Defending against Flooding-based Distributed Denial-of- Service Attacks: A Tutorial AUTHOR ROCKY K. C. CHANG, THE HONG KONG POLYTECHNIC UNIVERSITY PRESENTED.

Slides:



Advertisements
Similar presentations
COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 Reading Log Files. 2 Segment Format
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
DDoS: Distributed Denial of Service Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Rock K. C. Chang.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG 12 Interprovider.
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Rocky K. C. Chang.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
CS155: Computer and Network Security Programming Project 3 – Spring 2008 Craig Gentry, Naef Imam, Arnab Roy {cgentry, nimam, Thanks.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Distributed Denial of Service Attacks 1 Defending against Distributed Denial of Service Attacks: A Tutorial Rocky K. C. Chang, The Hong Kong Polytechnic.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Port Scanning.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
--Harish Reddy Vemula Distributed Denial of Service.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Packet-Marking Scheme for DDoS Attack Prevention
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
DoS/DDoS attack and defense
Distributed Denial of Service (DDoS)
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. SANS ‘98 Conference -
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
DDoS Attacks on Financial Institutions Presentation
Introduction to Networking
Outline Basics of network security Definitions Sample attacks
DDoS Attack and Its Defense
Presentation transcript:

Defending against Flooding-based Distributed Denial-of- Service Attacks: A Tutorial AUTHOR ROCKY K. C. CHANG, THE HONG KONG POLYTECHNIC UNIVERSITY PRESENTED BY CHUNG TRAN

Outline  Introduction  DDoS history  DDoS type of attacks  Solutions  Firewall  Four detect and Filters approaches  Conclusion 2

Introduction  In a typical DDoS attack, a large number of compromised hosts are amassed to send useless packets to jam a victim, or its internet connection, or both.  ICMP Flood, Smurf attack, Ping flood, and Ping to death  SYN Flood  Teardrop Attack  Etc etc. 3

Introduction cont.  Can be accomplish by:  By pinging to death  Computational intensive tasks on the victim such as Encryption and Decryption of data  Many differences flooding types of attack 4

History Part 1  First ICMP/Ping floods  First occurrence of the –f(flood) of the ping.c source code  1990-The first homeland of DDoS  1996 September – First high profile DDoS attack  1996 September – First CERT DDoS Advisory  1997 – First Publicly Available DDoS Tool Released  1997 – DDoS attacks morph 5

History Part 2  ICMP / Ping floods grow  1999 July – DDoS attacks expand  1999 October – Industry expects combine to address DDoS threats  1999 December - DDoS hit mainstream media  1999 December – US Government takes note of DDoS  2000 February – 15 year old boy shows how easy DDoS attack can be 6

History Part 3  2001 – CERT warns of trend in self-propogating worms  2001 – Attacks grow from Mbps to Gbps  2002 – Scope of DDoS attacks expands  2003 December – Barrett Lyon founds company to defend organizations against DDoS attacks  2004 – Online payment systems attacked  2005 December – Extortion schemes Expand 7

History Part 4  2006 December – Small scale DDoS attacks from religios groups  2007 December – State sponsored DDoS attacks cripple a small nation  2013 – DDoS attacks Exceed 150 Gbps  Largest recorded DDoS attack size reaches a new unprecedented level: Two high profile attacks recorded above 150 Gbps in the first half of the year 8

DDoS attacks  There are many types of attacks as the years progress DDoS have become more complex  This paper break it down into 2 type of attacks direct versus reflector  Direct Attack: an attacker arranges to send out a large number of attack packets directly toward a victim  Can be a combination of TCP, ICMP, and UDP  Reflector attack: is indirect attack in the intermediary nodes routers and server 9

DDoS type of Attacks 10

Direct attack  As the diagram show the advisory send packets to the victim directly using TCP, UDP, and ICMP  A router and server is not part of the attack  This can often be call peer-to-peer attack 11

Reflector Attacks  The advisory set it up and place the DDoS attacks on the routers and server for victim to visit and get attack from it  This build up until there is large enough reflectors from routers and server for a flood to happen causing the victim systems compromise 12

Attack Architectures for Direct attack 13

Architect of Direct Attack  The Attacker setup many other hosts these are call daemons or zombies  As the victim system become compromise the victim can and often become a new daemon or zombie and attack the next victim  As more computers are network this effect can grow very fast this is why we having over Gbps recorded attack 14

Architect of Reflectors Attack 15

Architect of Reflectors Attack  Not much different but the zombies and daemons send the attack packets to routers or servers before it attack the victim  The most important part to remember is that the routers and servers are often innocently uses as part of the attack  The attackers set the inscribed source destination to the victim destinations 16

Some Reflectors attack 17

SYN Flooding  There is a three-way handshake for TCP  A SYN flood attack works by not responding to the server with the expected ACK code  Not sending the excepted ACK, or by spoofing the source IP Address from the SYN  This cause the server to send SYN-ACK to falsified IP address – which will not send an ACK because it “knows” that it never sent a SYN 18

SYN Flooding cont.  The server will wait for the ACK for some time this wait due to a possible network congestion  In an attack increasing large numbers of half-open connections will bind resources on the server until no new connection can be made, this cause Dos  Here is a simple way to see it 19

SYN flooding queue  G/D/∞/N  N – half open connection  G – General arrival rate of the SYN Packets  D – Deterministic lifetime of each half-connection from the three-way handshake  It continue to uses up the resource available waiting for the complete three-way handshake that will not come in an attack so it keep expending the connections 20

Graph of a Syn Flooding 21

Analysis of the Graph  It show that in the graph that when N <= 6000 both BSD and Linux will stall at 56 kb/s  At 1Mbps N <= for all 3 to stall  Windows system does the best in SYN flooding attack 22

Solution to DDoS Problems  Three lines of defense:  Attack Prevention and Preemption (before the attack)  Attack Detection and Filtering (during the attack)  Attack Source Traceback and Identification(during and after the attack) Best is to uses all 3 in a system against DDoS type of attack 23

Attack Prevention and Preemption  Passive side: protect hosts from master and agent implants by using signatures and scanning procedures to detect  Monitor network traffic from known attack message sent between attackers and masters  Active side: employ cyber-informants and cyber-spies to intercept attack plans( group of cooperating agents) By itself is not enough once an attack have happen this method cannot stop the attack 24

Traceback and Identification  After an attack or during an attack  IP traceback: Identifying actual source of packets relying on source information  Routers can record information they have seen  Routers send addition information to destination or on another channel, ICMP message 25

Traceback and Identification  IP Traceback not always possible:  Cannot always trace a packets to the origins(NATs and firewall)  IP Traceback also ineffective in reflector attacks If traceback was possible than those individual responsible can be put away 26

Detection and Filtering 27

Detection and Filtering  2 Parts  Detection: Identifying DDoS attack packets  Filtering : Classifying packets and dropping them  Effectiveness of Detection  FPR( False Positive Ration) # of false positive/Total # of confirmed normal  FNR (False Negative Ratio) # of false negative/Total # of confirmed attack packets 28

Detection and Filtering cont.  Effectiveness of Filtering  Referring to the level of normal service that can be maintained by the victim during a DDoS attack by filtering the attack packets  Effective attack detection not always translate into effective packet filtering  Can be measured by normal packet survival ratio(NPSR) How many normal packets make it to the victim during a DDoS attack 29

Detection and Filtering 30

Source Network  Often cannot detect but can filter out attacking packets by checking spoofing IP address  Direct attack easy to track reflector attacks much more difficult  Make sure all ISP networks on the Internet, was impossible when paper came out Third points are being work on. This is due to fact that such a high volume of attack have occur in the last few years 150 Gbps first half of

Victim’s Network  Victim can detect a DDoS attack based on an unusually high volume of incoming traffic or degraded server and network performance  Commercial products can be obtain for this purpose, EMERALD was mention in this paper when it came out  Other defensive that does not uses detection and filter have been suggested i.e. IP hopping, moving target defense change of IP address so the attacker cannot keep using your spoof address to attack 32

Victim’s Upstream ISP network  Victim’s request filter packets  Well design or else good packets can be drop  Automated to detect intrusion in an alert systems  Careful design in case of TCP, victim network will not receive acknowledgements in midst of an attack.  Use strong authentication and encryption 33

Further upstream ISP network  Extend all of the approached mention  This require the victim’s network to detect DDoS attacks  Once detected the upstream ISPs are notified to filter attack I know this all sound like a lot of work but with so many attacks occurring and rising what choice do we have but to be conscious of it 34

Internet Firewall  Propose an Internet firewall to protect the whole Internet was made  Idea is to detect it on the internet and drop it before it can reach a victim network  2 Approach:  route-based packet filtering approach  Distributed Attack detection Approach 35

Route-Based Packet Filtering Approach(RPF)  This idea was propose by Park and Lee  Distribute packet filterings to examine whether each received packet come from a correct link base on source and destination address  If received from an unexpected link it then dropped  However, a packet might still be legitimate because there might have been a route change  No good against Reflectors attacks 36

Distribution Attack Detection(DAD)  Second Internet firewall Approach  DAD approach detects DDoS attacks based on network anomalies and misuses observed from a set of distributed detection system(DSs)  Detect normal traffic pattern versus “significantly” deviate from the normal ones.  Base on known attack pattern 37

DS Design consideration 38

DS design consideration  Need to process packets at very high speed as shown in the diagram before  Each DS can only observe partial traffic anomaly  This is where we have two levels: local detection and global detection  H1 for presence of DDoS attack  H0 a null hypotheses 39

Binary Hypothesis  Test a set of packet flows  Share same destination IP address  Packet types  TCP flags  Port number Slow down network especially during an attack do suggest just install on known and confirm attack switches. Running out of time so I must cut this short over 45 minutes of presentation already 40

Conclusion  With the very first attack occurring in 1989 DDoS have taking off and change over the years  There been many suggested way to prevent attacks  There are the Preemptive/Prevention approach, Traceback/identification, and Detection/Filtering most of this seems to have problem with Reflectors type of attack  More research are in development for this problem 41

Personal comments  I know there a lot of research out there trying to stop DDoS, but seeing the number make me think that it a losing battle.  In the last decade alone there been report of attack on every accept of our infrastructure; financial, media, government, social, etc.  Is this a losing battle for personal privacy?  Comments? 42