1 DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, Scott Shenker, SIGCOMM ‘06 Presented by Lianmu Chen DDoS:

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
DDOS Defense by Offense OFFENSE Presented by: Anup Goyal Aojan Su.
DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker Presented by: Boris Kurktchiev and Kimberly.
5/18/2015 Samarpita Hurkute DDoS Defense By Offense 1 DDoS Defense by Offense Michael Walfish,Mythili Vutukuru,Hari Balakrishnan,David Karger,Scott Shenker.
DDoS: Defense by Offense 1 DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker, SIGCOMM ‘06 Presented.
Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker Presented by Sunjun Kim, Donyoung Koo 1DDoS Defense by Offense.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Michael Walfish, Mythili Vutukuru, Hari Balakrishanan, David Karger, Scott Shankar DDos Defense by Offense.
CSE 190: Internet E-Commerce Lecture 16: Performance.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
DDoS Defense by Offense Presented by: Matthew C.H. Ma Damon Chan.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
DDoS: Defense by Offense 1 DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker, SIGCOMM ‘06 Presented.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
Web server security Dr Jim Briggs WEBP security1.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Lecture 15 Denial of Service Attacks
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
INTRODUCTION TO WEB DATABASE PROGRAMMING
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Micheal Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker Presented by Corey White.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
DaaS: DDoS Mitigation-as-a-Service 2011 IEEE/IPSJ International Symposium on Applications and the Internet Author: Soon Hin Khor & Akihiro Nakao Speaker:
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Computing Infrastructure for Large Ecommerce Systems -- based on material written by Jacob Lindeman.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Multicast instant channel change in IPTV systems 1.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang DDoS Defense by Offense Michael Walfish,
DDoS Defense by Offence Michael Walfish, Mithili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker MIT CSAIL, UCB and ICSI ACM SigComm 2006.
Randomized Failover Intrusion- Tolerant Systems (RFITS) Ranga Ramanujan, Maher Kaddoura, Carla Marceau, Clint Sanders, Doug Harper, David Baca Architecture.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Empirical Quantification of Opportunities for Content Adaptation in Web Servers Michael Gopshtein and Dror Feitelson School of Engineering and Computer.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
1 Attacking DDoS at the Source Jelena Mirković, Gregory Prier, Peter Reiher University of California Los Angeles Presentation by: David Allen.
What is Web Information retrieval from web Search Engine Web Crawler Web crawler policies Conclusion How does a web crawler work Synchronization Algorithms.
DoS/DDoS attack and defense
ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Application Layer Attack. DDoS DDoS – Distributed Denial of Service Why would any one want to do this? In some cases, for bringing down service of competitors,
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
BZUPAGES.COM WEB SERVER PRESENTED TO: SIR AHMAD KAREEM.
DDoS Defense by Offense1 Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., (MIT) and Shenker, S. (UC Berkeley), SIGCOMM ’06 Presented by Ivanka.
Overview on Web Caching COSC 513 Class Presentation Instructor: Prof. M. Anvari Student name: Wei Wei ID:
Distributed Denial of Service Yi Zhang April 26, 2016.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Denial-of-Service Attacks
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
TMG Client Protection 6NPS – Session 7.
DDoS Attacks on Financial Institutions Presentation
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Presentation transcript:

1 DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, Scott Shenker, SIGCOMM ‘06 Presented by Lianmu Chen DDoS: Defense by Offense

2 Outline Introduction Design Implementation Evaluation Conclusions DDoS: Defense by Offense

3 Introduction DDoS: Defense by Offense

4 Introduction Application level DDoS – It is a noxious attack in which computer criminals mimic legitimate client behavior by sending proper-looking requests, often via compromised and commandeered hosts known as bots. Attacker sends proper looking requests to waste server ’ s resources; Overwhelms server, not access links. DDoS: Defense by Offense

5 Introduction Far less bandwidth is required: the victim’s computational resources—disks, CPUs, memory, application server licenses, etc.—can often be depleted by proper-looking requests long before its access link is saturated. The attack traffic is “in-band,” it is harder to identify and thus more potent. DDoS: Defense by Offense

6 Three categories of Defenses Overprovision computation resources massively Detect and block Resource-based defenses DDoS: Defense by Offense

7 Speak-up It ’ s a Resource-based defense that uses bandwidth as the currency. – Claim: attackers use most of their available bandwidth during attacks, victims do not. – Use encouragement to make victims send more traffic so they are better represented at the server. DDoS: Defense by Offense

8 Threat Model ??? The attacker can send difficult requests intentionally. An attacker can repeatedly request service from a site while having different IP addresses. DDoS: Defense by Offense

9 Two conditions to make it work Adequate Client Bandwidth: the good clients must have in total roughly the same order of magnitude (or more) bandwidth than the attacking clients. Adequate Link Bandwidth: The protected service needs enough link bandwidth to handle the incoming request stream. DDoS: Defense by Offense

10 Three conditions where it wins No predefined clientele: otherwise the server can install filters to permit traffic only from known clients. Non-human clientele: ruling out proof-of humanity tests. Unequal requests or spoofing or smart bots: Currency based approach can charge clients for harder requests. DDoS: Defense by Offense

11 Design DDoS: Defense by Offense

12 Speak-up Illustration of speak-up (a) g/g+B (b) G/G+B -Bad clients exhaust all of their available bandwidth on spurious requests. -Good clients are likely using a only small portion of their available bandwidth. -The key idea of speak- up is to exploit this difference. DDoS: Defense by Offense

13 Design Goal Allocate resources to competing clients in proportion to their bandwidth. - If the good clients make g requests per second and have an aggregate bandwidth of G requests per second to the server and if the bad clients have aggregate bandwidth of B requests per second then the server should process good requests at a rate of min(g,(G/G+B)c) requests per second where c is the servers capacity to process requests. DDoS: Defense by Offense

14 Required mechanisms Limit the requests to a server to c per second. Perform encouragement : cause a client to send more traffic. Speak-up needs a proportional allocation mechanism to admit client at rates proportional to their delivered bandwidth. Hence, the thinner appears. DDoS: Defense by Offense

15 Thinner Under speak-up, these mechanisms are implemented by a front-end to the server, called the thinner. Thinner: the thinner implements encouragement and controls which requests the server sees. DDoS: Defense by Offense

16 Explicit Payment Channel When server is overloaded, thinner asks clients to open separate payment channels. Client sends dummy bytes on this channel, becomes a contender. Thinner tracks how much each contender sends. When the server notifies the thinner it is ready to fire a new request, thinner admits the client which has sent the most number of padded dummy bytes. DDoS: Defense by Offense

17 Implementation DDoS: Defense by Offense

18 Implementation A prototype thinner is implemented in C++. It runs on Linux 2.6 exporting a well know URL. When a web client requests this URL then thinner decides, if and when to send this request to the server. When the server responds to that request, the thinner returns HTML to the client with that response. DDoS: Defense by Offense

19 Implementation Clients send by Poisson process with limited windows (open requests). Deterministic service time (all requests equal) Bad clients send faster, and have bigger windows. Good client: = 2, w = 1 Bad client: = 40, w = 20 Max. number of clients limited to 50 by testbed. DDoS: Defense by Offense

20 Configuration parameters —the capacity of the protected server, expressed in requests per second. —a list of URLs and regular expressions that correspond to “hard requests.” Each URL and regular expression is associated with a difficulty level. —the name or address of the server. —a custom “please wait” screen that humans will see while the server is working and while their browser is paying bits. DDoS: Defense by Offense

21 Implementation The Web client requested a “hard” URL(HTTP GET request), the thinner replies with the “please wait”. no other connections to the thinner, thinner returns to the client (1) JavaScript that wipes the “please wait” screen (2) the contents of the server’s reply. other clients are communicating with the client submit, a one- megabyte HTTP POST containing random bytes. --The client wins an auction, the thinner terminates the POST and submits the client’s request to the server. --The client does not win, then the thinner returns JavaScript that causes the browser to send another POST, and the process described in the previous paragraph repeats. DDoS: Defense by Offense

22 Evaluation DDoS: Defense by Offense

23 Validating the thinner ’ s allocation DDoS: Defense by Offense

24 Validating the thinner ’ s allocation Setup: 25 good clients, 25 bad clients Cid = 100 c = 50, 100, 200 DDoS: Defense by Offense

25 Latency cost DDoS: Defense by Offense

26 Byte Cost ??? DDoS: Defense by Offense

27 Heterogeneous Network Conditions DDoS: Defense by Offense

28 Heterogeneous Network Conditions DDoS: Defense by Offense

29 Heterogeneous Network Conditions Good clients with long RTTs do worse than any bad clients “ Effect is limited ” – No one gets > 2*ideal – No one gets < 1/2*ideal DDoS: Defense by Offense

30 Good and Bad Sharing a Bottleneck DDoS: Defense by Offense

31 Good and Bad Sharing a Bottleneck DDoS: Defense by Offense

32 Impact of speak-up on other traffic Setup: 10 good speak-up clients, 2 Mbits/s; H, a host that runs the HTTP client wget. 2 Mbits/s; Bottleneck link, m: 1 Mbit/s; one-way delay 100 ms; the thinner and S. In each experiment, H downloads a file from S 100 times. DDoS: Defense by Offense

33 Conclusions DDoS: Defense by Offense

34 Conclusions This article presents the design, implementation, analysis, and experimental evaluation of speak-up, a defense against application-level distributed denial-of-service (DDoS). With speak-up, a victimized server encourages all clients, resources permitting, to automatically send higher volumes of traffic. DDoS: Defense by Offense

35 Conclusions Advantages – Network elements don ’ t need to change. – Only need to modify servers and add thinners. Disadvantages – Everyone floods, so harder to detect bad clients. – Hurts edge networks. – Rendered useless if access links to thinner are saturated. DDoS: Defense by Offense

36 Questions? DDoS: Defense by Offense