“Practical Network Support for IP Traceback”

Slides:



Advertisements
Similar presentations
COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips.
Advertisements

Loose Source Routing as a Mechanism for Traffic Policies Katerina Argyraki and David R. Cheriton Presented by Thuan Huynh, Robert Patro, and Shomir Wilson.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
IP Traceback in Cloud Computing Through Deterministic Flow Marking Mouiad Abid Hani Presentation figures are from references given on slide 21. By Presented.
Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson University of Washington- Seattle, WA Presented by Mohammad Hajjat- Purdue University Slides.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
IP Spoofing CIS 610 Week 2: 13-JAN Definition and Background n Def’n: The forging of the IP Source Address field in an IP packet n First mentioned.
15-441: Computer Networking Lecture 26: Networking Future.
IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.
Mitigating Bandwidth- Exhaustion Attacks using Congestion Puzzles XiaoFeng Wang Michael K. Reiter.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
Examining IP Header Fields
Internet Networking Spring 2003
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 1 Agenda Last time: finished brief overview.
Hash-Based IP Traceback Alex C. Snoeren, Craig Partidge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer.
1 Internet Networking Spring 2002 Tutorial 2 IP Checksum, Fragmentation.
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
Tracking and Tracing Cyber-Attacks
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Chapter 22 Q and A Victor Norman CS 332 Spring 2014.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Traceback Pat Burke Yanos Saravanos. Agenda Introduction Problem Definition Benchmarks and Metrics Traceback Methods  Packet Marking  Hash-based Conclusion.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Packet-Marking Scheme for DDoS Attack Prevention
DoS/DDoS attack and defense
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Hash-Based IP Traceback Alex C. Snoeren +, Craig Partridge, Luis A. Sanchez ++, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent and W. Timothy.
Network Support For IP Traceback Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson University of Washington- Seattle, WA Slides originally byTeng.
Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 11 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
ID NO : 1070 S. VARALAKSHMI Sethu Institute Of Tech IV year -ECE department CEC Batch : AUG 2012.
Network Devices and Firewalls Lesson 14. It applies to our class…
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Chapter 9: Transport Layer
Introduction Wireless devices offering IP connectivity
Instructor Materials Chapter 9: Transport Layer
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Error and Control Messages in the Internet Protocol
Internet Networking Spring 2002
Defending Against DDoS
Stateless Source Address Mapping for ICMPv6 Packets
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
Network Support For IP Traceback
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
Net 323 D: Networks Protocols
EE 122: Lecture 7 Ion Stoica September 18, 2001.
Chapter 15. Internet Protocol
Detect and Prevent Rogue Traffic in Mobile Ad Hoc Networks
Chapter 11: Network Address Translation for IPv4
DDoS Attack and Its Defense
ITIS 6167/8167: Network and Information Security
Outline The spoofing problem Approaches to handle spoofing
Computer Networks Protocols
Presentation transcript:

“Practical Network Support for IP Traceback” By: Stefan Savage, David Wetherall, Anna Karlin & Tom Anderson Affiliation: Department of Computer Science and Engineering at the University of Washington Published: ACM SIGCOMM Conference, 2000 Presented by: Andrew Mantel Presentation date: March 19, 2009 Class: CAP6135 – Malware and Software Vulnerability Analysis (Spring 2009) Professor: Dr. Cliff Zou -ACM = Association for Computing Machinery -SIGCOMM: focused on communication and computer networks

Outline Goal / Motivation Background Previous work Terminology Marking algorithms Experiment Authors’ limitations / extensions My review

Goal / Motivation Goal: Motivation: Describe “a technique for tracing anonymous packet flooding attacks in the Internet back towards their source” (Savage et al, 295) Motivation: Increase in denial of service (DoS) flood attacks From 1989 to 1995, CERT reported 50% increase per year Eliminate the problem by not allowing the attacking computer to hide -CERT = Computer Emergency Response Team Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

What this paper is and isn’t This paper isn’t: A perfect solution Cannot find the real attacker Very difficult problem (examples: compromised host attack, reflector attack) This paper is: A practical solution Traceback problem: Find the direct attacker Still a difficult problem due to IP spoofing (Source: http://www.yojoe.com/) (Source: http://raw.channelfrederator.com/) Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Vulnerability of IP protocol to anonymous attacks Sample IP Packet (IPv4) (Modified from source: http://en.wikipedia.org/wiki/IPv4#Header) Source address is specified by the sender Can spoof as long as the attack doesn’t rely on return traffic Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Previous Work

Previous work #1: Ingress Filtering Goal: Prevent attackers from spoofing the source IP Approach: Routers block packets with illegitimate source addresses Cost: Computational cost to verify source address Farther away from the source, harder to verify the address Problems: Requires universal deployment Attacker could spoof a valid address -Problems with universal deployment: -Administrators don’t want to deal with the added overhead and possible complications -Some legit services rely on IP spoofing (example: Mobile IP) Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Previous work #2.1: Input debugging Input debugging: router feature to “filter particular packets on some egress port and determine which ingress port they arrived on” (Savage et al, 296) Approach: Victim identifies signature of attacker packet Victim calls a network operator who uses input debugging to trace the packet port upstream Process continues, possibly across ISP borders, until the source site is found Problems: Assumes attack is in progress Requires too much cooperation / coordination -Requires too much cooperation / coordination -No direct economic incentive for network operator to help -Network operators need enough free time and skill -Cooperating across ISP’s is hard to coordinate Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Previous work #2.2: Controlled flooding Approach: Using a map of Internet topology, victim asks some hosts to iteratively flood each incoming link on the router closest to the victim Network buffer fills up, and attacker packets start dropping Monitor change in rate of incoming attacker packets to determine which link they came from Repeat recursively until source is found. Problems: Controlled flooding is a DoS attack Requires a topological map of the Internet and willing flooding hosts Not effective against DDoS attack Can’t be used post-mortem -This is another link testing algorithm -But unlike input debugging, doesn’t require the victim to communicate with a network operator -Not effective against DDoS attack -This link testing mechanism is inherently noisy and it can be difficult to discern the set of paths being exploited when multiple upstream links are contributing to the attack -Can’t be used post-mortem is a common problem with link testing approaches Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Previous work #3: Logging Approach: “Log packets at key routers and then use data mining techniques to determine the path that the packets traversed” (Savage et al, 297) Strength: Can be used post-mortem Problems: Large resource requirements Requires large scale inter-provider database integration Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Previous work #4: ICMP Traceback Approach: Every router randomly selects (with low probability) a packet it is forwarding Copies this packet to a special ICMP traceback message Includes info about the adjacent routers the packet travelled through If an attack occurs, use these ICMP traceback messages to reconstruct the path back to the attacker Problems: ICMP traffic gets limited/dropped Not all routers can debug the message Doesn’t work well without universal deployment Attacker could send fake ICMP traceback messages -ICMP = Internet Control Message Protocol Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Overview of previous work -Distributed capability = ability to trace multiple simultaneous attacks (Savage et al, 297) Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Terminology

Attack path Symbols: V: Victim Ai: Attack origin i Ri: Router i Attack path: unique ordered list of routers from Ai to V Example: {R6, R3, R2, R1} (Savage et al, 298) Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Approximate traceback problem Exact traceback is very difficult MAC address spoofing of source Insert false routers Focus on approximate traceback Find attack path with valid suffix Valid suffix: Suffix of attack path is the true attack path Example: {R5, R6, R3, R2, R1} Robust: Attacker can’t stop the victim from finding the valid suffix FRi = Fake Router i inserted by an attacker (Modified from: Figure 1, Savage et al, 298) Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Assumptions An attacker may generate any packet Multiple attackers may conspire Attackers may be aware they are being traced Packets may be lost or reordered Attackers may send numerous packets The route between attacker and victim is fairly stable Routers are both CPU and memory limited Routers are not widely compromised intelligent attacker nature of modern networks solution can’t be costly would destroy traceback Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Marking Algorithms

Node append Simplest marking algorithm Algorithm: Strengths: Each router appends its address to the end of the packet Victim can reconstruct path from the ordered list Strengths: Reconstruct path from a single packet Weaknesses: High overhead to append data in flight May not have enough space for all addresses Attacker could just fill this space beforehand Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Node sampling Algorithm: Add a “node” field to the packet header Each router has the same probability p of overwriting this node field with their address Path reconstruction: Same p used by every router Will receive more packets marked by a certain router based on their distance (Modified from source: http://www.loriotpro.com/) Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Node sampling Strengths: Weaknesses: Low cost to implement Takes too long to reconstruct full path Must wait for a marked packet from far away from the victim Doesn’t work against multiple attackers Multiple routers may appear to have the same distance Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Edge Sampling Illustration of Edge Sampling Algorithm -Keep track of edges instead of nodes -Random decision based on a decided probability p Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Edge Sampling Attack path reconstruction: Bounded by the furthest router d hops away Also a small chance of receiving a sample from the furthest router, but not from one closer Expected number of packets X required by Victim to reconstruct the attack path of length d: Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Edge Sampling Strengths: Weaknesses: Distance field prevents attacker from spoofing a router within the valid suffix Can identify multiple attackers Weaknesses: When multiple attackers, can’t trust paths longer than the closest attacker  requires additional precautions Additional space in IP packet header  we’ll address this next 32 bits for start + 32 bits for end + 8 bits for distance = 72 bits So not backwards compatible -Distance field prevents an attacker from spoofing a router within the valid suffix -Because any packets the attacker spoofs will have a distance >= the length of the true attack path -Can identify multiple attackers -Path reconstruction will diverge Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Compressed edge fragment sampling Modification 1: Edge-id: XOR the addresses Router nearest the Victim comes intact Reconstruct path starting near the Victim using: (Savage et al, 301) Reduces space requirements to 32 bits (XOR addresses) + 8 bits (distance) = 40 bits Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Compressed edge fragment sampling Modification 2: Split XOR’d address into k chunks Include offset of chunk Problem: Edge-id no longer unique (Modified from: Figure 6, Savage et al, 301) For this example, reduces space requirements to 8 bits (chunk of the XOR address) + 2 bits (offset) + 8 bits distance = 18 bits Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Compressed edge fragment sampling Modification 3: Bit-interleave router address with the hash of the address Increases the length of edge-id (Savage et al, 301) For this example: 8 + 3 + 8 = 19 bits Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Compressed edge fragment sampling Address reconstruction: (Savage et al, 301) Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Compressed edge fragment sampling How many packets do we need? Need kd edge fragments Each comes with probability p(1 – p)d-1 Example: k=8, d=10, p=1/25, then E(X) = 1300 To ensure path can be reconstructed with c certainty: Example: c=95%, then E(X) = 2150 Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Compressed edge fragment sampling Summary: Big-interleave address with hash of address Split into k fragments XOR fragments Reconstruct address using , starting at router b nearest Victim, validating it using the hash Reconstruct path(s) by graphing (Savage et al, 298) Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Compressed edge fragment sampling Strengths: Requires less bits than Edge Sampling # of packets required to reassemble path is within range of DoS attack Good against multiple attackers (get divergent paths) Can be used post-mortem Weaknesses: Can take a long time to reconstruct paths when multiple attackers We still need a place in the IP header to store this data  we’ll address this next Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

IP header encoding Use IP identification field 3 bits for offset (k=8) + 5 bits for distance + 8 bits for edge fragment = 16 bits Strengths: Header checksum doesn’t change Low overhead (usually just increment distance) -5 bits for distance allows for up to 31 hops, which is more than almost all Internet paths -8 bits for edge fragment based on using 32 bit hash (Savage et al, 302) Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

IP header encoding But what about the IP identification field? Original purpose: IP fragments Fragmentation is rare (0.25%)… but we still want some backwards-compatibility If fragmentation occurs before a marked router: Based on probability q, prepend a new ICMP “echo reply” header with full edge data If fragmentation occurs after a marked router: Don’t allow fragmentation (degrades performance) -Original purpose: IP fragments -If a packet became fragmented, would use this field to identify fragments belonging to the same packet so that the packet could be reconstructed Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Experiment

Experiment Implemented their algorithm on a simulator Simulator generates random paths and originates attacks Settings: Marking probability p = 1/25 Path length [1,31] 1,000 random tests per path length Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Experiment Results: Most paths resolved using 1000-2000 packets Usually need less than 4000 packets Flood DoS attacks send hundreds or thousands of packets per second (Savage et al, 303) Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Authors’ Limitations / Extensions

Backwards Compatibility Overwriting the IP identification field limits backwards compatibility Solution: Enable traceback only by request There is no IP identification field in IPv6 Solution: Use the flow label field instead Sample IPv6 Packet -Flow label is used for QoS on real-time applications (Modified from source: http://en.wikipedia.org/wiki/IPv6) Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Path Validation Some packets can arrive unmarked Attacker could mark these with bogus edges Valid suffix unaffected Spoof edges past the end of the true attack path Solution 1: Use traceroute to determine valid network connections Solution 2: Include a secret with each marked packet Contact associated network to determine the secret Disregard packets that don’t have valid secret Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

Other Problems For large distributed attacks, very hard to reconstruct paths (may misattribute an edge) Still not a perfect solution Find source of attack traffic But can’t find real attacker Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000.

My Review

Contributions Presented a traceback algorithm that is: Easy to understand Requires little router overhead Can be used post-mortem Can be implemented in IPv4 with little loss of functionality Focus on valid suffix Theoretically estimated applicability to flooding-style DoS attacks Experimentally demonstrated that their algorithm works Fair comparison between other existing traceback techniques

Weaknesses Weak explanation of experimental design Did they test single or multiple sources of attacks? What % of the network were marking routers? Did simulated attackers try anything sneaky? Didn’t report time it takes to reconstruct the path Didn’t report performance cost of dealing with fragmentation Authors note that Node Sampling would take too long, but seems similar to Edge Sampling Not a perfect solution  Authors admit to this -Both Node Sampling and Edge Sampling bounded by the time it takes to receive a packet from the furthest router

Extensions Test on IPv6 and determine countermeasures to dealing with loss of flow label field Test on real networks Combine with automated attack detection

References [1] Savage, Stefan; Wetherall, David; Karlin, Anna and Anderson, Tom. "Practical Network Support for IP Traceback". In Proceedings of the 2000 ACM Conference. Pg 295-306, 2000. [2] “IPv4”. Wikipedia. <http://en.wikipedia.org/wiki/IPv4>. [3] “IPv6”. Wikipedia. <http://en.wikipedia.org/wiki/IPv6>. (Modified from source: http://www.comixconnection.com/)