Introduction to IP Traceback 交通大學 電信系 李程輝 教授 2004/3/26.

Slides:



Advertisements
Similar presentations
COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips.
Advertisements

Internetworking II: MPLS, Security, and Traffic Engineering
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS 457 – Lecture 16 Global Internet - BGP Spring 2012.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
IP Traceback in Cloud Computing Through Deterministic Flow Marking Mouiad Abid Hani Presentation figures are from references given on slide 21. By Presented.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
IP Spoofing CIS 610 Week 2: 13-JAN Definition and Background n Def’n: The forging of the IP Source Address field in an IP packet n First mentioned.
1 K. Salah Module 5.2: Internet Protocol CO vs. CL protocols IP Features –Fragmentation –Routing IP Datagram Format IPv6.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
Internet Networking Spring 2003
Introduction to IP Traceback 交通大學 電信系 李程輝 教授. 2 Outline  Introduction  Ingress Filtering  Packet Marking  Packet Digesting  Summary.
Oct 19, 2004CS573: Network Protocols and Standards1 IP: Datagram and Addressing Network Protocols and Standards Autumn
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 1 Agenda Last time: finished brief overview.
Hash-Based IP Traceback Alex C. Snoeren, Craig Partidge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer.
04/12/2001ecs289k, spring ecs298k Distributed Denial of Services lecture #5 Dr. S. Felix Wu Computer Science Department University of California,
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
ECE 526 – Network Processing Systems Design Packet Processing II: algorithms and data structures Chapter 5: D. E. Comer.
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
1Group 07 IPv6 2 1.ET/06/ ET/06/ ET/06/ EE/06/ EE/06/ EE/06/6473 Group 07 IPv6.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
Tracking and Tracing Cyber-Attacks
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Traceback Pat Burke Yanos Saravanos. Agenda Introduction Problem Definition Traceback Methods  Packet Marking  Hash-based Conclusion References.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Traceback Pat Burke Yanos Saravanos. Agenda Introduction Problem Definition Benchmarks and Metrics Traceback Methods  Packet Marking  Hash-based Conclusion.
EECB 473 DATA NETWORK ARCHITECTURE AND ELECTRONICS PREPARED BY JEHANA ERMY JAMALUDDIN Basic Packet Processing: Algorithms and Data Structures.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Packet-Marking Scheme for DDoS Attack Prevention
Chapter 20 Network Layer: Internet Protocol
Hash-Based IP Traceback Alex C. Snoeren †, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, W. Timothy Strayer.
By Rod Lykins.  Brief DDoS Introduction  Packet Marking Overview  Other DDoS Defense Mechanisms.
Chapter 27 IPv6 Protocol.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
Hash-Based IP Traceback Alex C. Snoeren †, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, W. Timothy Strayer.
Hash-Based IP Traceback Alex C. Snoeren +, Craig Partridge, Luis A. Sanchez ++, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent and W. Timothy.
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
Jessica Kornblum DSL Seminar Nov. 2, 2001 Hash-Based IP Traceback Alex C. Snoeren +, Craig Partridge, Luis A. Sanchez ++, Christine E. Jones, Fabrice Tchakountio,
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Defending Against DDoS
Single-Packet IP Traceback
Defending Against DDoS
Tracing Cyber Attacks Areej Al-Bataineh
Chapter 20 Network Layer: Internet Protocol
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
Net 323 D: Networks Protocols
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
DDoS Attack and Its Defense
Ch 17 - Binding Protocol Addresses
ITIS 6167/8167: Network and Information Security
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

Introduction to IP Traceback 交通大學 電信系 李程輝 教授 2004/3/26

2 Outline  Introduction  Ingress Filtering  Packet Marking  Packet Digesting  Summary

2004/3/263 Introduction

2004/3/264 Introduction  Internet becomes ubiquitous The impact of network attackers is getting more and more significant  Two kind of attackers A few well-targeted packets  Ex: Teardrop attack Denial-of-service (DoS) & distributed DoS (DDoS)  Typically conducted by flooding network links with large amounts of traffics

2004/3/265 DDoS (a) Direct DDoS (b) reflector attacker

2004/3/266 The Difficulty to Catch the Attacker  The anonymous feature of the IP protocol Can’t identify the true source of an IP datagram if the source wishes to conceal it Solution : ingress filtering  Somewhere spoofed source address are legal Network address translators (NATs) Mobile IP

2004/3/267 IP Traceback Problem  IP traceback problem The problem of identifying the source of the offending packets Source means  Zombie  Reflector  Spoofed address  Ingress point to the traceback-enabled network  One or more compromised routers within the enabled network

2004/3/268 IP Traceback Problem - Solution  Packet marking To cope with DDoS attacks Router marks packets with it’s identifications Victim can reconstruct the attack path if sufficient number of packets are collected  Packet digesting For attacks that require only a few packets Require storage of audit trails on the routers Victim ask routers if the offending packet passed before

2004/3/269 Evaluation Metrics for IP Traceback Technique (1)  ISP Involvement  Number of Attacking Packets Needed for Traceback  The Effect of Partial Deployment  Processing Overhead  Bandwidth Overhead  Memory Requirements  Ease of Evasion

2004/3/2610 Evaluation Metrics for IP Traceback Technique (2)  Protection  Scalability  Number of Functions Needed to Implement  Ability to Handle Major DDoS Attacks  Ability to Trace Transformed Packets Network Address Translation (NAT) Tunneling ICMP packet Duplication of a packet in multicast

2004/3/2611 Ingress Filtering

2004/3/2612 Ingress Filtering  Limit source addresses of IP datagrams from a network to addresses belonging to that network  If ingress filtering is not deployed everywhere attackers can still spoof any address on the Internet

2004/3/2613 Why Don’t People Run Ingress Filtering ?  It is easy! It improves security! Why not run it? Some people run it in current routers It is implemented in the slow path in the software not the hardware It is easy  For the routers close to the edge of the networks where addressing rules are well defined It becomes complex and inefficient  For transit networks where packets with a different source address can enter the network in multiple locations

2004/3/2614 Packet Marking

2004/3/2615 Packet Marking  Probabilistic packet marking (PPM)  ICMP traceback (iTrace)  Deterministic packet marking (DPM)

2004/3/2616 Probabilistic Packet Marking  Routers mark packets that pass through them  Packets for marking are selected with probability p=0.04

2004/3/2617 Router Marking

2004/3/2618 Pros & Cons  Pros High stability Still can work under partial deployment No bandwidth overhead Low network processing overhead (decide which packet should be marked)  Cons Only for DoS & DDoS attacks Victim requires high memory and high processing overhead Without authentication mark spoofing may happen

2004/3/2619 Ability to Trace Transformed Packets  Can handle packet modification transformation of the packets directed to the victim  The ID field used for fragmentation is used for the mark If a single fragment of the original datagram is marked  The reassembly function would fail at the destination Solution: select a lower probability of marking for fragmented packet  Tunneling may create a problem for reconstruction If marks are extracted before the outer header is removed

2004/3/2620 ICMP Traceback (iTrace)  ICMP traceback message (iTrace) Next hop Previous hop Timestamp As many bytes of the traced packet TTL=255

2004/3/2621 “Intension-Driven” iTrace  Attack[V] =1, victim V is attacked  Intension[V] =1, victim V wants to receive ICMP traceback message  Received[R→V] How many iTrace messages from router R to victim V have been received  Generated[R] The number of iTrace messages generated by router R for all destinations  The value of ICMP packet can be a function of

2004/3/2622 Architecture  Introduce a new bit – intension bit  The intension bit in routing table will set to 1 if one has intension to receive ICMP packet  Decision Module “Choose” one from routing table prefer the one with the highest value

2004/3/2623 Pros & Cons  The pros and cons of iTrace is similar to that of PPM  Except iTrace has bandwidth overhead ; PPM has no bandwidth overhead Without authentication fake ICMP packet may be generated more easily

2004/3/2624 Deterministic Packet Marking  Each packet is marked when it enters the network  Only mark Incoming packets  Mark : address information of this interface  16 bit ID + 1 bit Reserved Flag

2004/3/2625 The Information of Marks Pad Ideal hash

2004/3/2626 Reconstruction Process  area  Each area has k segments  Each segment has bits area

2004/3/2627 PPM vs. DPM  Mark spoofing (PPM) Use coding technique (but not 100%) (DPM) Spoofed mark will be overwritten  The received information (PPM) Full path (DPM) Address of the ingress router

2004/3/2628 Packet Digesting Source Path Isolation Engine (SPIE)

2004/3/2629 Packet Digesting  Compute digest over The invariant portion of the IP header (16 bytes) The first 8 bytes of the payload (8 bytes) 24 bytes  sufficient to differentiate all packets

2004/3/2630 Prefix Length & Collision Probability  A WAN trace from an OC-3 gateway router  A LAN trace from an active 100Mb Ethernet segment

2004/3/2631 Bloom Filter (1)  A technique that simply stores the digests * For each packet arrived Step-1 Use k different hash function computes k independent n-bits digests Step-2 Set the corresponding bits in the bits digest table

2004/3/2632 Bloom Filter (2)  If any one of them is zero The packet was not stored in the table  If all the bits are one It is highly likely the packet was stored It is possible that some set of other insertions caused all the bits to be set  Restriction Can only store a limited number of digests Saturated filters can be swapped out for a new, empty filter Change to a new filter  loss the previous digest information

2004/3/2633 Architecture (1)  Data Generation Agent (DGA)  SPIE Collection and Reduction Agents (SCARs)  SPIE Traceback Manager (STM)

2004/3/2634 Architecture (2)  DGA SPIE enhanced router 1. produce packet digest 2. store digests table annotated – time & hash function  SCARs Concentration points for several routers 1. produce local attack graph

2004/3/2635 Architecture (3)  STM Control the whole SPIE system The interface to requesting packet trace 1. verifies the authenticity 2. dispatch the request to the appropriate SCARs 3. gather the resulting attack graphs 4. complete the attack graph 5. replies to the IDS

2004/3/2636 Traceback Processing IDS determine an exceptional event has occurred STM cryptographically verifies its authenticity SCAR poll its DGAs & produce partial attack graph packet, P ; victim, V ; time of attack, T P ; V ; T another SCAR T ’ – the packet enter the region P ’ – the entering packet V ’ – the border router between the two network terminate no yes

2004/3/2637 Graph Construction  Reverse path flooding R8 ; R9 R7 R4 ; S5 ; R5 R3 ; R2  The SCAR don’t need to query DGAs sequentially

2004/3/2638 Ability to Trace Transformed Packets (1)  Transform lookup table (TLT) Record sufficient packet data at the time of transformation to allow the original packet to be reconstructed 1 st field : a digest of the transformed packet 2 nd field : the type of transformation (include a flag I) 3 rd field : a variable amount of packet data

2004/3/2639 Ability to Trace Transformed Packets (2)  Flag I (indirect flag) (1)For some transformations, such as NAT, the 32bits data field is not enough.  Set I=1, the third field is treated as a pointer (2)In many case (e.g., tunneling or NAT), packets undergoing a particular transformation are related  It is possible to reduce the storage requirement by suppressing duplicate packet data  Flag I is used for flow caching, or at least identification, so that the packets within the flow can be correlated and stored appropriately.

2004/3/2640 Summary

2004/3/2641 Summary  In recent years much interest and consideration have been paid to the topic of securing the Internet infrastructure  To detect the offending packets IDS (Intrusion Detection System) becomes more and more important  Detecting the offending packets (IDS)  find out attackers (IP traceback)  Several methods have been proposed Each has its own advantages and disadvantages None of the methods described has been used on the Internet When economic or political incentives become strong enough to justify deployment of IP traceback, some new requirements and metrics for evaluation might emerge

2004/3/2642 References  R. K. C. Chang, “Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial,” IEEE Commun. Mag., Oct. 2002, pp. 42–51.  A. Belenky and N. Ansari, “On IP traceback,” IEEE Communications Magazine, vol. 41, no. 7, July 2003  S. Savage et al., “Network Support for IP Traceback,” IEEE/ACM Trans. Net., vol. 9, no. 3, June 2001, pp. 226–37.  D. X. Song and A. Perrig, “Advanced and Authenticated Marking Schemes for IP Traceback,” Proc. INFOCOM,2001, vol. 2, pp. 878–86.  S. F. Wu et al., “On Design and Evaluation of ‘Intention-Driven’ ICMP Traceback,” Proc. 10th Int’l. Conf. Comp. Commun. and Nets., 2001, pp. 159–65.  A. Belenky and N. Ansari “IP Traceback With Deterministic Packet Marking,” IEEE Communications Letters, Vol.7, NO. 4,April 2003  A. Belenky and N. Ansari “Tracing Multiple Attackers With Deterministic Packet Marking,” IEEE PACRIM’03, August 2003  A. C. Snoeren et al., “Single-Packet IP Traceback,” IEEE/ACM Trans. Net., vol. 10, no. 6, Dec. 2002, pp. 721–34.