5/18/2015 Samarpita Hurkute DDoS Defense By Offense 1 DDoS Defense by Offense Michael Walfish,Mythili Vutukuru,Hari Balakrishnan,David Karger,Scott Shenker.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Availability Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Aspects of Computer.
DDOS Defense by Offense OFFENSE Presented by: Anup Goyal Aojan Su.
DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker Presented by: Boris Kurktchiev and Kimberly.
DDoS: Defense by Offense 1 DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker, SIGCOMM ‘06 Presented.
1 DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, Scott Shenker, SIGCOMM ‘06 Presented by Lianmu Chen DDoS:
Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker Presented by Sunjun Kim, Donyoung Koo 1DDoS Defense by Offense.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
PERSISTENT DROPPING: An Efficient Control of Traffic Aggregates Hani JamjoomKang G. Shin Electrical Engineering & Computer Science UNIVERSITY OF MICHIGAN,
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Michael Walfish, Mythili Vutukuru, Hari Balakrishanan, David Karger, Scott Shankar DDos Defense by Offense.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
2005 Stanford Computer Systems Lab Flow Cookies Bandwidth Amplification as Flooding Defense Martin Casado, Pei Cao Niels Provos.
DDoS Defense by Offense Presented by: Matthew C.H. Ma Damon Chan.
Mitigating Bandwidth- Exhaustion Attacks using Congestion Puzzles XiaoFeng Wang Michael K. Reiter.
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
DDoS: Defense by Offense 1 DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker, SIGCOMM ‘06 Presented.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Kill-Bots: Surviving DDoS Attacks That Mimic Legitimate Browsing Srikanth Kandula Dina Katabi, Matthias Jacob, and Arthur Berger.
Network Attacks. Network Trust Issues – TCP Congestion control – IP Src Spoofing – Wireless transmission Denial of Service Attacks – TCP-SYN – Name Servers.
Lecture 15 Denial of Service Attacks
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
WEB ANALYTICS Prof Sunil Wattal. Business questions How are people finding your website? What pages are the customers most interested in? Is your website.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Micheal Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker Presented by Corey White.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
Final Introduction ---- Web Security, DDoS, others
--Harish Reddy Vemula Distributed Denial of Service.
POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
Computing Infrastructure for Large Ecommerce Systems -- based on material written by Jacob Lindeman.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Proxy Servers.
Withstanding Multimillion-Node Botnets Colin Dixon Arvind Krishnamurthy, Tom Anderson Affiliates Day, 2007.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang DDoS Defense by Offense Michael Walfish,
Mehmud Abliz, Taieb Znati, ACSAC (Dec., 2009). Outline Introduction Desired properties Basic scheme Improvements to the basic scheme Analysis Related.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Empirical Quantification of Opportunities for Content Adaptation in Web Servers Michael Gopshtein and Dror Feitelson School of Engineering and Computer.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Chapter 7 Denial-of-Service Attacks 7.1. Tấn công từ chối dịch vụ 7.1. Tấn công từ chối dịch vụ Bản chất của tấn công từ chối dịch vụ Bản chất của tấn.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Application Layer Attack. DDoS DDoS – Distributed Denial of Service Why would any one want to do this? In some cases, for bringing down service of competitors,
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
DDoS Defense by Offense1 Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., (MIT) and Shenker, S. (UC Berkeley), SIGCOMM ’06 Presented by Ivanka.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
Providing QoS in IP Networks
Distributed Denial of Service Yi Zhang April 26, 2016.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denial-of-Service Attacks
DDoS Attacks on Financial Institutions Presentation
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Your computer is the client
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 1 DDoS Defense by Offense Michael Walfish,Mythili Vutukuru,Hari Balakrishnan,David Karger,Scott Shenker

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 2 What is this paper about “Speak-up” a defense mechanism against application level DDoS. “Speak-up” a defense mechanism against application level DDoS. It’s a defense mechanism against legitimate looking requests that consume computational resources. It’s a defense mechanism against legitimate looking requests that consume computational resources. The server encourages clients to send higher volumes of traffic wherein the inflated traffic volume from good clients crowd out the bad ones. The server encourages clients to send higher volumes of traffic wherein the inflated traffic volume from good clients crowd out the bad ones.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 3 Introduction Application level DDoS – It is a noxious attack where in an “open clientele” environment the attacker forces the victim server to spend much of its resources on spurious requests. Application level DDoS – It is a noxious attack where in an “open clientele” environment the attacker forces the victim server to spend much of its resources on spurious requests. Carried over an ICMP link its effect is two-fold – First the servers resources are often depleted by “proper-looking”requests.Second the traffic is in-band so is harder to identify. Carried over an ICMP link its effect is two-fold – First the servers resources are often depleted by “proper-looking”requests.Second the traffic is in-band so is harder to identify.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 4 Introduction Examples of such attack – Using bots to attack web sites by : requesting large files,making queries of search engines and issuing computationally expensive requests. Examples of such attack – Using bots to attack web sites by : requesting large files,making queries of search engines and issuing computationally expensive requests. Approach to counter this attack is encourage all clients to speak … Approach to counter this attack is encourage all clients to speak …

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 5 Defenses used Detect and Block : Distinguish between good clients and bad clients.eg. Profiling IP address,rate limiting alone,CAPATCHA based defenses. Detect and Block : Distinguish between good clients and bad clients.eg. Profiling IP address,rate limiting alone,CAPATCHA based defenses. Charge clients some currency – An attacked server gives a client a services only after it pays some currency in form of CPU cycles and money. Charge clients some currency – An attacked server gives a client a services only after it pays some currency in form of CPU cycles and money.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 6 Mechanism Used In a speakup the “thinner” protects the server from overload and performs encouragements. In a speakup the “thinner” protects the server from overload and performs encouragements. When the server is overloaded the thinner causes each new client to automatically send a congestion controlled stream of dummy bytes on a separate payment channel. When the server is overloaded the thinner causes each new client to automatically send a congestion controlled stream of dummy bytes on a separate payment channel. When the server is ready to process requests the thinner selects a client that has sent the most bytes. When the server is ready to process requests the thinner selects a client that has sent the most bytes.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 7 Attacked Server with “speakup” and without “speakup”

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 8 Applicability of Speakup How much aggregate bandwidth does the legitimate client need for speakup to be effective ? How much aggregate bandwidth does the legitimate client need for speakup to be effective ? Could small Web sites eben when defended by speakup be harmed ? Could small Web sites eben when defended by speakup be harmed ? As bandwidth is a communal resource doesn't the encouragement to send more traffic damage the network ? As bandwidth is a communal resource doesn't the encouragement to send more traffic damage the network ?

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 9 Threat Model The attacker can send difficult requests intentionally. The attacker can send difficult requests intentionally. An attacker can repeatedly request service from a site while having different IP addresses. An attacker can repeatedly request service from a site while having different IP addresses.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 10 Conditions necessary for “Speakup” to be successful Adequate link bandwidth : enough bandwidth to handle incoming stream of requests.ISP’s which have significant bandwidth offering speakup as a service. Adequate link bandwidth : enough bandwidth to handle incoming stream of requests.ISP’s which have significant bandwidth offering speakup as a service. Adequate client bandwidth – the good clients must have totally the same number of magnitude bandwidth as the bad clients. Adequate client bandwidth – the good clients must have totally the same number of magnitude bandwidth as the bad clients. No pre defined clientele to avoid filtering to permit traffic from only known clients. No pre defined clientele to avoid filtering to permit traffic from only known clients. Non – human clientele – If clientele is exclusively human one may be able to use proof of humanity tests. Non – human clientele – If clientele is exclusively human one may be able to use proof of humanity tests. Unequal requests – Currency based approach can charge clients for harder requests Unequal requests – Currency based approach can charge clients for harder requests

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 11 Design of Speak Up Design Goal : If the good clients make g requests per second and have an aggregate bandwidth of G requests per second to the server and if the bad clients have aggregate bandwidth of B requests per second then the server should process good requests at a rate of min(g,(G/G+B)c) requests per second where c is the servers capacity to process requests. Design Goal : If the good clients make g requests per second and have an aggregate bandwidth of G requests per second to the server and if the bad clients have aggregate bandwidth of B requests per second then the server should process good requests at a rate of min(g,(G/G+B)c) requests per second where c is the servers capacity to process requests.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 12 Required mechanism Limit the requests to a server to c per second. Limit the requests to a server to c per second. Perform encouragement : cause a client to send more traffic Perform encouragement : cause a client to send more traffic Speak up needs a proportional allocation mechanism to admit client at rates proportional to their delivered bandwidth. Speak up needs a proportional allocation mechanism to admit client at rates proportional to their delivered bandwidth.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 13 Random drops and Aggressive tries The thinner implements proportional allocation by dropping requests at random to reduce the rate to c. The thinner implements proportional allocation by dropping requests at random to reduce the rate to c. For each request it drops it immediately asks the client to retry.This causes the good clients to retry at higher rates. For each request it drops it immediately asks the client to retry.This causes the good clients to retry at higher rates.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 14 Explicit payment channel The thinner asks clients to pad their requests with dummy bytes. The thinner asks clients to pad their requests with dummy bytes. The thinner asks the requesting client to send their requests over a separate payment channel. The thinner asks the requesting client to send their requests over a separate payment channel. When the server notifies the thinner it is ready to fire a new request it admits the client which has sent the most no. of padded dummy bytes. When the server notifies the thinner it is ready to fire a new request it admits the client which has sent the most no. of padded dummy bytes. However the drawback is good clients might have to pay a higher price for their requests. However the drawback is good clients might have to pay a higher price for their requests.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 15 Implementation A prototype thinner is implemented in C++. A prototype thinner is implemented in C++. It runs on Linux 2.6 exporting a well know URL. It runs on Linux 2.6 exporting a well know URL. When a web client requests this URL then thinner decides, if and when to send this request to the server. When a web client requests this URL then thinner decides, if and when to send this request to the server. When the server responds to that request the thinner returns HTML to the client with that response. When the server responds to that request the thinner returns HTML to the client with that response.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 16 Implementation If the server is busy the thinner returns the javaScript to the client.the client issues 2 responses : 1 is the actual request to the server and 2 is HHTP POST which holds the dummy bytes. If the server is busy the thinner returns the javaScript to the client.the client issues 2 responses : 1 is the actual request to the server and 2 is HHTP POST which holds the dummy bytes. The thinners delays responding the first HTTP because the server is busy and the second HTTP is the payment channel. The thinners delays responding the first HTTP because the server is busy and the second HTTP is the payment channel.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 17 Implementation If by sending dummy bytes the client wins, the thinner terminates the 2 nd request and passes on the clients 1 st request to the server. If by sending dummy bytes the client wins, the thinner terminates the 2 nd request and passes on the clients 1 st request to the server. If on the other had if the client has not yet received any service the thinner returns the Javascript which causes the browser to send another large POST and the process goes on. If on the other had if the client has not yet received any service the thinner returns the Javascript which causes the browser to send another large POST and the process goes on.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 18

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 19

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 20

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 21

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 22

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 23

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 24

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 25

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 26 Objections to Speak Up Bandwidth envy : Since speakup allocates servers resources in proportion to the clients bandwidth, “high bandwidth good clients” are better off. Bandwidth envy : Since speakup allocates servers resources in proportion to the clients bandwidth, “high bandwidth good clients” are better off. Variable bandwidth costs : For clients with access to “speakup” defended servers would cost more than usual. Variable bandwidth costs : For clients with access to “speakup” defended servers would cost more than usual. Incentives for ISP’s : Does “speakup” give ISP’s an incentive to encourage botnets as a way to increase the bandwidth demanded by good clients. Incentives for ISP’s : Does “speakup” give ISP’s an incentive to encourage botnets as a way to increase the bandwidth demanded by good clients. Solving the wrong problem – If the problem is bots shouldn’t it be addresses than encouraging more traffic Solving the wrong problem – If the problem is bots shouldn’t it be addresses than encouraging more traffic Flash crowds – Speakup treats an overload of good clients alone just like an application level DDoS attack. Flash crowds – Speakup treats an overload of good clients alone just like an application level DDoS attack.

5/18/2015 Samarpita Hurkute DDoS Defense By Offense 27 Conclusions This study has sought an answer to two high level questions : This study has sought an answer to two high level questions : 1. Which conditions call for speakup’s peculiar brand of protection ? 2. Does speakup admit a practical design ? The missed question is “Who needs speakup?