Should the IETF do anything about DDoS attacks?

Slides:



Advertisements
Similar presentations
Nicholas Weaver International Computer Science Institute
Advertisements

Why Is DDoS Hard to Solve? 1.A simple form of attack 2.Designed to prey on the Internet’s strengths 3.Easy availability of attack machines 4.Attack can.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
2005 Stanford Computer Systems Lab Flow Cookies Bandwidth Amplification as Flooding Defense Martin Casado, Pei Cao Niels Provos.
Criticisms of I3 Jack Lange. General Issues ► Design ► Performance ► Practicality.
A DoS-Limiting Network Architecture Presented by Karl Deng Sagar Vemuri.
Security Forum 2001John Kristoff - DePaul University1 Network Firewalls John Kristoff DePaul University Chicago, IL
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
DoS-resistant Internet - progress Bob Briscoe Jun 2005.
John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff
Towards a More Functional and Secure Network Infrastructure Dan Adkins, Karthik Lakshminarayanan, Adrian Perrig (CMU), and Ion Stoica.
A DoS Limiting Network Architecture An Overview by - Amit Mondal.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Whither Congestion Control? Sally Floyd E2ERG, July
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Controlling Internet Quality with Price Market Managed Multiservice Internet Bob Briscoe BT Research, Edge Lab, University College London & M3I Technical.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Firewall Security.
Achieving good end-to-end service using Bill-Pay Cristian Estan, Aditya Akella, Suman Banerjee Univ. of Wisconsin - Madison.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
1 Defense Strategies for DDoS Attacks Steven M. Bellovin
Solving this Internet resource sharing problem... and the next, and the next Bob Briscoe Chief Researcher BT Group (& UCL) Lou Burness, Toby Moncaster,
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Deployable Filtering Architectures Against Denial-of-Service Attacks Department of Computer Science University College London Telephone: +44 (0)
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
DDoS In the Real World Do DDoS attacks really happen?
Multipath TCP and the Resource Pooling Principle
Inter domain signaling protocol
Revisiting Ethernet: Plug-and-play made scalable and efficient
Distributed Denial of Service (DDoS) Attacks
Computer Data Communications
Defending Against DDoS
DDoS In the Real World Do DDoS attacks really happen?
Filtering Spoofed Packets
Bob Briscoe, BT Murari Sridharan, Microsoft IETF-84 ConEx Jul 2012
Understanding the OSI Reference Model
Who should be responsible for risks to basic Internet infrastructure?
CONEX BoF.
A DoS-limiting Network Architecture
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
IPv6: Are we really ready to turn off IPv4?
Guide to TCP/IP Fourth Edition
Software Defined Networking (SDN)
AKAMAI INTELLIGENT PLATFORM™
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
DDoS Attack and Its Defense
Resource Negotiation, Pricing and QoS
ITIS 6167/8167: Network and Information Security
Outline The spoofing problem Approaches to handle spoofing
Outline Why is DDoS hard to handle?
Distributed Denial of Service (DDoS) Attacks
Outline The concept of perimeter defense and networks Firewalls.
DetNet Architecture Updates
Presentation transcript:

Should the IETF do anything about DDoS attacks? Mark Handley

The Problem The Internet architecture was designed to delivery packets to the destination efficiently. Even if the destination does not want them. Congestion control and flow control are our mechanisms to match offered load to available capacity. They’re transport-level functions. If the sender misbehaves, they’re useless. An attacker that can compromise thousands of end systems can muster enough firepower to overwhelm most victims.

Should the IETF do anything about DDoS? Really two questions: Can the IETF do anything about DDoS? Does anyone care enough to spend money on solutions?

Can the IETF do anything about DDoS? Search Google Scholar for “DDoS”: ~8000 hits. No shortage of “solutions”. It’s starting to become clear there is no “magic bullet”. No single solution will come along and save us (short of redesigning the Internet from scratch). However, DDoS is not like getting compromised. There’s no such thing as a “little bit compromised”. DDoS defense is progressive; it’s a cost/benefit tradeoff. Goal should be to raise the bar for successful attacks.

Examples of Raising the Bar Require more firepower for a successful attack Fewer attacks from a fixed bot pool. Make bot herders easier to track down (fewer but larger botnets, so can devote more resources to each). Prevent spoofing. Make bots easier to track down. Prevent reflection attacks. Enforce congestion control. Bots only get their share. Provide automated filtering of flows at the source. If the receiver can tell a host is bad, it can shut down traffic from it.

Goal for IETF? Force an attacker to make his traffic indistinguishable from a flash crowd. Essentially, move the attack up the stack. Different applications must them tackle the problem using their own application-specific mechanisms. CAPTCHAS, proof-of-work, authorization mechanisms, good application design, etc. Billing for congestion.

Is anyone willing to pay? Are the costs of DDoS great enough to merit additional expense? Depends who has to pay. Depends how expensive it is.

Is anyone willing to pay? For the victims: DDoS is very expensive. Direct loss of business. Collatoral damage for edge ISPs. Often just disconnect the victim. Scrubbing solutions work, up to a point, for dumb attacks at lower bandwidths. Victim bears the cost. For the source ISPs: fairly significant costs. Manual cleanup of bots is expensive. Many ISPs don’t even go looking for bots on their networks. For transit ISPs: often just more paying packets.

Opportunity costs Ever increasing demands are being placed on the Internet. Internet telephone. Internet television. Critical infrastructure. Food supply Banking Utility management. Options (pick one): The Internet gets robust enough to justify these demands. The demands will be met by parallel networks at increased costs. A large, well resourced DDoS attack will cause huge economic damage (and perhaps worse) at some point in the next decade.

Legislation After the Estonia attacks, governments are starting to wonder if they can legislate solutions. Best way to avoid a mess of inconsistent, incompatible, and ill-thought-out legislation is to solve the problem first. Need to be very careful the medicine isn’t worse than the disease.

Architectural Ossification The net is already hard to change in the core. IP Options virtually useless for extension. Slow-path processed in fast hardware routers. NATs make it hard to deploy many new applications. Firewalls make it make to deploy anything new. But the alternative seems to be worse. Now consider the effect of DoS mitigation solutions....

Extrapolation of current trends does not bode well.... The Big Challenges How can we mitigate DDoS attacks and other security threats without sacrificing the future? How to enable application innovation? How to provide robust network services in the face of attack? Extrapolation of current trends does not bode well....

Future: “The Intelligent Network” Network “understands” clients, controls “bad” traffic. Network-based application recognition Deep packet inspection Network admission control Packet scrubbing Define and control policy for different classes of traffic Security policy QoS policy

Architectural Solutions Can we change the Internet architecture in such a way that the low-level easy attacks become hard/impossible? Tilt the balance of power towards the victim? Prevent bandwidth flooding? Prevent spoofing and reflection attacks? Provide safe automated pushback mechanisms? Preserve the general-purpose nature of the Internet to allow future innovation.

Two examples. Automated filtering framework. Terminus (Felipe Huici, Mark Handley) Improved congestion management framework Re-feedback, Re-ECN (Bob Briscoe) These are intended as examples. I know them well. I think they might be deployable. Others will no doubt have other solutions.

Example 1: Terminus General idea detect filter Internet A S ISP ISP General idea Identify attack traffic at destination Request that traffic be filtered Block attack traffic at source ISP’s filtering box Pretty obvious idea… But how to do this robustly and with minimum mechanism?

Terminus Architecture ISP A ISP C Internet BM C A S BP IDS FM Block A ISP B IDS = intrusion detection BP = border patrol BM = border manager FM = filter manager

Preventing spoofing Need to know real origin of attack packets Must send filter request to the right place IP source address of attack traffic may be spoofed. Dumb idea: Add a “true-source” bit to packets Only Terminus ISPs with ingress filtering can set bit Can’t we spoof true-source bit? Leads to last bullet.

Preventing True-Source Bit Spoofing Edge router at Terminus ISP connected to legacy ISP unsets this bit for all packets Router E1 ISP A ISP E TS = 0 Router G1 ISP B Router E2 Mention pairwise agreements, that’s how edge routers know how to set bit. ISP G S TS = 0 Router F1 ISP C Router G2 ISP F ISP D Terminus ISP Legacy ISP Router F2

Incremental deployment During initial stages, legacy ISPs will be the norm Use true-source bit to prioritize traffic at the destination ISP’s peering routers Implement true-source “bit” as a diffserv code point Legacy ISP A ISP C ISP D A TS = 0 R1 Router D1 R3 S ISP B TS = 1 R2 C prioritize

Details, details Lots of additional details: Where to send filtering requests? How to prevent spoofed traffic shutting down legit traffic? How to preventing spoofed requests? How to avoid reflection attacks from legacy ISPs? Details here: Terminus: god of boundaries http://www.cs.ucl.ac.uk/staff/F.Huici/publications/terminus-lsad.pdf

Summary: Terminus is cheap and effective. Only needed at the edges. Can do filtering at more than 1Gb/s with minimum sized packets in cheap off-the-shelf 1u rack-mount servers. Should really just be a standard edge-router feature Most have the forwarding plane capability. Just need the control protocol additions. Our test implementation can filter a million node botnet in a few tens of seconds. Bottleneck is likely to be how fast you can identify bots.

Re-feedback (Briscoe) General strategy: Tackle flooding attacks as part of a larger incentive framework. Routers provide explicit information about congestion levels by decrementing a congestion field in packets. Feedback explicit information about downstream congestion to the data sender. Data sender-reinserts this feedback information into the packets. Goal is for the sender to set the field correctly so the remaining value is zero at the receiver. Policy at ingress and egress to provide incentive for sender to send at the correct rate for the network congestion level.

Incentive framework downstream path metric, ρi congestion pricing routing i policer /scheduler dropper Snd Rcv

Summary: re-feedback Long-term approach to re-architecting the congestion-control framework for the Internet. Nice alignment of incentive with mechanism Pushes the costs for misbehaviour towards the origin network of the malicious traffic, but provides the mechanism to throttle it. Incremental deployment should be possible, though longer term than Terminus. See proposals on Re-ECN. Re-ECN bar-BOF here in Chicago.

Should the IETF do anything about DDoS? Who else will? Effective solutions requires protocol changes. That’s our business. Doing nothing: Hurts everyone through deployment of changes that harm innovation. Costs real money in both mitigation and workarounds. Risks legislated solutions.

The enemy of the good is the perfect - Voltaire We can raise the bar for DDoS attackers. There are technical solutions that would help. There seem economically feasible. The only way to find out is to try.