Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 11 th 2004 CSCI 6268/TLEN 5831, Fall 2004.

Slides:



Advertisements
Similar presentations
COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips.
Advertisements

IP Traceback in Cloud Computing Through Deterministic Flow Marking Mouiad Abid Hani Presentation figures are from references given on slide 21. By Presented.
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson University of Washington- Seattle, WA Presented by Mohammad Hajjat- Purdue University Slides.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
IP Spoofing CIS 610 Week 2: 13-JAN Definition and Background n Def’n: The forging of the IP Source Address field in an IP packet n First mentioned.
Foundations of Network and Computer Security J J ohn Black Lecture #37 Dec 14 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #26 Nov 4 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #26 Nov 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 1 Agenda Last time: finished brief overview.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 8 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Nov 6 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #36 Dec 12 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Nov 7 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
Pi : A Path Identification Mechanism to Defend against DDos Attacks.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
Dr. John P. Abraham Professor UTPA
TCP/IP Vulnerabilities
Karlstad University IP security Ge Zhang
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Traceback Pat Burke Yanos Saravanos. Agenda Introduction Problem Definition Benchmarks and Metrics Traceback Methods  Packet Marking  Hash-based Conclusion.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Packet-Marking Scheme for DDoS Attack Prevention
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
1 Defense Strategies for DDoS Attacks Steven M. Bellovin
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
Lecture 16 Page 1 CS 239, Spring 2007 Designing Performance Experiments: An Example CS 239 Experimental Methodologies for System Software Peter Reiher.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Network Support For IP Traceback Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson University of Washington- Seattle, WA Slides originally byTeng.
K. Salah1 Security Protocols in the Internet IPSec.
IP Spoofing. What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
19 March 2003Page 1 BGP Vulnerabilities Draft March 19, 2003 Sandra Murphy
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
“Practical Network Support for IP Traceback”
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Outline Basics of network security Definitions Sample attacks
Defending Against DDoS
Defending Against DDoS
Dr. John P. Abraham Professor UTPA
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Network Support For IP Traceback
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
Dr. John P. Abraham Professor UTPA
Net 323 D: Networks Protocols
Outline Using cryptography in networks IPSec SSL and TLS.
DDoS Attack and Its Defense
Outline The spoofing problem Approaches to handle spoofing
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 11 th 2004 CSCI 6268/TLEN 5831, Fall 2004

Announcements Midterm Thursday –Material: lectures through today; all readings; all projects (not silly OpenSSL details) –Closed notes; calculators allowed –Exam is 4 pages long (double-sided) 2.5 pages short-answer 0.5 pages extended topic 1 page of justified true/false –Half of exam is regurgitation, half is thought-problems Some thought problems are hard –Best strategy: do easiest problems first –For hard problems, if you can’t solve it, prove you at least know what the goal is (for partial credit)

Colloquium Talk Thursday, Oct 14 th, 3:30pm, ECCR 265 This is my “reappointment talk” Might be kind of redundant for people in this class, but come if you have nothing better to do

Tracebacks Methods One basic problem with fighting DDoS is that we cannot find the source IP of the attacker –Finding the attacker would allow us to shut down the attack at the source This assumes ISPs will cooperate and that there is a mechanism in place for reporting the source Both of these assumptions are questionable as we saw in the Gibson story –The Internet Protocol (IP) makes it hard to find out where things are coming from Easy to forge source IPs No tracing mechanism available –This is on purpose

Adding Traceback Perhaps we could add a mechanism to IP to implement traceback –Still doesn’t stop reflectors –Needs to be backward-compatible with current routing protocols If not, too expensive and no one will do it –There have been several suggestions Probabilistic traceback Algebraic traceback Others –We’ll look just at probabilistic traceback

Probabilistic Traceback Original idea due to Savage, Wetherall, Karlin, and Anderson –“Practical Network Support for IP Traceback” Improved scheme due to Song and Perrig –“Advanced and Authenticated Marking Schemes for IP Traceback” We’ll focus on the first paper, even though it is still far from a complete solution

First Try: Link Testing Idea: Manually trace source of traffic –Too labor intensive –Some tools developed, but requires a lot of cooperation between ISPs and backbone companies Not much economic incentive to cooperate –Could use “controlled flooding” Induce traffic from upstream routers and see which traffic is dropped But this is a DoS attack itself… ethical? Relies on being able to generate traffic Requires good map of the Internet… hard to get –Both are useful only during an attack

How about Logging? Idea: select routers log all packets as they pass through –Then what? –Data mining techniques to try and figure out which packets were part of an attack –Then trace back upstream –Huge resource requirements! –Large-scale inter-provider database integration problems

Packet Marking Idea: mark packets as they pass through routers –The mark should give information as to what route the packet took –One idea is to mark every packet that traverses a given router Just append their IP address to a list in the IP header Drawback is that this is a HUGE burden to put on routers –They would have to mark EVERY packet –Packets would get enormous if they travel a long route –Packets might be caused to fragment

Probabilistic Packet Marking First, some assumptions: –Attackers can generate any packet –Attackers can conspire –Packets can be lost or reordered –Route from attacker to victim is mostly stable –Routers are not widely compromised

PPM: Continued Each router writes its address in a 32-bit field only with probability p –Routers don’t care if they are overwriting another router’s address –Probability of seeing the mark of a router d hops away is p(1-p) d-1 –This is monotonic so victim can sort by number of packets received and get the path Smallest number is received by furthest router, etc

PPM: Difficulties We have to change the IP header any time a router marks a packet –This means storing the mark (has drawbacks) –Updating the header checksum But this is already done for TTL decrements But we may need a LOT of packets to reconstruct a path –Suppose p=0.51 and d=15, then we need more than 42,000 to get a single sample from the furthest router –To get the order right with 95% probability requires around 300,000 packets Multiple attackers complicates matters –With multiple attackers at the same distance, this all breaks down

Next Try: Edge Sampling Reserve two address-sized fields in the IP header: “start” and “end” Reserve a small “distance” field as well When a router decides to mark a packet, it writes its address in the “start” field and zeroes the distance field When a router sees a zero in the distance field, it writes its address in the “end” field If a router decides not to mark a packet, it increments the distance field only –Must use saturating addition –This is critical to minimize spoofing by the attacker; without it, attackers could inject routers close to the victim –Now attacker can only spoof marks with distance counts equal or greater than its distance from the victim Note that we can now use any probability p we like –We’re not sorting based on packet counts any longer

Edge Sampling (Cont) The expected number of packets needed for the victim to reconstruct the entire path is at most ln(d)/p(1-p) d-1 –Example: p=0.1, d=10, reconstruction requires about 75 packets –This is related to the coupon-collection problem Edge sampling allows reconstruction of the whole attack tree Encoding start, end, and distance is a problem –Not backward compatible if we change the IP header! –There are ways around this

Digression: Coupon Collection Suppose you have t types of coupons, C 1, C 2, …, C t –Each time you open baseball cards, you get a coupon of type i with probability 1/t –How many coupons do you need before you have a complete set? Note that in real competitions, all types are not 1/t Call total number you need N (a random variable) –Define a random variable N i indicating the number of draws you need to use when you hold i-1 coupon types and you want a new type Then N = N 1 + N 2 + … + N t

Coupon Collection (cont) Then E(N) = E(N 1 ) + … E(N t ) –Linearity of expectation What is E(N i )? –Probability of getting a new type if you have i-1 types is (N-i+1)/N, so expectation is N/(N-i+1) For geometric random variables, expectation is the inverse of the parameter If you have a fair die, it takes an expected 6 rolls to get a 4 (for example) –So E(N) = 1 + N/(N-2) + N/(N-3) + …+ N or N H N Here H N is the Nth harmonic number This is approximately N ln N.

Back to Reality No one does this –Yet?! DDoS attacks are still a huge problem and are still quite common But fortunately there is even more to worry about

TCP Session Hijacking This is the last topic on network-based attacks for a while After the midterm we’ll look at vulnerabilities for awhile We’ll come back to some network protocols and some more crypto later in the course

Session Hijacking How might we jump in on an established TCP session? –If we could sniff the connections and inject traffic, we could do this with no problem –If we can only inject traffic (by sending unsolicited TCP segments to the victim) it’s harder Must guess the proper sequence number

Hijacking If attacker uses sequence number outside the window of Target, Target will drop traffic If attacker uses sequence number within window, Target accepts as from Host A –Result is a one-sided connection –Can be used to crash Target, confuse, reset connection, etc Host A Target Attacker TCP Session Guesses Host A’s sequence number, uses Host A’s IP

Preventing Hijacking Make sequence number hard-to-guess –Use random ISNs Note that SYN cookies in effect do this by using a hash of some stuff which includes a counter and a secret key There are many other kinds of hijacking techniques –We’ll later look at ARP cache poisoning