DFence: Transparent Network- based Denial of Service Mitigation Ajay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick Vin, Yin Zhang University of Texas.

Slides:



Advertisements
Similar presentations
IUT– Network Security Course 1 Network Security Firewalls.
Advertisements

Transmission Control Protocol (TCP)
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 A TCAM-based solution for integrated traffic anomaly detection and policy filtering Author: Zhijun Wang, Hao Che, Jiannong Cao, Jingshan Wang Publisher:
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Security - Systems Design Considerations. Layer 2 Design L2 Control protocols q, STP and ARP 802.1q for Ethernet switches to exchange VLAN info.
Firewalls and Intrusion Detection Systems
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
1 Web Proxies Dr. Rocky K. C. Chang 6 November 2005.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
FIREWALL Mạng máy tính nâng cao-V1.
Sales Kickoff - ARCserve
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
TCP/IP Vulnerabilities
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Bishop: Chapter 26 Network Security Based on notes by Prashanth Reddy Pasham.
TCP Security Vulnerabilities Phil Cayton CSE
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
DoS/DDoS attack and defense
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
© 2002, Cisco Systems, Inc. All rights reserved..
Transport Layer1 TCP Connection Management Recall: TCP sender, receiver establish “connection” before exchanging data segments r initialize TCP variables:
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Denial-of-Service Attacks
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
An Introduction To ARP Spoofing & Other Attacks
Network Anti-Spoofing with SDN Data plane Authors:Yehuda Afek et al.
Introduction to Networking
Preventing Internet Denial-of-Service with Capabilities
COS 561: Advanced Computer Networks
* Essential Network Security Book Slides.
0x1A Great Papers in Computer Security
Firewalls Purpose of a Firewall Characteristic of a firewall
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Session 20 INST 346 Technologies, Infrastructure and Architecture
TCP Connection Management
Presentation transcript:

dFence: Transparent Network- based Denial of Service Mitigation Ajay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick Vin, Yin Zhang University of Texas at Austin

The Problem Denial of Service (DoS) attacks –A significant threat to Internet reliability & availability –Many forms – SYN flood, Data flood, NAPTHA, HTTP request flood, Botnet Lots of research and commercial products –Speak-up, SIFF, Kill-botz, TVA, Pushback, Cisco Guard, Arbor, … Yet, lots of attacks still out there –Feb DDoS attack on 6 of 13 root DNS servers –Domain registrar GoDaddy.com was DDoSed (March 2007)

dFence Principles Transparency –No software modifications to end-hosts or routers In-Network defense –Filter attack traffic before it gets close to server Shared on-demand infrastructure –Multiplex defense resources to protect multiple customers –No performance penalty during peace time Stateful mitigation –Necessary for effective defenses against a broad range of DoS attacks

dFence Overview Customer Network under protection Internet Service Provider Other Customer Networks Attack Detected Distributed Set of Middleboxes Only Good traffic Apply stateful filtering

Challenges Bidirectional Traffic Interception Attack Mitigation Functionality Dynamic State Management Robustness to route changes, failures and DoS attacks on middleboxes

Outline Bidirectional Traffic Interception Attack Mitigation FunctionalityAttack Mitigation Functionality Dynamic State ManagementDynamic State Management

Inbound Traffic Interception

Internet Service Provider Other Customer Networks / /24 Customer Network (D) under protection iBGP advertisements to attract only traffic going to the customer network under protection PBR rule /24 D (on internal) /24 R /24 R /24 R /24 M R1R1 R2R2 M Routing table Inbound Traffic Interception

Outbound Traffic Interception

Customer Network (D) under protection Other Customer Networks / /24 R1R1 R2R2 M PBR rule Src = /24 M (on external) Internet Service Provider Outbound Traffic Interception

Outline Bidirectional Traffic InterceptionBidirectional Traffic Interception Attack Mitigation Functionality Dynamic State ManagementDynamic State Management

Attack Mitigation at Middlebox Stateful policies are a good match for TCP-based attacks Careful creation of minimal state for connections Attack Classification Attack ExamplesState Requirement SpoofedSpoofed SYN Spoofed TCP data Reflector attacks Zero Un-spoofed mis-behaving NAPTHA Un-spoofed data flood Temporary Un-spoofed well-behaving Normal trafficLife-time of connection

An Example Policy Mitigating Spoofed Attacks –SYN flood: exhaust server resources by flooding it with bogus SYN requests –Network-based SYN cookie generation –Advantages over server-side Transparency Multiplexing

SYN Cookie [D. Bernstein] Client Server SYN C ACK S (Cookie+1) SYN S, ACK C (Seq# = Cookie) No state maintained Establish connection if cookie is correct Cookie is an unforgeable token

Network-based SYN Cookie Challenges –How to handle mismatch in sequence number generated by middlebox and server –How does middlebox handle data received from clients before its handshake with server is complete

What does not work Full TCP splicing with address / port / sequence / acknowledgement number translations –Increases state requirement at middlebox –Adds more processing burden Buffer data packets till handshake with server is complete –Opens door to another DoS attack Drop data packets till handshake with server is complete –Client enters TCP time-out and suffers 3 second delay

Client Server Middlebox SYN C SYN S, ACK C (Seq# = Cookie) Window = 0 ACK S (Cookie+1) SYN C SYN S, ACK C (Seq# = Value S ) SYN S, ACK C (Seq# = Cookie) Re-open window ACK S (Cookie+1) ACK S (Value S +1) Choke client Sequence # translation Acknowledgement # translation Un-choke client No State Maintained Verify cookie & establish state

Outline Bidirectional Traffic InterceptionBidirectional Traffic Interception Attack Mitigation FunctionalityAttack Mitigation Functionality Dynamic State Management

Middlebox introduction –How to capture state for ongoing connections ? –Naïve solution: terminate all ongoing connections and let clients start anew (not transparent!!) –Our solution Add grace period to transparently bootstrap state for ongoing connection –During bootstrap SYN cookies for new connection request Data packets (good or bad) are forwarded to the server State established for data packets for which ACK is seen

Dynamic State Management Middlebox removal –What about active connections established via middlebox ? –Naïve solution: terminate all and remove middlebox from the data path (not transparent!!) –Our solution Add grace period during which the connections established via middlebox undergo sequence and acknowledgement numbers translation New connection requests are forwarded to the server (no SYN cookies) No state established for new connections during the removal phase

Experimental Setup IXIA Packet Generator IXP End-hosts Cisco Switch XORP for Traffic Interception Intel IXP Network Processor for attack mitigation policies IXIA for attack workload, iperf/httperf for legitimate traffic

End-to-end Throughput Middlebox bootstrapped Attack started Throughput drops Middlebox removed Attack stopped Middlebox introduced Removal Phase Attack Mitigation PhaseBootstrap Phase: Spoofed SYN dropped, spoofed data forwarded

Conclusion dFence DoS mitigation system –Transparent solution –In-network defense –Shared on-demand infrastructure –Stateful mitigation Can be viewed as providing group insurance service General platform to deploy other network security services such as malware filtering

Thank You !

Backup Slides

Flow Pinning Why Pinning ? –Ensure both directions of flow go through the same middlebox –Ensure that the same middlebox handles the flow even when there are route changes / failures Pin the flow to a home middlebox –Home middlebox = hash 1 (src IP, src port) EXOR hash 2 (dest IP, dest port) –Symmetric

Bootstrap Interval T b Too high Severe damage during bootstrap phase Too low Ongoing connections may get terminated Trace analysis shows that majority of connections has packet IATs of the order a few seconds

XORP BGP Policy policy-statement next-hop-selection { term 1 { to { network4: /24 } then { localpref: 300 } } … protocols { bgp { … import “next-hop-selection” export “next-hop-selection” }

Middlebox Attacks & Defenses Exhausting the connection state –Defense: Limit number of connections from any single host Middlebox only maintains state for un-spoofed well-behaved sources Adaptive traffic variation attack –ON/OFF attack pattern –Defense: Avoid rapid introduction & removal of middleboxes Randomize the removal phase time interval Werewolf attack –Behave legitimate at first, get established in middlebox state and then bombard with attack traffic –Defense: Periodic measurement of traffic sending rates & source prefix white-listing

End-to-end latency