DoS-resistant Internet Grand Strategy technical and economic measures Bob Briscoe Jun 2006.

Slides:



Advertisements
Similar presentations
A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
Advertisements

HotNets-VI 1 Architecting Citywide Ubiquitous Wi-Fi Access Nishanth Sastry Jon Crowcroft, Karen Sollins.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
Internetworking II: MPLS, Security, and Traffic Engineering
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Random Flow Network Modeling and Simulations for DDoS Attack Mitigation Jiejun Kong, Mansoor Mirza, James Shu, Christian Yoedhana, Mario Gerla, Songwu.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Why are all architectural problems from 2000 still unsolved? How would we know we had solved socio-economic problems anyway? Bob Briscoe Chief Researcher,
Firewalls and Intrusion Detection Systems
Zhang Fu, Marina Papatriantafilou, Philippas Tsigas Chalmers University of Technology, Sweden 1 ACM SAC 2010 ACM SAC 2011.
Panel: Current Research on Stopping Unwanted Traffic Vern Paxson, Stefan Savage, Helen J. Wang IAB Workshop on Unwanted Traffic March 10, 2006.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
Research direction Bob Briscoe Chief Researcher, BT Group Nov 2006.
DoS-resistant Internet - progress Bob Briscoe Jun 2005.
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Survey of Distributed Denial of Service Attacks and Popular Countermeasures Andrew Knotts, Kent State University Referenced from: Charalampos Patrikakis,Michalis.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Lecture 15 Denial of Service Attacks
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Sample Research Defenses Packetscore Pushback Traceback SOS Proof-of-work systems Human behavior modeling SENSS.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Barracuda Load Balancer Server Availability and Scalability.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
FIREWALL Mạng máy tính nâng cao-V1.
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Steps Towards a DoS-resistant Internet Architecture Mark Handley Adam Greenhalgh CII/University College London.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Firewalls A note on the use of these ppt slides:
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Papers covered ● K. Lakshminarayanan, D. Adkins, A. Perrig, I. Stoica, “Taming IP Packet Flooding Attacks”, HotNets-II. ● M. Handley, A. Greenhalgh, “Steps.
--Harish Reddy Vemula Distributed Denial of Service.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 7 Internet Protocol (IP) Routing.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
DoS-resistant Internet Grand Strategy Bob Briscoe Jan 2006.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Congestion exposure BoF candidate protocol: re-ECN Bob Briscoe Chief Researcher, BT Nov 2009 This work is partly funded by Trilogy, a research project.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
Multimedia & Mobile Communications Lab.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Security fundamentals Topic 10 Securing the network perimeter.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
Making stuff real re-feedback Bob Briscoe, BT Research Nov 2005 CRN DoS resistant Internet w-g.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Concerns with Network Research Funding S.Floyd & R. Atkinson, Editors Internet Architecture Board draft-iab-research-funding-02.txt.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
SOS: An Architecture For Mitigating DDoS Attacks Authors: Angelos D. Keromytis, Vishal Misra, Dan Rubenstein. Published: ACM SIGCOMM 2002 Presenter: Jerome.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Defending Against DDoS
Who should be responsible for risks to basic Internet infrastructure?
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
DDoS Attack and Its Defense
Presentation transcript:

DoS-resistant Internet Grand Strategy technical and economic measures Bob Briscoe Jun 2006

why goal of group to galvanise co-ordinated actions to make the Internet more resistant to denial of services attacks, without unduly blocking the emergence of innovative new applications of the Internet goal of writing a grand strategy to lay out the space of possible activity across fields in order to prioritise –identify approaches that require less co-ordination between companies, industries, disciplines, jurisdictions –identify gaps where co-ordination unavoidable –identify approaches not worth pursuing foster consensus, rather than “not invented here” audience pt I discursive: internal, members, researchers pt II conclusive: regulators, operators (regulatory, operations), vendors, researchers

status structure table of contents bullet point content one review pass so far on group wiki (at LINX) recruited expert authors

multidisciplinary contents intro technical measures economic & incentive-based measures contractual measures regulatory measures commercial realities conclusions Malcolm Hutty (LINX) Bob Briscoe (BT) Mark Handley (UCL) Bob Briscoe (BT) Scott Shenker (ICSI & UCB) Malcolm Hutty (LINX) Chris Marsden (Rand) placeholder for all Malcolm Hutty (LINX)

technical measures operational best common practices summary of BCP (separate thread of work) survey of proposed technical measures described through a common reference model guidance on avenues to avoid and most fruitful approaches incremental deployment issues

architectural component ideas candidate list for the ‘network layer’ Network Ingress Filtering of Source Address Spoofing Defeating Denial of Service Attacks that Employ IP Source Address Spoofing., IETF RFC2827 Traceback S. Savage, D. Wetherall, A. Karlin, and T. Anderson “Practical Network Support for IP Traceback” SIGCOMM (2000) Pushback R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling High Bandwidth Aggregates in the Network. Computer Communications Review, 32(3), (July 2002) Overlay Indirection Services A Keromytis, V Misra, D Rubenstein, “Secure Overlay Service” SIGCOMM (2002) Secure Internet Indirection Infrastructure (i 3 ): K. Lakshminarayanan, D. Adkins, A. Perrig, and I. Stoica, “Taming IP Packet Flooding Attacks” HotNets-II, (2003) Symmetric paths, client-server address separation, RPF checks, state set-up bit, nonce exchange, middlewalls M Handley and A Greenhalgh “Steps towards a DoS-resistant Internet architecture” FDNA (2004) Re-feedback B Briscoe et al “Policing Congestion Response in an Internetwork using Re-feedback” SIGCOMM (2005) Receiver-driven Capabilities T. Anderson, T. Roscoe, and D.Wetherall, “Preventing Internet enial of Service with Capabilities” HotNets-II, (Nov. 2003) A. Yaar, A. Perrig, and D. Song, “SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks” Symposium on Security and Privacy, (2004) X Yang et al, “DoS-limiting Internet architecture” SIGCOMM (2005) Routing: off by default Hitesh Ballani, Yatin Chawathey, Sylvia Ratnasamyy, Timothy Roscoey, Scott Shenker “Off by Default!” HotNets (2005) Traffic symmetry C Kreibich et al, “Using Packet Symmetry to Curtail Malicious Traffic” HotNets (2005)

reference model: datagram comms intent: to describe all the architectural approaches within a common reference model simple high level abstraction of datagram comms devices are the congestible resource –memory, network interface, disk, processor abstracts essential features of device addressing via explicit hierarchical addressing and implicit addressing of relays through routing process (incl DHT overlay) includes multipath access to same resource

(controversial) guidance: “to be avoided” intend to include ‘obvious’ guidance eventually for public policy audience avoid attack detection by what the payload says it is app identifiers, port numbers encryption & dynamic ports rule these out (cf. IP over Skype) avoid attack mitigation through hooks to real-world identity then manual intervention not credible deterrent given DoS on the legal redress service –unless last resort for rare cracks in automated system the global Internet lowest common denominator is anonymity –not even anonymity behind delegated traceability

(controversial) guidance perhaps not so useful stuff attack detection by claimed source identifier not without broad validation measures in place attack detection by tests of humanity most human-usable services evolve to use by unattended computers attack detection by inferring attack signature from its behaviour –perhaps promising, but perhaps war-game not worth starting attack mitigation by requiring receiver permission biggest targets are sites with most (anonymous) clients: server request floods not useful unless receiver willing to randomly select clients mitigation by push-back beyond where congestion is being caused requires uncongested router to validate push-back request rather than validation through self-evident congestion caused push-back requests become amplifying attack vector

(controversial) guidance: fruitful avenues attack detection & mitigation by how traffic behaves ideally by congestion response given DoS is congestion, which is a valid network layer concern hooks in network for higher layers state set-up flag, nonce exchange

giving research guidance: with care! too early to rule out research avenues but I’m going to follow my intuition anyway other researchers will follow their noses too our advice is there to be ignored if assumptions can be circumvented defence in depth can be useful but, then again, too many depths will stifle innovation

economic & incentive-based measures pricing to increase the cost of attacks more useful for interconnection charging than for retail user to localise pain to the network allowing pain to be caused internal ‘pricing’ to drive throttles and policers encouraging the clean up of zombie hosts alternatively, SLA-type penalties for breaking thresholds limits of economic approaches value of attack to attacker >> cost to attacker, irrational attackers –both avoided if only use economic approach at interconnection insurance blurs responsibility –even if localise pain to irresponsible networks insurance tends to spread risk back to responsible networks re-ECN being progressed through IETF basis for interconnection congestion charging –draft-briscoe-tsvwg-re-ecn-tcp-02 –draft-briscoe-tsvwg-re-ecn-border-cheating.01

recent working group activity on technical-economic measures tactical approaches BGP-based push-back distributing DNS name server records strategic approaches policing congestion response using re-feedback/re-ECN state set-up flag

summary setting an agenda for action towards a DoS resistant Internet getting involved edit on LINX WiKi access controlled: via Mark Handley first substantial draft from all authors: mid Apr snapshot Bob Briscoe