IP Traceback in Cloud Computing Through Deterministic Flow Marking Mouiad Abid Hani Presentation figures are from references given on slide 21. By Presented.

Slides:



Advertisements
Similar presentations
CS 265 – Project IPv6 Security Aspects Surekha Shinde.
Advertisements

IPv6 Keith Wichman. History Based on IPv4 Based on IPv4 Development initiated in 1994 Development initiated in 1994.
IPv6 Overview Brent Frye EECS710. Overview Google Drive Microsoft Cloud Drive Dropbox Paid-for alternatives 2.
The Future of TCP/IP Always evolving: –New computer and communication technologies More powerful PCs, portables, PDAs ATM, packet-radio, fiber optic, satellite,
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Defending against Large-Scale Distributed Denial-of-Service Attacks Department of Electrical and Computer Engineering Advanced Research in Information.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
1 K. Salah Module 5.2: Internet Protocol CO vs. CL protocols IP Features –Fragmentation –Routing IP Datagram Format IPv6.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Introduction to IP Traceback 交通大學 電信系 李程輝 教授. 2 Outline  Introduction  Ingress Filtering  Packet Marking  Packet Digesting  Summary.
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 1 Agenda Last time: finished brief overview.
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
Internet Protocol (IP)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Pi : A Path Identification Mechanism to Defend against DDos Attacks.
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
PARALLEL TABLE LOOKUP FOR NEXT GENERATION INTERNET
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Traceback Pat Burke Yanos Saravanos. Agenda Introduction Problem Definition Traceback Methods  Packet Marking  Hash-based Conclusion References.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
6LoWPAN (Introduction, Problem Statement & Goals) Nandakishore Kushalnagar Intel Corporation.
Chapter 4 Application Level Security in Cellular Networks.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Traceback Pat Burke Yanos Saravanos. Agenda Introduction Problem Definition Benchmarks and Metrics Traceback Methods  Packet Marking  Hash-based Conclusion.
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
Trajectory Sampling for Direct Traffic Oberservation N.G. Duffield and Matthias Grossglauser IEEE/ACM Transactions on Networking, Vol. 9, No. 3 June 2001.
Open-Eye Georgios Androulidakis National Technical University of Athens.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Packet-Marking Scheme for DDoS Attack Prevention
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring Presented by: Dedicated Instructor: Hiteshkumar Thakker.
By Rod Lykins.  Brief DDoS Introduction  Packet Marking Overview  Other DDoS Defense Mechanisms.
A Bandwidth Estimation Method for IP Version 6 Networks Marshall Crocker Department of Electrical and Computer Engineering Mississippi State University.
Speaker: Yi-Lei Chang Advisor: Dr. Kai-Wei Ke 2012/05/15 IPv6-based wireless sensor network 1.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
DoS/DDoS attack and defense
Efficient AS DoS Traceback (Autonomous System) Mohammed Alenezi, Martin J Reed Computer Applications Technology (ICCAT), 2013 張業正
Spoofing Prevention Method Srikanth T.S.S. Sri Lakshmi Ramya S.
Chapter 3 TCP and IP 1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet.
Introduction to IP Traceback 交通大學 電信系 李程輝 教授 2004/3/26.
Network Support For IP Traceback Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson University of Washington- Seattle, WA Slides originally byTeng.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Internet Protocol Version 6 Specifications
Chapter 3 TCP and IP Chapter 3 TCP and IP.
“Practical Network Support for IP Traceback”
Defending Against DDoS
IPv6 / IP Next Generation
Internet Protocol (IP)
Defending Against DDoS
Tracing Cyber Attacks Areej Al-Bataineh
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
DDoS Attack and Its Defense
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

IP Traceback in Cloud Computing Through Deterministic Flow Marking Mouiad Abid Hani Presentation figures are from references given on slide 21. By Presented

Introduction IP traceback problem –The problem of identifying the source of the offending packets (DoS and DDoS attacks) –Source: zombie; reflector; spoofed addresses …etc. Solution –Rely on the routers (PPM) Only for DOS –Rely on the ingress routers only (DPM and DFM) for DDoS and DoS. –Centralized management (log of packet infor.) Large overhead, complex, not scalable

DoS and DDoS Attacks

Why Cloud Computing? Cloud Computing is Traditional Distributed Environment (TDE). Cloud Computing is vulnerable to any attack targeting TDEs. DoS and DDoS are targeting TDEs. DoS and DDoS targeting the availability of a service. The Cost in cloud computing will be greater.

Deterministic Packet Marking (DPM) Each packet is marked when it enters the network Only mark Incoming packets Mark : address information of this interface 16 bit ID + 1 bit Flag

Coding of a mark Flag =0  address bits 0~15 Flag =1  address bits 16~31 Randomly setting flag value How many packet are enough ? –n : the number of received packets –The probability of successfully generate the ingress IP address is greater than –2 packets  75% ; 4 packets  93.75% 6 packets  98.43% ; 10 packets  99.9% 6 packets  98.43% ; 10 packets  99.9%

Pros Simple to implement Introduces no bandwidth Practically no processing overhead suitable for a variety of attacks [not just (D)DoS] Backward compatible with equipment which does not implement it does not have inherent security flaws Do not reveal internet topology No mark spoofing Scalable

Schematics Pad Ideal hash

Reconstruction Area Area each area has k segments Each segment has bits area

DPM Limitations DPM Limitations Can not handle the fragmentation/ reassembly problem All packets need to be marked Can trace the attack only to ingress router Can handle up to 2058 attack sources Does not support IPv6 implementation

Deterministic Flow Marking Based on DPM Only the first K packets need to be marked Can trace the attack to the attacker’s node Can handle up to 64K attack sources Does not support IPv6 implementation Can not handle subverted router problem

DPM VS. DFM

Identifiers used by DFM

Using the gray fields as marking field in IP header for K=2

DFM Limitations DFM Limitations Can not handle the fragmentation/ reassembly problem Does not support IPv6 implementation Using 42-byte signature to authenticate the whole flow

The Proposed Solutions Using the IPv6 header Flow Label field to hold the mark Using MD4 algorithm instead of elliptic curve signature within the packet (not assured till now). The fragmentation/reassembly problem is not an issue in IPv6 protocol.

Conclusion DFM is more practical and efficient than DPM DFM and DPM can not prevent DDoS attack but try to trace the source of it DFM need some improvements to be fully applicable on Intrusion Detection Systems.

I have questions …

References Vahid A. F. Nur A. Zincir-Heywood, “IP traceback through (authenticated) deterministic flow marking: an empirical evaluation”, EURASIP Journal on Information Security, Vol. 1, No. 5, pp. 1-24, Xiang, Y., W. Zhou and M. Guo, “Flexible deterministic packet marking: An IP traceback system to find the real source of attacks”, IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 4, pp , Andrey Belenky and Nirwan Ansari, “IP Traceback with Deterministic Packet Marking”, IEEE COMMUNICATIONS LETTERS, VOL. 7, NO. 4, pp: , Andrey Belenky and Nirwan Ansari, “Tracing Multiple Attackers with Deterministic Packet Marking (DPM)”, pp: 49-52, Vahid A. F. Nur A. Zincir-Heywood, “On Evaluating IP Traceback Schemes: A Practical Perspective”, IEEE Communications, Pp: