DDoS Defense for a Community of Peers

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

Nanxi Kang Princeton University
1 SUNGARD AVAILABILITY SERVICES Messaging and Collaboration - Availability Service - Notification Service.
Abilene Transit Security Policy Joint Techs Summer ’05 Vancouver, BC, CA Steve Cotter Director, Network Services Steve Cotter Director,
Firewalls and Intrusion Detection Systems
Lesson 19: Configuring Windows Firewall
Arbor Multi-Layer Cloud DDoS Protection
Licentiate Seminar: On Measurement and Analysis of Internet Backbone Traffic Wolfgang John Department of Computer Science and Engineering Chalmers University.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Tomo-gravity Yin ZhangMatthew Roughan Nick DuffieldAlbert Greenberg “A Northern NJ Research Lab” ACM.
NOC Lessons Learned TEIN2 and CERNET Xing Li
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Differences between In- and Outbound Internet Backbone Traffic Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University.
TCOM 515 Lecture 6.
VeriFlow: Verifying Network-Wide Invariants in Real Time
Access Control List ACL. Access Control List ACL.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University DATA CLASSIFICATION FOR CLASSIFIER.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Denial of Service detection and mitigation on GENI
DISA Cyclops Program.
Denial of Service detection and mitigation on GENI
Please take out the homework - viewing sheet fro the movie
DDoS In the Real World Do DDoS attacks really happen?
Wireless Communication and Networks
Copyright notice © 2008 Raul Jimenez - -
Monitoring Persistently Congested Internet Links
CNT 4704 Computer Communication Networking (not “analysis”)
DISA Global Operations
SECURING NETWORK TRAFFIC WITH IPSEC
ExpressRoute for Office 365 Training
Filtering Spoofed Packets
Copyright notice © 2008 Raul Jimenez - -
CCN application-domains: brainstorming from GreenICN project
9/18/ :06 AM BRK2212 Gain visibility into Network performance and availability with Network monitoring solutions in Azure Vijay Tinnanur Abhishek.
Firewall Exercise.
Introduction to Internet Routing
Unit 1.4 Wired and Wireless Networks Lesson 1
SONATA: Query-Driven Network Telemetry
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
ONOS Drake Release September 2015.
Phase 4: Plan your infrastructure for scale
* Essential Network Security Book Slides.
ExpressRoute for Office 365 Training
DDoS Attack Detection under SDN Context
AKAMAI INTELLIGENT PLATFORM™
Обзор Windows Azure Connect
i-Path : Network Transparency Project
Inter-domain Routing Outline Homework #3 solutions
Lessons Learned TEIN2 and CERNET
The real-time Internet routing observatory
Memento: Making Sliding Windows Efficient for Heavy Hitters
COMP/ELEC 429/556 Introduction to Computer Networks
Comparison to existing state of security experimentation
The Case for DDoS Resistant Membership Management in P2P Systems
Networking Essentials For Firewall-1 Administrators
was not invented by Al Gore…
Large-Scale Edge DDoS Protection
DNSR: Domain Name Suffix-based Routing in Overlay Networks
Outline The spoofing problem Approaches to handle spoofing
Session 20 INST 346 Technologies, Infrastructure and Architecture
PCAV: Evaluation of Parallel Coordinates Attack Visualization
Outline Why is DDoS hard to handle?
Validating MANRS of a network
Presentation transcript:

DDoS Defense for a Community of Peers Jem Berkes (Project PI) and Adam Wick (Transition Lead)

About DDoS

A DDoS Attack

Source data: Arbor Networks Worldwide Infrastructure Security Report, and recent media reports

When DDoS Becomes a Problem ... Network Capacities (Gbps) Med. Organization ISP Internet Exchange Internet Backbone DDoS Attack Critical bottleneck The Internet has bottlenecks: internet exchanges, regional routing. The aggregate or world-wide capacity is NOT the issue! … 250 500 750 1000

Current Attacks Now Exceed Bottlenecks Mirai / IoT botnets Enormous increase from 500 Gbps to 1,200+ Gbps Can’t stop this alone Tier 1 ISPs Cloud providers – not immune Aggregate, world-wide capacity is not the issue

Networks Must Collaborate Effective defense requires collaboration between networks Must stop traffic closer to sources Automate response/coordination under attack stress We’re creating a tool to do this – 3DCoP

Handling DDoS with 3DCoP

Flow representation of traffic IP IP IP SRCIP SPORT DSTIP DPORT PROTO COUNT … Big Packet bodies Compact summary NetFlow, IPFIX

Our approach Decentralized collaboration between networks Share flow information (clues) from distributed sensors via P2P Use clues to compute Sources of attacks Spoofed traffic Optimal blocking

Decentralized P2P Network Out-of-band P2P Can operate using cell phone tethering – during attack IPFS: Kademlia-based DHT swarm Every node has public key

What is shared? Subset of flow data, classified as Anomalies Undesirable traffic (attacks) Assertions: present or not present Each node pushes data Decide what you want to share

Who is it shared with? Strict/private mode Flow data only shared with owner of flow endpoint Enforced with public key cryptography Global announcements For very anomalous traffic, or attacks Groups/associations Each site always controls what they share, and with whom

Data Processing Traffic Router NetFlow SiLK Analysis Pipeline 3DCoP Engine

3DCoP Engine SiLK flow data P2P Network Site policy and configuration

3DCoP Engine I see anomalies SiLK flow data P2P Network Site policy and configuration

You’re sending an attack 3DCoP Engine I see anomalies You’re sending an attack SiLK flow data P2P Network Site policy and configuration

Engine State tables Local anomalies, peer-reported anomalies, etc. Rules-based algorithm State iterations with real-time updates Automatic traffic analysis leading to actions

Rules in the Engine if I see anomalous outbound flows and others report anomalies from me then increase oddness score for flows foreach anomalous flow if oddness score > THRESHOLD and network utilization is high and many src_ip are sending to few dst_ip then promote anomaly to attack

More Rules… foreach peer-reported anomaly if local anomaly matches port number then // might be related attack if port is a known amplifier service increase oddness score // we might all be part of // the same DDoS attack

Example

Demo scenario A 30 Mbps 700 Mbps Spoofing as C C B 30 Mbps 700 Mbps

Demo scenario A C B Spoofing as C Seeing attacks from A 30 Mbps

Seeing heavy traffic from C Demo scenario Seeing heavy traffic from C A 30 Mbps 700 Mbps Spoofing as C C B 30 Mbps 700 Mbps

Seeing heavy traffic from C Demo scenario Seeing heavy traffic from C We didn’t send that We didn’t send that traffic A 30 Mbps 700 Mbps Spoofing as C C B 30 Mbps 700 Mbps

Aha! That’s spoofed traffic Demo scenario Aha! That’s spoofed traffic A 30 Mbps 700 Mbps Spoofing as C C B 30 Mbps 700 Mbps

Demo scenario Block inbound A Spoofing as C C B

Optimal mitigation Demo scenario A Spoofing as C C B

Demo scenario A Spoofing as C C B

State Iterations Network containing A (amplifier) Network containing C (victim)

State Iterations Network containing A (amplifier) Inbound Anomalies C --> A Outbound Anomalies A --> C Network containing C (victim) Inbound Attacks A --> C

State Iterations Network containing A (amplifier) Inbound Anomalies C --> A Outbound Anomalies A --> C Network containing C (victim) Inbound Attacks A --> C

State Iterations Network containing A (amplifier) Inbound Anomalies C --> A Outbound Attacks, Must Stop A --> C Network containing C (victim) Inbound Attacks A --> C

State Iterations Network containing A (amplifier) Inbound Anomalies C --> A Outbound Attacks, Must Stop A --> C Network containing C (victim) Inbound Attacks A --> C Check flow repository…

State Iterations Network containing A (amplifier) Inbound Anomalies C --> A Outbound Attacks, Must Stop A --> C Assertions that Peers Did Not Send Network containing C (victim) Inbound Attacks A --> C Someone is spoofing my IP C --> A

State Iterations Network containing A (amplifier) Inbound Spoofed Attacks C --> A Outbound Attacks, Must Stop A --> C Assertions that Peers Did Not Send Network containing C (victim) Inbound Attacks A --> C Someone is spoofing my IP C --> A

We’ve learned a lot! Network containing A (amplifier) Inbound Spoofed Attacks C --> A Outbound Attacks, Must Stop A --> C Assertions that Peers Did Not Send Network containing C (victim) Inbound Attacks A --> C Someone is spoofing my IP C --> A

Vital information learned through collaboration We’ve learned a lot! Network containing A (amplifier) Inbound Spoofed Attacks C --> A Outbound Attacks, Must Stop A --> C Assertions that Peers Did Not Send Vital information learned through collaboration

What About Mischief and Lies? We have considered this Peers make statements about their own traffic “I don’t want this traffic” Public key crypto ties ownership/responsibility

Status

Status Have an early prototype We are seeking pilot and evaluation partners. Correctly computes results with a simple attack Identifies attack sources Identifies spoofed traffic Next steps Construct larger, more complex attack scenarios Develop the engine further Accuracy Better reasoning

Contact Us! Jem Berkes: jberkes@galois.com Galois 3DCoP Team: ddos@galois.com We are actively seeking evaluation partners for 3DCoP. Please contact us if you’d be interested in trying 3DCoP out in your organization. All trademarks, service marks, trade names, trade dress, product names, and logos appearing in these slides are the property of their respective owners, including in some instances Galois, Inc. This project is the result of funding provided by the Science and Technology Directorate of the United States Department of Homeland Security under contract number D15PC00185. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Department of Homeland Security, or the U.S. Government.