Security Related Research Projects at UCCS Network Research Lab

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
9/26/2001Godavari Thesis Proposal SSL Proxy1 The Design and Implementation of a SSL Proxy for Content Switch Thesis Proposal by Ganesh Kumar Godavari Department.
Design and Implementation of Alternative Route Against DDOS Jing Yang and Su Li.
Topics in Advanced Network Security 1 Stateful Intrusion Detection for High Speed Networks Christopher Kruegel Fredrick Valeur Giovanni Vigna Richard Kemmerer.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
On Proxy Server based Multipath Connections (PSMC) PhD Proposal Yu Cai 10/2003 University of Colorado at Colorado Springs.
Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate.
1 TPAC 10/10/2003 chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department of Computer Science.
Security Awareness: Applying Practical Security in Your World
PSMC Proxy Server-based Multipath Connection CS 526 Advanced Networking - Richard White.
ChowSCID1 Secure Collective Internet Defense (SCID) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
ChowSCOLD1 Secure Collective Defense Network (SCOLD) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
Multipath Routing: Proxy Selection By Joseph A LaConte CS 591 – Semester Project December 07, 2005.
1 Pfleeger Visit 4/13/2004 UCCS Network/System Security C. Edward Chow Xiaobo Joe Zhou Yu Cai Ganesh Godavari Department of Computer Science University.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Secure Collective Internet Defense (SCID) Yu Cai 05/30/2003
Enhanced Secure Dynamic DNS Update with Indirect Route David Wilkinson, C. Edward Chow, Yu Cai 06/11/2004 University of Colorado at Colorado Springs IEEE.
ChowSCOLD1 Secure Collective Internet Defense (SCOLD) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
Investigations into BIND Dynamic Update with OpenSSL by David Wilkinson.
1 Cybersecurity Symposium 9/19/2003 chow C. Edward Chow Yu Cai Dave Wilkinson Department of Computer Science University of Colorado at Colorado Springs.
Design of an Autonomous Anti-DDOS Network (A2D2) Angela Cearns Thesis Defense Thursday October 24, 2002 Master of Software Engineering Department of Computer.
1 DACAManet Proposer’s Workshop UCCS-Raytheon Terry Boult C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs Leland.
1 Security Research 2/7/2003 chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department of.
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : ,
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
FIREWALL Mạng máy tính nâng cao-V1.
1 Security Research 1/10/2003 chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department of.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
1 ITS-ZeeWave Meeting 2/26/2004 UCCS Chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department.
Distributed Denial of Service Attacks
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Outline of the Talk UCCS CS Programs/Network Security Lab Brief Overview of Distributed Denial of Services (DDoS) Intrusion Tolerance with Multipath Routing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Chapter 1: Explore the Network
SIEM Rotem Mesika System security engineering
Firewall Technology Planning and Implementation
C. Edward Chow Department of Computer Science
Network Security Solution
Top 5 Open Source Firewall Software for Linux User
University of Maryland College Park
Chapter 1 Communication Networks and Services
Distributed Denial of Service Attacks
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
An Overview of the ITTC Networking & Distributed Systems Laboratory
INTRODUCTION TO COMPUTER NETWORKS
Introduction to the course
Dynamic Process Allocation in Apache Server
Lecture 1 Overview of Communication Networks and Services
Distributed Denial of Service Attacks
Intrusion Detection system
Distributed Denial of Service Attacks
Session 20 INST 346 Technologies, Infrastructure and Architecture
Implementing Firewalls
Chapter 8 – Data switching and routing
Presentation transcript:

Security Related Research Projects at UCCS Network Research Lab C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs

Outline of the Talk Brief Introduction to the Network/Protocol Research Lab at UCCS Network security related research projects at UCCS Network/Protocol Research Lab Autonomous Anti-DDoS Project Secure Collective Defense Project BGP/MPLS based VPN Project Discussion on AFA-UCCS Joint Research/Teaching Projects on Information Assurance Penetration Analysis/Testing exercises? Intrusion Detection/Handling exercises? Other Cyberwarfare related projects? Security Form/Seminar Series

UCCS Network Research Lab Personnel: Director: Dr. C. Edward Chow Graduate students: Chandra Prakash: High Available Linux kernel-based Content Switch Ganesh Godavari: Linux based Secure Web Switch Angela Cearns: Autonomous Anti-DDoS (A2D2) Testbed Longhua Li: IXP-based Content Switch Yu Cai (Ph.D. research assistant): Multipath Routing Jianhua Xie (Ph.D.): Secure Storage Networks Frank Watson: Content Switch for Email Security Paul Fong: Wireless AODV Routing for sensor networks Nirmala Belusu: Wireless Network Security PEAP vs. TTLS David Wikinson/Sonali Patankar: Secure Collective Defense Murthy Andukuri/Jing Wu: Enhanced BGP/MPLS-based VPN Patricia Ferrao: Web-based Collaborative System Support

UCCS Network Lab Setup Gigabit fiber connection to UCCS backbone Switch/Firewall/Wireless AP: HP 4000 switch; 4 Linksys/Dlink Switches. Sonicwall Pro 300 Firewall 8 Intel 7112 SSL accelerators; 4 7820 XML directors donated by Intel. Cisco 1200 Aironet Dual Band Access Point and 350 client PC/PCI cards (both 802.11a and 802.11b cards). Intel IXP12EB network processor evaluation board Servers: Two Dell PowerEdge Servers. Workstations/PCs: 8 Dell PCs (3Ghz-500Mhz); 12 HP PCs (500-233Mhz) 2 laptop PCs with Aironet 350 for mobile wireless OS: Linux Redhat 8.0; Window XP/2000

HP4000SW Gigibit Fiber to UCCS Backbone& Workstation Dell Server Intel IXP Network Processor

Intel 7110 SSL Accelerators 7280 XML Director

DDoS: Distributed Denial of Service Attack DDoS Victims: Yahoo/Amazon 2000 CERT 5/2001 DNS Root Servers 10/2002 DDoS Tools: Stacheldraht Trinoo Tribal Flood Network (TFN)

How wide spread is DDoS? Research by Moore et al of University of California at San Diego, 2001. 12,805 DoS in 3-week period Most of them are Home, small to medium sized organizations

Intrusion Related Research Areas Intrusion Prevention General Security Policy Ingress/Egress Filtering Intrusion Detection Anomaly Detection Misuse Detection Intrusion Response Identification/Traceback/Pushback Intrusion Tolerance

Security Related Research Projects Secure Content Switch Autonomous Anti-DDoS Project Deal with Intrusion Detection and Handling; Techniques: IDS-Firewall Integration Adaptive Firewall Rules Easy to use/manage. Secure Collective Defense Project Deal with Intrusion Tolerance; How to tolerate the attack Techniques (main ideaExplore secure alternate paths for clients to come in) Multiple Path Routing Secure DNS extension: how to inform client DNS servers to add alternate new entries Utilize a consortium of Proxy servers with IDS that hides the IP address of alternate gateways. BGP/MPLS based VPN Project Content Switch for Email Security.

Design of an Autonomous Anti-DDOS Network (A2D2) Graduate Student: Angela Cearns Goals: Study Linux Snort IDS/Firewall system Develop Snort-Plug-in for Generic Flood Detection Investigate Rate Limiting and Class Based Queueing for Effective Firewall Protection Intrusion Detection automatically trigger adaptive firewall rule update. Study QoS impact with/without A2D2 system. http://cs.uccs.edu/~chow/pub/master/acearns/doc/

A2D2 Multi-Level Adaptive Rate Limiting

A2D2 QoS Results - Baseline Playout Buffering to Avoid Jitter 10-min Video Stream between Real Player & Real Server Packets Received: Around 23,000 (23,445) No DDoS Attack QoS Experienced at A2D2 by Real Player Client with No DDoS

A2D2 Results – Non-stop Attack Packets Received: 8,039 Retransmission Request: 2,592 Retransmission Received: 35 Lost: 2,557 Connection Timed-out Lost of Packets QoS Experienced at A2D2 Client

A2D2 Results – UDP Attack Mitigation: Firewall Policy Packets Received: 23,407 Retransmission Request: 0 Retransmission Received: 0 Lost: 0 Look like we just need plain old Firewall rules, no fancy Rate Limiting/CBQ? QoS Experienced at A2D2 Client

A2D2 Results – ICMP Attack Mitigation: Firewall Policy Packets Received: 7,127 Retransmission Request: 2,105 Retransmission Received: 4 Lost: 2,101 Connection Timed-out Just plain old firewall rule is not good enough! Packet/Connection Loss QoS Experienced at A2D2 Client

A2D2 Results – TCP Attack Mitigation: Policy+CBQ Turn on CBQ Packets Received: 22,179 Retransmission Request: 4,090 Retransmission Received: 2,641 Lost: 1,449 Screen Quality Impact! Look OK But Quality Degrade QoS Experienced at A2D2 Client

A2D2 Results – TCP Attack Mitigation: Policy+CBQ+RateLimiting Turn on Both CBQ & Rate Limiting Packets Received: 23,444 Retransmission Request: 49 – 1,376 Retransmission Received: 40 – 776 Lost: 9 – 600 No image quality degradation QoS Experienced at A2D2 Client

A2D2 Future Works Extend to include IDIP/Pushback Anomaly Detection Improve Firewall/IDS Processing Speed Scalability Issues Tests with More Services Types Tests with Heavy Client Traffic Volume Fault Tolerant (Multiple Firewall Devices) Alternate Routing

Wouldn’t it be Nice to Have Alternate Routes? net-a.com net-b.com net-c.com ... ... ... ... A A A A A A A A DNS3 DNS1 DNS2 R R R How to reroute clients traffic through R1-R3? R DNS R2 R1 R3 Alternate Gateways DDoS Attack Traffic Client Traffic Victim

Implement Alternate Routes net-a.com net-b.com net-c.com ... ... ... ... A A A A A A A A DNS3 DNS1 DNS2 R R R Need to Inform Clients or Client DNS servers! But how to tell which Clients are not compromised? How to hide IP addresses of Alternate Gateways? R DNS R2 R1 R3 Alternate Gateways DDoS Attack Traffic Client Traffic Victim

Possible Solution for Alternate Routes DNS1 ... Victim A net-a.com net-b.com net-c.com DNS2 DNS3 R Sends Reroute Command with DNS/IP Addr. Of Proxy and Victim distress call Proxy1 Proxy2 Proxy3 Blocked by IDS R2 R1 R3 block Attack msgs blocked by IDS New route via Proxy3 to R3

Secure Collective Defense Main IdeaExplore secure alternate paths for clients to come in; Utilize geographically separated proxy servers. Goal: Provide secure alternate routes Hide IP addresses of alternate gateways Techniques: Multiple Path Routing Secure DNS extension: how to inform client DNS servers to add alternate new entries (Not your normal DNS name/IP address mapping entry). Utilize a consortium of Proxy servers with IDS that hides the IP address of alternate gateways. How to partition clients to come at different proxy servers?  may help identify the attacker! How clients use the new DNS entries and route traffic through proxy server?  Use Sock protocol, modify resolver library?

New UCCS IA Degree/Certificate Master of Engineering Degree in Information Assurance Certificate in Information Assurance (offered to Peterson AFB through NISSC) Computer Networks; Fundamental of Security; Cryptography; Advanced System Security Design

New CS691 Course on Advanced System Security Design Use Matt Bishop new Computer Security Text Spring 2003: With one class at UCCS; one at Peterson AFB. Potential use/cooperation with Distribute Security Lab of Ratheon? Integrate security research results into course material such as A2D2, Secure Collective Defense, MPLS-VPN projects. Invite speakers from Industry such as Innerwall and AFA? Looking for potential joint exercises with other institutions such as AFA.

Joint Research/Teaching Effort on Information Assurance Penetration Analysis/Testing exercises? Intrusion Detection/Handling exercises? Other Cyberwarfare related projects? Security Forum organized by Dean Haefner/Dr. Ayen Security Seminar Series with CITTI funding support Look for Speakers (suggestion?)