A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann and Christos Papadopoulos presented by Nahur Fonseca NRG, June, 22.

Slides:



Advertisements
Similar presentations
Internet Measurement Conference 2003 Source-Level IP Packet Bursts: Causes and Effects Hao Jiang Constantinos Dovrolis (hjiang,
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
1 Reading Log Files. 2 Segment Format
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
1 CS 4396 Computer Networks Lab Transmission Control Protocol (TCP) Part I.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Defending Against Low-rate TCP Attack: Dynamic Detection and Protection Haibin Sun John C.S.Lui CSE Dept. CUHK David K.Y.Yau CS Dept. Purdue U.
Examining IP Header Fields
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Characterizing and Defending Against DDoS Attacks Christos Papadopoulos..and many others.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Inferring Internet Denial-of- Service Activity David Moore, Geoffrey M Voelker, Stefan Savage Presented by Yuemin Yu – CS290F – Winter 2005.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
10/21/20031 Framework For Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Kavita Chada & Viji Avali CSCE 790.
1 An Information-theoretic Approach to Network Measurement and Monitoring Yong Liu, Don Towsley, Tao Ye, Jean Bolot.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Licentiate Seminar: On Measurement and Analysis of Internet Backbone Traffic Wolfgang John Department of Computer Science and Engineering Chalmers University.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
FIREWALL Mạng máy tính nâng cao-V1.
Traffic Classification through Simple Statistical Fingerprinting M. Crotti, M. Dusi, F. Gringoli, L. Salgarelli ACM SIGCOMM Computer Communication Review,
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
DoS Seminar 2 Spoofed Packet Attacks and Detection Methods By Prateek Arora.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Power Projection Systems Department Zombie Scan Judy Novak Vern Stark David Heinbuch June 12, 2002.
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
Transmission Control Protocol TCP. Transport layer function.
MonNet – a project for network and traffic monitoring Detection of malicious Traffic on Backbone Links via Packet Header Analysis Wolfgang John and Tomas.
A METHOD FOR INCONSPICUOUS TRACEROUTE Jonathan Haber.
Analysis of Internet Backbone Traffic and Header Anomalies Observed Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering.
GORAN OSIM AND TIM MYERS CPSC 424 DDOS AND THE SYSADMIN.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
CS551: End-to-End Packet Dynamics Paxon’99 Christos Papadopoulos (
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Detection of Routing Loops and Analysis of Its Causes Sue Moon Dept. of Computer Science KAIST Joint work with Urs Hengartner, Ashwin Sridharan, Richard.
EMIST DDoS Experimental Methodology Alefiya Hussain January 31, 2006.
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Reviewed by Dave Lim.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
CSE715 Presentation Project Fall 2004 by Michael Alexandrou and Rusty Coleman.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Inferring Denial of Service Attacks David Moore, Geoffrey Volker and Stefan Savage Presented by Rafail Tsirbas 4/1/20151.
DoS/DDoS attack and defense
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
-Mayukh, clemson university1 Project Overview Study of Tfrc Verification, Analysis and Development Verification : Experiments. Analysis : Check for short.
LACSI 2002, slide 1 Performance Prediction for Simple CPU and Network Sharing Shreenivasa Venkataramaiah Jaspal Subhlok University of Houston LACSI Symposium.
Inferring Internet Denial-of-Service Activity Authors: David Moore, Geoffrey M. Voelker and Stefan Savage; University of California, San Diego Publish:
Denial-of-Service Attacks
OS Fingerprinting and Tethering Detection in Mobile Networks
Denial of Service attack in IPv6 networks and Counter measurements
The Devil and Packet Trace Anonymization
Fast Pattern-Based Throughput Prediction for TCP Bulk Transfers
Identification of Repeated Denial of Service Attacks
Presentation transcript:

A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann and Christos Papadopoulos presented by Nahur Fonseca NRG, June, 22 nd, 2004

This paper is NOT about… Detecting DoS attacks, although they suggest an application for it in the end. Responding to DoS attacks. Dealing with smart attacks which explore software bugs or protocol synchronization. (so don’t worry Mina, you can continue your plans to take over the World).

Problem and Motivation Problem: Need a robust and automatic way of classifying DoS attacks into these two classes: single- and multi-source. Because: Different types of attacks (single- or multi-source) are handled differently. Classification is not easy. For instance, packets can be spoofed by attacker.

Preliminaries Zombie x Reflectors Single- x Multi-source Direct x Reflection

Discussion DWE Quiz: 1)Is this problem interesting at all ? 2)What could make it a SIGCOMM paper ? 3)[Optional] What is the related work ? 4)What should be the OUTLINE of the rest of the presentation ?

Outline Description of traces used Four Classification Techniques Evaluation of Results Conclusion & Discussion & Validation

Data Collection Monitored two links at moderate size ISP. Captured packet header in both directions using tcpdump, and saved every two mins. Attack detected when: a)# of sources to the same destination > 60 in 1s, or b)Traffic rate > 40K packets/s. Manually verify detected attacks. False positive rate of 25 – 35 %. Resulting in a total of 80 attacks in 5 months.

T1: Packet Header Analysis Based on ID and TTL fields filled by OS. Idea: identify sequences of increasing ID number with a fixed TTL. Classified 67 / 80. Some statistics: 87% evidence of root access TCP prevalence flwd by ICMP Attack# Single37 Multi10 Reflected20 Unclassified13

T2: Arrival Rate Analysis Single-sourceMulti-sourceReflected Single-, multi-source and reflected attacks have different mean. Kruskal-Wallis one-way ANOVA test F=37 (>> 1) p=1.7 x (<< 1) Attack rate (pkt/s)

T3: Ramp-Up Behavior Single-source attacks start at full throttle. All multi-source attacks presented ramp-up due to synchronization of zombies. (Left) one of the 13 unclassified attacks (Right) agree with header analysis Time (seconds) Attack rate (pkt/s)

T4: Spectral Content Analysis Trace as time series. Consider segments in steady-state only. Compute Power Spectral Density S(f) C(f) is the normalized cumulative power up to frequency f. F(p) = C(f) Frequency (Hz) a) Single-Source Frequency (Hz) b) Multi-Source S(f) C(f) S(f) C(f)

The F(60%) Spectral Test Single-source F(60%)  [ ] Hz Multi-source F(60%)  [ ] Hz Wilcoxon rank sum test used to verify the 2 classes have different F(.) ranges.

Validation of F(60%) Test Observations in a smaller alternate site. Controlled experiments over the Internet with varying topology (cluster x distributed) and # of attackers (1 to 5 Iperf clients). Use of attack tools (punk, stream and synful) in testbed network.

Effect of Topology

Effect of Increasing # of Attackers Similar curve for controlled experiment and testbed attack using hacker tools.

Why ? Aggregation of two scaled sources? No! a 1 (t) = a(t) + a((s+  )t) Bunch of traffic (lika ACK compression)? No! a 2 (t) delay the arrival of packets until 5-15 have accumulated and send all at once Aggregation of two shifted sources? No! a 3 (t) = a(t) + a(t +  +  ) Aggregation of multiple slightly shifted sources? Yes! a 3b (t) =  a(t + i  ), 2 < i < n

Conclusions ‘Network security is an arms race.’ Thus the need for more robust techniques. Once detection is done, spectral analysis can be used to identify type of attack and trigger appropriate response. Contribution to model attack traffic pattern. Use of statistical tests to make inference about attack patterns.

Discussion How a single-source could try to foul the spectral analysis tool ? What is the spectral face of normal traffic? What other type of patterns could we identify and design statistical tests for it ? More thoughts ?