implement and run your attack detection and traffic analysis schemes Lots of reusable modules (e.g. sampling, plotting) Run on live traffic or captured traces Comfortable communication between remote instances easier distributed detection Simulations Run your modules transparently in large-scale simulations Integrates seamlessly with the toolkit OMNeT++/INET/ReaSE and that`s not even all

even more fun with Distack Distack use-cases Attack detection Traffic analysis Online Offline Simulations Local Distributed Examples Local traffic analysis: easily analyze online traffic and traffic traces Distributed traffic analysis: several measurement points in the network, report to a central instance 6 There is more than distributed attack detection!

Distack: Distributed attack detection Framework for distributed attack detection and traffic analysis 7 What it gives to you Fully concentrate on your methods for attack detection and traffic analysis Write once run everywhere: Transparently run your methods, e.g. on a PC or in a simulation environment High reuse through building blocks Great support for your attack detection

Rough Architectural Overview Module manager Mechanisms are implemented in small building blocks modules The environment to implement your modules Network manager Abstraction from the network Handles the different ways packets come in Local and remote messaging Communication for the lightweight modules Data-centric communication, local and remote 8 Configuration Flexible way to configure your modules and Distack

Distack High-level Architecture 9 Protokoll-Parser Channel ModuleManager MessagingSystem Channel Channel ChannelManager Frame distribution system NetworkManager FrameBuffer reader thread NetworkInterface OMNeT++ Live Traffic Traeces...... XML-based Configuration Remote Messaging Serialization Deserialization Destinations Sources Communication GIST Sockets API... Utilities Level based Logging Conversion Timer Structures String Operations Routing Table...

Lightweight Modules Modules: implement well-defined functionality Small building blocks for high reuse Loaded at runtime on demand Easily configurable (next slide) Perform packet inspection... or other tasks this is where you implement your mechanisms! Channels: linear linked modules Create more complex functionality Channel A Sampling Monitoring Plotting 10 Channel B Protocol filter Statistics

Packet Processing in Distack 11 Protokoll-Parser Channel ModuleManager MessagingSystem Channel Channel ChannelManager Frame distribution system NetworkManager FrameBuffer reader thread NetworkInterface OMNeT++ Live Traffic Traces...... XML-based Configuration Remote Messaging Serialization Deserialization Destinations Sources Communication GIST Sockets API... Utilities Level based Logging Conversion Timer Structures String Operations Routing Table...

Flexible Configuration 12 How can I configure my modules? <module name="modules"> <submodule name="basicsampling" </submodule>... </module> Module instance Module parameters Library the module is based on Module lib="modulesamplingnoutofn"> instantiation and configuration <configitem name="samplingcount">200</configitem> <configitem Can use module name="selectioncount">1</configitem> libraries multiple times with different configuration! Channel name <module name="channels"> <submodule name="simplemonitoring" stage="1"> <configitem Channels name="1">basicsampling</configitem> and actual use of modules <configitem name="2">...</configitem> </submodule> functionality!... </module> Flexible grouping of small modules into larger Use of the module

Communication Modules are leightweight, small, decoupled Enables high reuse, but how can they interact? Data-centric communication between modules Modules register for message they are interested in Modules send out messages Messages delivered to registered modules Module: `Hmm interesting information I got here maybe someone is interested in this` send Remote communication as easy as local Send messages locally, remotely, or both Transparent message distribution to remote Distack instances 13 MessageSynAckBalance msg(291,33); sendmessage(msg,remote_destinations_neighbours);

Transparent Abstraction 14 Distrack abstracts from traffic sources Live traffic: buffers handle bursty traffic Traffic traces: replayed with original timing Simulated traffic: packet transformation for OMNeT++ Easy and consistent packet access Traffic live, replayed, or simulated you don t care! Easy and safe access to protocol parsers TcpPacket* tcp = ippacket->getnextpacket(); if(tcp->isflagset(tcppacket::tcp_flag_syn)) port = tcp->getdestport(); Supported protocols Ethernet, ARP, ICMP, IPv4, IPv6, MPLS, TCP, UDP More to come. Easy to implement your own!

Integration into simulations Few simulations of DDoS attacks and detection In our opinion the key to understand the global and distributed behavior of DDoS attacks Our simulation toolkit OMNeT++: time discrete simulation environment INET Framework: lots of protocols (TCP, UDP, ) ReaSE: topology, self-similar traffic generation, DDoS zombies 15 Distack is integrated into this toolkit Packet formats Transparent transformation into Distacks protocol parsers Time domain The simulation time runs different! Modules source code compatible just need to recompile

Distack is real! Everything presented here is running code! Go and implement some modules Try it out! E.g. analyze a trace file Use the communication between remote instances There are already several modules available 16 Go and do a large-scale simulation Could be DDoS, could be somethings else Find out how easy Distack makes your life! Integrates with ReaSE coming soon in this talk

What we are doing with Distack 17 Collaborative Anomaly-based Attack Detection Thomas Gamer, Michael Scharf, and Marcus Schöller, Proceedings of 2nd International Workshop on Self-Organizing Systems (IWSOS 2007), p. 280-287, Springer, Sep 2007. Identification of attacks: anomalies kind of attack Cooperation of distributed detection instances A System for in-network Anomaly Detection Thomas Gamer, Kommunikation in Verteilten Systemen, p. 275-282, Springer, Bern, Schweiz, Feb 2007. Local traffic analysis and attack detection Self-organization of local detection Management and Visualization

What we are doing with Distack Management and Visualization 18

ReaSE Realistic Simulation Environment Large-scale simulations ReaSE Evaluation PktAnon Real traffic/traces 19 Identification of attacks: anomalies kind of attack Cooperation of distributed detection instances Local traffic analysis and attack detection Self-organization of local detection Management and Visualization

Realistic Simulations We want to understand the global behavior of DDoS attacks evaluate our mechanisms implemented in Distack on a large-scale! Using real systems is extremly costly! Where to get e.g. 10.000 machines from? Use a real network? We will execute DDoS attacks! 20 Simulations Topologies that match todays Internet infrastructure Realistic background traffic, malicious DDoS traffic

Network Topology How does todays Internet topology look like? Power-law distribution in node degree Lots of nodes with low node degree Few nodes with high node degree Hierarchical structure Autonomous Systems (stub/transit) with routers Based on Zhoua et al. ICCCAS06, Li et al. SIGCOMM04 stubas transitas 21 transitas stubas stubas

Network Traffic Legitimate traffic as well as Self-similar behavior Heavy-tailed ON/OFF intervals as well as packet sizes Reasonable mix of different kinds of traffic Traffic profiles define flow behavior malicious traffic Evaluate the attack detection system Used real-world tools and ported their behavior DDoS attacks: Tribe Flood Network Worm propagations: Code Red v1 22

ReaSE Summary ReaSE combines topology and traffic generation for realistic simulation environments Based on up-to-date solutions Includes generation of malicious traffic Integrates with OMNeT++ and INET Framework GUI helps to create topologies define traffic profiles 23

PktAnon Traffic Anonymization Large-scale simulations ReaSE Evaluation PktAnon Real traffic/traces 24 Identification of attacks: anomalies kind of attack Cooperation of distributed detection instances Local traffic analysis and attack detection Self-organization of local detection Management and Visualization

PktAnon Traffic Anonymization How it all began: We wanted to record network traffic at an ISP gateway to evaluate the attack detection mechanisms Anonymization of network traffic Sharing recorded traffic traces with third parties Legal reasons, protect users, protect your network infrastructure, 25 Existing tools not flexible enough Have been built out of a specific need PktAnon is generic and fully flexible!

Anonymization profiles 26 Anonymization profiles Allow complete flexibility in the anonymization every protocol field can be anonymized! <TcpPacket> <TcpSourceport anon=anonhashsha1/> <TcpSegnum anon=anonidentity/>... Even more flexibility Input and Output piping ( live anonymization!) Output traces well-formed (checksum, length field) Many anonymization primitives and protocols Current and outlook FreeBSD package, livehex security CD, OpenPacket.org Call to the community for defining standardized anonymization profiles with different security levels

Summary and Conslusion Road towards distributed attack detection and understanding the global behavior of DDoS is stony! We have developed tools to flatten this way Did not build them the way we needed them built them generic and flexible Now they simplify our daily work and they can simplify your work! Framework 27 ReaSE PktAnon Realistic Simulation Environment Profile-based Packet Anonymization

Thank you for your Attention! /distack Distack A Framework for Large-scale Anomaly-based Attack Detection Thomas Gamer, Christoph P. Mayer, and Martina Zitterbart SECURWARE08, Cap Esterel, France, Aug 2008. ReaSE /rease Realistic Simulation Environments for IP-based Networks Thomas Gamer and Michael Scharf, 1 st International Workshop on OMNeT++, Marseille, France, Mar 2008. 28 PktAnon /pktanon PktAnon A Generic Framework for Profile-based Traffic Anonymization Thomas Gamer, Christoph P. Mayer, and Marcus Schöller PIK 2-2008 (Journal), Apr 2008.