IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.

Slides:



Advertisements
Similar presentations
A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
Advertisements

Security Issues In Mobile IP
Using HIP to solve MULTI-HOMING IN IPv6 networks YUAN Zhangyi Beijing University of Posts and Telecommunications.
06-Sep-2006Copyright (C) 2006 Internet Initiative Japan Inc.1 Prevent DoS using IP source address spoofing MATSUZAKI ‘maz’ Yoshinobu.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Availability Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Aspects of Computer.
NETWORK SECURITY EE122 Section 12. QUESTION 1 SYN SYN ACK ACK Data RST ACK time A B Data RST ABRUPT TERMINATION  A sends a RESET (RST) to B  E.g.,
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Network Attacks Mark Shtern.
2005 Stanford Computer Systems Lab Flow Cookies Bandwidth Amplification as Flooding Defense Martin Casado, Pei Cao Niels Provos.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
SAVE: Source Address Validity Enforcement Protocol Jun Li, Jelena Mirković, Mengqiu Wang, Peter Reiher and Lixia Zhang UCLA Computer Science Dept 10/04/2001.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Network Attacks. Network Trust Issues – TCP Congestion control – IP Src Spoofing – Wireless transmission Denial of Service Attacks – TCP-SYN – Name Servers.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
IIT Indore © Neminath Hubballi
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
1 Tao Wan Digital Security Group School of Computer Science Carleton University Oct 30, 2003 IP Spoofing Attacks & Defenses.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Packet-Marking Scheme for DDoS Attack Prevention
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
DoS/DDoS attack and defense
Lecture 17 Page 1 CS 236, Spring 2008 Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Spoofing Prevention Method Srikanth T.S.S. Sri Lakshmi Ramya S.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
IP Spoofing. What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Presentation on ip spoofing BY
An Introduction To ARP Spoofing & Other Attacks
Outline Basics of network security Definitions Sample attacks
Defending Against DDoS
Defending Against DDoS
Outline Basics of network security Definitions Sample attacks
IIT Indore © Neminath Hubballi
DDoS Attack and Its Defense
Intrusion Detection and Hackers Exploits IP Spoofing Attack
Outline The spoofing problem Approaches to handle spoofing
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense

Outlines IP Spoofing IP Spoofing Defense host-based Defensehost-based Defense Methods Router-Based Defense Methods Hybrid Defenses References Impersonation Hiding Reflection Cryptographic Solutions SYN Cookies IP Puzzles Ingress/Egress Filtering Distributed Packet Filtering (DPFDistributed Packet Filtering (DPF) Source Address Validity Enforcement (SAVE) Pi 2 IP Spoofing Defense

IP Spoofing Introduction Definition Creation of IP packets with source addresses different than those assigned to that host. Malicious use of IP Spoofing Impersonation Hiding Reflection Session hijack or reset Flood attack IP reflected attack 3 IP Spoofing Defense

Session hijack or reset Impersonation Attacker IP spoofed packet Src: Partner Dst: Victim Src: Victim Dst: Partner Assumes the partner has sent a packet, starts responding Partner Victim 4 IP Spoofing Defense

Flood attack Attacker Victim Src: Random Dst: Victim Hiding 5 IP Spoofing Defense

Reflection Smurf attacks DNS amplification attacks IP spoofing (reflection) DNS query DNS amplification Src: Victim Dst: Reflector IP spoofed packet A lot of reply without request Src: Reflector Dst: Victim Reply Reflector Victim Attacker 6 IP Spoofing Defense

IP Reflected Attacks 7 IP Spoofing Defense

DNS Amplification Attack 8 IP Spoofing Defense

Three classes of solutions 1 Host-based solutions No need to change network infrastructure Easy to deploy Too late for their reaction Router-based solutions Core or edge solutions Harder to deploy Most effective Hybrid solutions Routers + hosts 9 IP Spoofing Defense

Cryptographic Solutions Host-based solutions Require hand-shaking to set up secret keys between two hosts Communication between the two hosts can be encrypted Attacker cannot successfully spoof packets to create connection While IPSec is effective in many cases, it has some drawbacks Handshaking fails It is not feasible to require all hosts to connect through IPSec Encryption cost( time ) Encryption reduce the performance 10 IP Spoofing Defense

SYN Cookies Some servers use SYN cookies to prevent opening connections to spoofed source addresses The server with SYN cookies does not allocate resources until the 3-way handshake is complete How Does It Work? Server sends SYN+ACK with cookies V When it receives client’s response, it checks the V If it is cookie value + 1 ⇒ it creates the connection 11 IP Spoofing Defense

IP Puzzles A server sends an IP puzzle to a client The client solves the puzzle by some computational task The server allows to connect only after receiving the correct solution. The puzzle is sent to the listed hosts, not the attacker From the listed hosts ⇒ not the attacker 12 IP Spoofing Defense

Router-Based Defense Methods most host-based methods can be used in routers IPSec and IP puzzles have been used in routers 13 IP Spoofing Defense

Ingress/Egress Filtering Filtering packets before The key is the knowledge of expected IP address at a particular port Reverse Path filtering can help to build this knowledge coming to local network ⇒ ingress filtering before leaving local network ⇒ egress filtering It is not easy to obtain this knowledge in some networks with complicated topologies A router knows which networks are reachable from any of its interfaces. This is routing table 14 IP Spoofing Defense

Ingress/Egress Filtering Drawbacks: Hard to deployment It can not stop local spoofing RPF may drop legitimate packets With less than 100% deployment, IEF is ineffective 15 IP Spoofing Defense

Distributed Packet Filtering (DPF) Routers throughout the network maintain the incoming direction of a packet through their interfaces Which interface receives an packet with a particular source address A router can detect a spoofing packet if it arrives on a different interface This limits the number of addresses attackers can use 16 IP Spoofing Defense

Source Address Validity Enforcement (SAVE) Filters packets based on their incoming direction Every router maintains and update its own incoming table SAVE assumes all router deploy SAVE Not feasible 17 IP Spoofing Defense

Hybrid Defenses Utilizes both routers and hosts solutions Routers mark packets as they travel Hosts can take actions 18 IP Spoofing Defense

19 Path identifier (Pi) was originally designed to defend against DoS attacks It also provides an IP spoofing defense Pi uses IP fragmentation field to identify the path a packet traveled The fragmentation field is marked along the path Each router along the path sets a bit of the fragmentation field When a packet reaches its destination the fragmentation field contains a marking that is almost unique The end-host does not know the path a packet has traveled, but if multiple packets have the same marking bits set, then it is highly likely that they have traveled the same path Packets with the same source address, but different marking can be filtered Path identifier IP Spoofing Defense

20 Thank you If you have any questions please at IP Spoofing Defense

21 References On the state of IP spoofing defense. ACM Transactions on Internet Technology (TOIT), 9(2):6:1–6:??, May Network security class IP Spoofing Defense