Gul Agha Michael Greenwald Carl Gunter Sanjeev Khanna

Slides:



Advertisements
Similar presentations
1 Data Link Protocols By Erik Reeber. 2 Goals Use SPIN to model-check successively more complex protocols Using the protocols in Tannenbaums 3 rd Edition.
Advertisements

Translation-Based Compositional Reasoning for Software Systems Fei Xie and James C. Browne Robert P. Kurshan Cadence Design Systems.
PROTOCOL VERIFICATION & PROTOCOL VALIDATION. Protocol Verification Communication Protocols should be checked for correctness, robustness and performance,
1 Formal Modeling and Analysis of DoS Using Probabilistic Rewrite Theories Gul Agha Michael Greenwald Carl Gunter Sanjeev Khanna Jose Meseguer Koushik.
Statistical Probabilistic Model Checking Håkan L. S. Younes Carnegie Mellon University.
Network Attacks Mark Shtern.
1 Staleness vs.Waiting time in Universal Discrete Broadcast Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex.
Formal Models of Availability Carl A. Gunter University of Pennsylvania (Soon to be the University of Illinois)
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Research Overview Carl A. Gunter University of Pennsylvania.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
VESTA: A Statistical Model- checker and Analyzer for Probabilistic Systems Authors: Koushik Sen Mahesh Viswanathan Gul Agha University of Illinois at Urbana-Champaign.
The Shared Channel Model for DoS Carl A. Gunter With Sanjeev Khanna, Kaijun Tan, and Santosh Venkatesh.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Uncovering the Multicore Processor Bottlenecks Server Design Summit Shay Gal-On Director of Technology, EEMBC.
BitTorrent Nathan Marz Raylene Yung. BitTorrent BitTorrent consists of two protocols – Tracker HTTP protocol (THP) How an agent joins a swarm How an agent.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Survey on Trace Analyzer (2) Hong, Shin /34Survey on Trace Analyzer (2) KAIST.
TCP/IP Vulnerabilities
Mitigating DoS Attack Through Selective Bin Verification Micah Sherr a, Michael Greenwald b, Carl A. Gunter c, Sanjeev Khanna a, and Santosh S. Venkatesh.
Adaptive Selective Verification Sanjeev Khanna, Santosh Venkatesh, UPenn Omid Fatemieh, Fariba Khan, Carl A. Gunter, UIUC IEEE INFOCOM 2008.
A Cost-Based Framework for Analysis of Denial of Service in Networks Author: Catherine Meadows Presenter: Ajay Mahimkar.
1 Validation of Security Protocols Joint work with Gul Agha, Michael Greenwald, Carl Gunter, Sanjeev Khanna, Darko Marinov, Jose Meseguer, Prasanna Thati,
Using Rhythmic Nonces for Puzzle-Based DoS Resistance Ellick M. Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, and Daniel Rebolledo University of.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
On the (im)possibility of perennial message recognition protocols without public-key cryptography Peeter Laud Cybernetica AS & University of Tartu
Sub-fields of computer science. Sub-fields of computer science.
Message Authentication Code
SDN and Security Security as a service in the cloud
Last Class: Introduction
Intrusion Tolerant Architectures
CPS 512 Distributed Systems
Reddy Mainampati Udit Parikh Alex Kardomateas
Secure Sockets Layer (SSL)
Packet Leashes: Defense Against Wormhole Attacks
Cryptographic Hash Function
By Gerardo García Peña dosis By Gerardo García Peña
Data Streaming in Computer Networking
Introduction to Networking
Information and Network Security
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Internet Networking recitation #12
CS4622: Computer Networking
Efficient Decentralized Monitoring of Safety in Distributed Systems
Koushik Sen Abhay Vardhan Gul Agha Grigore Rosu
Architecture of Parallel Computers CSC / ECE 506 Summer 2006 Scalable Programming Models Lecture 11 6/19/2006 Dr Steve Hunter.
Monkey See, Monkey Do A Tool for TCP Tracing and Replaying
Message Digest Cryptographic checksum One-way function Relevance
CS/ECE 418 Introduction to Network Security
A Cryptographic Defense Against Connection Depletion Attacks
A Cryptographic Defense Against Connection Depletion Attacks
SSL (Secure Socket Layer)
Generating Optimal Linear Temporal Logic Monitors by Coinduction
Statistical Model-Checking of “Black-Box” Probabilistic Systems VESTA
NETW4005 COMPUTER SECURITY - A
The Secure Sockets Layer (SSL) Protocol
July 2002 Threat Model Tim Moore Tim Moore, Microsoft.
Gul Agha Michael Greenwald Carl Gunter Sanjeev Khanna
On Statistical Model Checking of Stochastic Systems
Beacon Protection Date: Authors: July 2018 July 2018
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Rekeying Protocol Fix Date: Authors: Month Year
CIS 4930/6930 – Privacy-Preserving and Trustworthy Cyber-Systems Dr
Ch 17 - Binding Protocol Addresses
Beacon Protection Date: Authors: July 2018 July 2018
CSCE 715: Network Systems Security
Outline The spoofing problem Approaches to handle spoofing
Transport Layer 9/22/2019.
Presentation transcript:

Gul Agha Michael Greenwald Carl Gunter Sanjeev Khanna Formal Modeling and Analysis of DoS Using Probabilistic Rewrite Theories Gul Agha Michael Greenwald Carl Gunter Sanjeev Khanna Jose Meseguer Koushik Sen Prasanna Thati

Formal Analysis of Cryptographic Protocols Integrity and Confidentiality Recipient not fooled or leaks information algebraic techniques assumes idealized cryptographic primitives complexity-theoretic techniques based on complexity assumptions

Availability Attack Availability threats whether recipient available to valid sender algebraic and/or complexity theoretic methods are not suitable for finding availability threats assumes adversary can insert, delete, or replay messages availability attack is assured as the adversary can delete any valid packet

Availability Attack Availability threats whether recipient available to valid sender algebraic and/or complexity theoretic methods are not suitable for finding availability threats assumes adversary can insert, delete, or replay messages availability attack is assured as the adversary can delete any valid packet How to model and analyze availability formally?

Our Goal Given a protocol P, let properties T hold for P P is a traditional non-deterministic specification T is a set of integrity and confidentiality properties Extend P to P* and T to T* P* is DoS hardened P T* includes availability properties in addition to T Goal Prove that T* hold for P* without re-proving that T hold for P

? Our Results Given a protocol P, let properties T hold for P P is a traditional non-deterministic specification T is a set of integrity and confidentiality properties Extend P to P* and T to T* P* is DoS hardened P T* includes availability properties in addition to T Goal Prove that T* hold for P* without re-proving that T hold for P ?

Modeling and Analysis Probabilistic Rewrite Theories Unified Algebraic Model Probabilistic Object Model Properties in Continuous stochastic logic (CSL) Statistical Model-checking [Sen et al. CAV’04, CAV’05, QEST’05] using Monte Carlo simulation and statistical hypothesis testing QuaTEx Quantitative Temporal Expressions Query language to gain quantitative insight about a model Statistical computation of QuaTEx [QAPL’05]

DoS Models and Counter-measures “Shared Memory” model adversary cannot delete packet adversary can replay or insert message in the network “Asymmetry Paradigm” adversary attacks by recognizing: certain operations at recipient are expensive whereas invoking them is easy so it uses all of its bandwidth to invoke expensive operations creates a difference (asymmetry) receiver can increase the burden on attacker “selective verification” is our approach C Gunter, S Khanna, K Tan, S Venkatesh 2004

Selective Sequential Verification The signature stream is vulnerable to signature flooding: the adversary can devote his entire channel to fake signature packets Countermeasure : Valid sender sends multiple copies of the signature packet receiver checks each incoming signature packet with some probability (say, 25% or 1%)

Attack Profile A R S A loads this channel with bad packets S requires low b/w channel with high processing cost at R S

Selective Verification

Selective Verification A gets reduced channel R makes channels lossy A R S adds redundancy Tradeoff: bandwidth vs. processing S

TCP/IP: A case study Common Susceptible to DoS attacks: SYN flood and others Existing solutions as benchmark: Increase size of SYN cache, random drop, SYN cookies

TCP/IP: 3-way handshake A: valid sender B: valid receiver SYN SYN + ACK SYN Cache ACK

TCP/IP: SYN Flood Attack X: attacker A: valid sender B: valid receiver SYN SYN SYN Cache SYN Cache Full Packet Dropped

TCP/IP: SYN Flood Attack X: attacker A: valid sender B: valid receiver SYN Drop packet with probability 0.75 SYN SYN Cache SYN + ACK ACK M Delap, M Greenwald, C Gunter, S Khanna, Y Xu 2004

Standard Rewrite Theories rules are of the form t(x) ! t’ (x) if cond t’ t cond

Probabilistic Rewrite Theories (PRTh) we add probability information to rules t(x) ! t’(x,y) if cond with probability y:=(x) t t’ cond G Agha, J Meseguer, N Kumar, K Sen 2003

Model TCP/IP 3-way handshake using PRwTh Receiver: h B: buf , mi Message: (X Ã content) Rules: [drop packet]: h B: buf , mi (BÃ SYN(X,n)) ) h B: buf, mi [process packet]: h B: buf , mi (BÃ SYN(X,n)) ) h B: buf TCB(X,m) , m+1i (XÃ SYN-ACK(B,m))

Model TCP/IP 3-way handshake using PRwTh Receiver: h B: buf , mi Message: (X Ã content) One Rule (selective verification): h B: buf , mi (BÃ SYN(X,n)) ) if drop? then h B: buf, mi else h B: buf TCB(X,m) , m+1i (XÃ SYN-ACK(B,m)) fi with probability drop? := BERNOULLI(p) .

Availability Property Property: The probability that eventually the attacker X successfully fills up the SYN cache of B is less than 0.01. P<0.01[§(sucessful_attack())] Statistical Model-checking using Vesta model-checker K Sen, M Viswanathan, G Agha 2005

Tools PMaude: Extends Maude with probabilistic rewrite theories [QAPL’05] Monte Carlo simulation of probabilistic rewrite theories with on un-quantified non-determinism Vesta: Statistical model-checker for continuous stochastic logic [CAV’05] Java implementation

Results Cache-size = 10,000 timeout = 10 seconds number of valid senders = 100

Quantitative Queries Using QuaTEx What is the expected number of clients that successfully connect to S out of 100 clients? What is the probability that a client connected to S within 10 seconds after it initiated the connection request? CountConnected() = if completed() then count() else ° (CountConnected()) fi; eval E[CountConnected()]

Aggregate connections Linux Kernel Test Attack rate in SYNs/sec received at server Graph shows successful connections per 450 threads Defenseless kernel: >6 SYNs/sec shuts out client Aggregate connections Attack rate Model predicts cliff M Delap, M Greenwald, C Gunter, S Khanna, Y Xu 2004

Results Expected number of clients out of 100 clients that get connected with the server under DoS attack

Conclusion A general framework for modeling and verifying DoS properties of communication protocols. Capable of expressing and proving key availability properties. Performance limitations require us to use scaled down version of parameters. Future Work Addressing efficiency limitations Verifying the properties for general systems

Summary Given a protocol P, let properties T hold for P P is a traditional non-deterministic specification T is a set of integrity and confidentiality properties Extend P to P* and T to T* P* is DoS hardened P T* includes availability properties in addition to T Goal Prove that T* hold for P* without re-proving that T hold for P

SYN-flood defense: selective processing B: size of SYN-cache t : timeout 0 < f < 1 rX : attacker rate p : probability of processing SYN at B B rX <= f B/t, then (1-f)B slots reserved for legit clients M Delap, M Greenwald, C Gunter, S Khanna, Y Xu 2004

SYN-flood defense: selective processing B: size of SYN-cache t : timeout 0 < f < 1 rX : attacker rate p : probability of processing SYN at B p B rX <= f B/t, then (1-f)B slots reserved for legit clients Process SYNs with probability p <= f B/(t rX) M Delap, M Greenwald, C Gunter, S Khanna, Y Xu 2004

SYN-flood defense: selective processing B: size of SYN-cache t : timeout 0 < f < 1 rX : attacker rate p : probability of processing SYN at B X 1/p Limited by net capacity. p B X 1/p rX <= f B/t, then (1-f)B slots reserved for legit clients Process SYNs with probability p <= f B/(t rX) Increase SYN packets sent by valid sender by 1/p M Delap, M Greenwald, C Gunter, S Khanna, Y Xu 2004

SYN-flood defense: selective processing B: size of SYN-cache t : timeout 0 < f < 1 rX : attacker rate p : probability of processing SYN at B rA p rA p B X 1/p rX <= f B/t, then (1-f)B slots reserved for legit clients Process SYNs with probability p <= f B/(t rX) Increase SYN packets sent by valid sender by 1/p Attacker rate of p rX cannot fill more than f B slots M Delap, M Greenwald, C Gunter, S Khanna, Y Xu 2004