Pi: A Path Identification Mechanism to Defend Against DDoS Attacks

Slides:



Advertisements
Similar presentations
COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips.
Advertisements

Random Flow Network Modeling and Simulations for DDoS Attack Mitigation Jiejun Kong, Mansoor Mirza, James Shu, Christian Yoedhana, Mario Gerla, Songwu.
Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson University of Washington- Seattle, WA Presented by Mohammad Hajjat- Purdue University Slides.
MULTOPS A data-structure for bandwidth attack detection Thomer M. Gil Vrije Universiteit, Amsterdam, Netherlands MIT, Cambridge, MA, USA
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Oct 26, 2004CS573: Network Protocols and Standards1 IP: Routing and Subnetting Network Protocols and Standards Autumn
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Mitigating Bandwidth- Exhaustion Attacks using Congestion Puzzles XiaoFeng Wang Michael K. Reiter.
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
Path identification by hagay avraham the third Composers : Abraham Yaar,Adrian Perrig and Dawn Song.
Hash-Based IP Traceback Alex C. Snoeren, Craig Partidge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer.
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
Towards a More Functional and Secure Network Infrastructure Dan Adkins, Karthik Lakshminarayanan, Adrian Perrig (CMU), and Ion Stoica.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Pi : A Path Identification Mechanism to Defend against DDos Attacks.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Large-Scale IP Traceback in High-Speed Internet : Practical Techniques and Theoretical Foundation Jun (Jim) Xu Networking & Telecommunications Group College.
Trajectory Sampling for Direct Traffic Oberservation N.G. Duffield and Matthias Grossglauser IEEE/ACM Transactions on Networking, Vol. 9, No. 3 June 2001.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Packet-Marking Scheme for DDoS Attack Prevention
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
1 Defense Strategies for DDoS Attacks Steven M. Bellovin
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Hash-Based IP Traceback Alex C. Snoeren +, Craig Partridge, Luis A. Sanchez ++, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent and W. Timothy.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Network Support For IP Traceback Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson University of Washington- Seattle, WA Slides originally byTeng.
Jessica Kornblum DSL Seminar Nov. 2, 2001 Hash-Based IP Traceback Alex C. Snoeren +, Craig Partridge, Luis A. Sanchez ++, Christine E. Jones, Fabrice Tchakountio,
IP Spoofing. What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Network Security Lab Jelena Mirkovic Sig NewGrad presentantion.
Internet Indirection Infrastructure (i3)
Multicast Outline Multicast Introduction and Motivation DVRMP.
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Defending Against DDoS
Who should be responsible for risks to basic Internet infrastructure?
Single-Packet IP Traceback
IS3120 Network Communications Infrastructure
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
- Issues, Answers & A Comparison 江政祐 Henry, Cheng-You Chiang
Tracing Cyber Attacks Areej Al-Bataineh
Intradomain Routing Outline Introduction to Routing
Network Support For IP Traceback
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
An Update on Multihoming in IPv6 Report on IETF Activity
DDoS Attack and Its Defense
ITIS 6167/8167: Network and Information Security
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

Pi: A Path Identification Mechanism to Defend Against DDoS Attacks Abraham Yaar, Adrian Perrig, Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu Presented and Edited by Yongdae Kim

Outline DDoS Attack/Defense Review Goals/Main Idea Pi Marking Pi Filtering Experimental Results Discussion Conclusion

DDoS Review Attackers compromise network hosts, flood victim with packets Overload packet processing capacity Saturate network bandwidth Spoofed source IP addresses evade network filters Victim RA RX RB RC RY RZ U U A A A A

RFC 3514 Security flag in IP header Challenge: deployment By Steven Bellovin Attackers must set evil bit in malicious packets Receivers can filter out evil packets Challenge: deployment April fools joke Pi achieves similar property!

IP Traceback Defense Victim reconstructs attack tree from address fragments Disadvantages: Slow reconstruction Multi-path reconstruction Assumes upstream ISP collaboration Victim x 1 2 Y Z A 2 B 1 C x 1 Z 1 x 2 Y 1 x 2 Y 2 x 1 Z 2 RA RX C 1 2 Z 1 2 Y 1 2 B 1 RB RC RY RZ U U A A A A

Other Strategies Source Path Isolation Engine (SPIE) Routers store packet hashes, recursive query to reconstruct path Disadvantage Per-packet state at routers Pushback Framework Routers identify attack packet characteristics, install upstream filter Difficult to distinguish attack/user packets

Outline DDoS Attack/Defense Review Goals/Main Idea Pi Marking Pi Filtering Experimental Results Discussion Conclusion

Goals – Ideal DDoS Defense Fast Defense after single attack packet Victim filters traffic No dependency on upstream ISPs Overhead Minimal computation/state at routers and victims Interoperability Supports IP Fragmentation Incrementally deployable Additional deployment increases performance

Main Idea Path “fingerprints” Entire fingerprint in each packet Incrementally constructed by routers along path Victim rejects packets with attacker fingerprints (Pi-marks) Victim 3 1 2 4 7 6 RA RX i 1 i 2 i 4 i 6 i 3 i 4 i 7 i 3 i 4 i 6 i 3 i 4 i 7 i 1 i i 2 i 4 6 i 3 i 4 i 7 i 1 i 3 i 4 i 6 RB RC RY RZ U U A A A A 1 2 3 4 5 6 7

Main Idea Attacker Marks Path “fingerprints” Entire fingerprint in each packet Incrementally constructed by routers along path Victim rejects packets with attacker fingerprints (Pi-marks) Victim 3 1 2 4 7 6 Accepted Packets Attacker Marks Rejected Packets RA RX i 1 i 2 i 4 i 6 i 3 i 4 i 4 7 i i 3 i 4 6 i 3 i 4 i 7 i 1 i i 4 i 2 6 i 3 i 4 i 7 i 1 i 3 i 4 i 6 1 4 RB RC RY RZ 3 7 3 4 U U A A A A 1 2 3 4 5 6 7

Main Idea Attacker Marks Path “fingerprints” Entire fingerprint in each packet Incrementally constructed by routers along path Victim rejects packets with attacker fingerprints (Pi-marks) Victim 3 1 2 4 7 6 Accepted Packets Attacker Marks Rejected Packets RA RX C 1 2 Z 1 2 Y 1 2 4 1 4 7 3 B 1 3 7 RB RC RY RZ 3 4 U U A A A A 1 2 3 4 5 6 7

Main Idea Attacker Marks Path “fingerprints” 3 1 3 3 3 1 Path “fingerprints” Entire fingerprint in each packet Incrementally constructed by routers along path Victim rejects packets with attacker fingerprints (Pi-marks) Victim 3 1 2 4 7 6 Accepted Packets Attacker Marks Rejected Packets RA RX C 1 2 Z 1 2 Y 1 2 4 1 7 4 7 3 1 3 B 3 4 RB RC RY RZ U U A A A A 1 2 3 4 5 6 7

Outline DDoS Attack/Defense Review Goals/Main Idea Pi Marking Pi Filtering Experimental Results Discussion Conclusion

Pi Marking Scheme Marking Scheme Marking Function Marking Aggregation Each router marks n bits into IP Identification field Marking Function Last n bits of hash (eg. MD5) of router IP address Marking Aggregation Router pushes marking into IP Identification field

Pi Marking A π π π V Queue-based marking Routers “push” marking into IP Identification field Note: Victim’s local routers (in general, 3, 4 hopes) do not mark. A π π π V xx 00 xx 00 11 00 xx 11 10

Legacy Routers A π L π V Legacy routers do not mark Extensions Detect upstream legacy router Mark for previous legacy router Write-ahead improvement A π L π V xx 00 xx 00 xx 00 10

Path marking vs. Edge Marking Collision in path marking path(AC) = mamc, path(BC) = mbmc With probability 1/2n, ma = mb Edge marking path(AC) = ma’mc1, path(BC) = mb’mc2 where mc1 = h(IPC || IPA), mc2 = h(IPC || IPB) Still probability of collision is 1/2n But, new probability of having identical marks for two paths joining at the same node becomes 1/22n

Pi Marking - IP Fragmentation Problem Using deterministic values in IP Identification field breaks fragmentation Solution (suggested by Vern Paxson) Don’t mark packets that may ever get fragmented, or are fragments themselves Packets with DFT bit set Packets smaller than smallest MTU During DDoS attack, drop packets that do not have DFT bit set

Outline DDoS Attack/Defense Review Goals/Main Idea Pi Marking Pi Filtering Experimental Results Discussion Conclusion

Pi Filtering – Basic Scheme Drop all packets with Pi marks matching that of any attack packets Assumption Victim can identify attack packets Implementation Overhead Memory: Bit vector of length 216 (8kB) if (BitVec[PiMark] == 0) then accept() else drop(); Simple per packet lookup

Pi Filtering - Thresholds Problem Single attacker causes multiple users’ rejections Solution Assume, for a particular Pi mark, i: ai= number of attack packets ui= number of legitimate users’ packets Victim chooses threshold, t, such that if: then packets with Pi mark i are kept

Outline DDoS Attack/Defense Review Goals/Main Idea Pi Marking Pi Filtering Experimental Results Discussion Conclusion

Exp. Results – Attack Model Two phase DDoS model Phase 1: Learning Phase Omniscient victim, Filter Bootstrapping Limited Length (3 packets per endhost) Phase 2: Attack Phase Pi filter deployed “Unlimited” Length (3 packets simulated) Results presented for phase 2

Exp. Results - Setup Two Internet Topologies Internet Map Project 81,953 unique endhosts CAIDA Skitter Map 171,472 unique endhosts 5,000 Legitimate Users, 100-10,000 Attackers n = 2 bits 4 router non-marking ISP perimeter Victim ISP marks unnecessary/undesirable

Exp. Results - Metrics Filter Errors Acceptance Ratio False Positive: User packet dropped False Negative: Attacker packet accepted Acceptance Ratio Percent packets accepted by victim of total packets sent Attacker Acceptance Ratio = false negative rate User Acceptance Ratio = (1 – false positive rate)

Exp. Results – Basic Filter DDoS protection Accepted (with 10,000 unique attack paths): 60% of user traffic 17% attacker traffic Downward slope due to “marking saturation” All markings flagged as attacker

Exp. Results – 50% Threshold Filter Performance Thresholds Work! Accepted (with 10,000 unique attack paths): 82% of user traffic 22% attacker traffic Increased attack severity requires increased threshold

Exp. Results – Legacy Routers 50% threshold used Performance degradation is gradual Some filtering accuracy even at 50% legacy routers 0 = random selection 1 = perfect filter

Exp. Results – Limited Capacity Constraint Limit maximum number of packets accepted. Strategy Accept lowest attack traffic Pi marks first. Performance 60% server capacity for legitimate packets when total attack traffic 170X of user traffic. *Note: Each Attacker sends 10X traffic over legitimate user.

Outline DDoS Attack/Defense Review Goals/Main Idea Pi Marking Pi Filtering Experimental Results Discussion Conclusion

Other Applications Help other anti-DDoS techniques Pushback Filters that mask individual IP addresses can be very long Upstream path information improves filtering accuracy IP traceback path reconstruction IDS ISPs use Pi to detect IP address spoofing

Discussion: Deployment Incentives Lack of incentive for ingress filtering Pi provides incentive for ISP Customers benefit from Pi marking Attackers within ISP cause blocking of other ISP customers ISP has incentive to block attack Incentives for ingress filtering Market pressures drive Pi deployment Large-scale Internet sites > ISP > router manufacturer

Future Work Advanced marking schemes Advanced dynamic filters Use combination of exor and shift Advanced dynamic filters Problems: “Nearby” attackers always have attacker initialized bits in markings Route changes cause Pi mark variations Solution: Machine learning techniques identify marking commonalities (ie. Longest prefix matching for nearby attackers)

Related Work IP traceback itrace SPIE PEIP – Path Enhanced IP CS3-Inc. Adds 16 bytes path to each packet Router marks within 16 bytes path

Pi: Conclusions Disadvantages of current DDoS defenses Slow High overhead Assumes ISP collaboration Pi provides DDoS protection After first identified attack packet Minimal overhead at routers and endhosts Maintains IP Fragmentation No inter-ISP cooperation Great incremental deployment properties