Network Layer Security Distributed Denial of Service (DDoS) attacks and the proposed solutions November 12, 2007.

Slides:



Advertisements
Similar presentations
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Advertisements

Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Network Attacks Mark Shtern.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Demonstrating HTTP Session Hijacking through ARP Cache Poisoning and Man-in-the-Middle Attack and exploring HTTPS and VOIP session vulnerabilities Mainuddin.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
IIT Indore © Neminath Hubballi
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Common Devices Used In Computer Networks
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
10/8/2015CST Computer Networks1 IP Routing CST 415.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Packet-Marking Scheme for DDoS Attack Prevention
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Networking Components Assignment 3 Corbin Watkins.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Denial-of-Service Attacks
Presentation on ip spoofing BY
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Distributed Denial of Service (DDoS) Attacks
Outline Basics of network security Definitions Sample attacks
Error and Control Messages in the Internet Protocol
Defending Against DDoS
Defending Against DDoS
Outline Basics of network security Definitions Sample attacks
DDoS Attack and Its Defense
Intrusion Detection and Hackers Exploits IP Spoofing Attack
ITIS 6167/8167: Network and Information Security
Wireless Spoofing Attacks on Mobile Devices
Outline The spoofing problem Approaches to handle spoofing
Outline Basics of network security Definitions Sample attacks
Distributed Denial of Service (DDoS) Attacks
Presentation transcript:

Network Layer Security Distributed Denial of Service (DDoS) attacks and the proposed solutions November 12, 2007

Network Layer security Definition: Network layer security is the security of IP routing mechanism and accessibility of networks, services and specific IP machines under general network conditions. Sample Network Level Threats: IP hijacking: the IP address of a machine is stolen by another machine. The data streams of the forst machin are diverted by the second machine. MAC address hijacking: Same as IP hijacking in the MC level. This is done by abusing the ARP protocol and something known as ARP poisoning. Distributed Denial of service.

What is a DDoS? A DDoS is a collaborative effort of many machines distributed across the internet. The machines are infected by a piece of malware, which makes them to be abused for a DDoS attack. The owners of the machines are usually un-aware of the infection. The infected machines are called zombies. All the zombie machines are controlled by a mastermind of the DDoS.

Illustrating a DDoS Edge router Core router DDoS source The Victim

Some of the Recent Incidents In May 2006, Internet spammers launched a massive DDoS attack against the anti-spam company Blue Security. As a result of a change in DNS entries of Blue Security at the time of the attack, the DDoS also targeted millions of blogs. In the aftermath of this DDoS attack, Blue Security was forced to stop providing anti-spam services and revised its business strategy A report of Online Wired Magazine on this event reads: “... at 4 pm on May 2, 2006, the sites went dark, and so did the mood at Six Apart, the company that owns them. In the blink of an eye, 10 million blogs and online communities disappeared. Flash floods of data thundered into one network port, stopped inexplicably, then reappeared to overwhelm another. The engineers pored over logs, desperately looking for a cause. After an agonizing hunt, they found it: a distributed denial-of-service attack, or DDoS”

Some of The Recent Incedents The alleged attack of Russia against Estonia in April-May 2007: The crisis unleashed a wave of so-called DDoS, or Distributed Denial of Service, attacks, where websites are suddenly swamped by tens of thousands of visits, jamming and disabling them by overcrowding the bandwidths for the servers running the sites. The attacks have been pouring in from all over the world, but Estonian officials and computer security experts say that, particularly in the early phase, some attackers were identified by their internet addresses - many of which were Russian, and some of which were from Russian state institutions.... The attacks have come in three waves: from April 27, when the Bronze Soldier riots erupted, peaking around May 3; then on May 8 and 9 - a couple of the most celebrated dates in the Russian calendar, when the country marks Victory Day over Nazi Germany, and when President Vladimir Putin delivered another hostile speech attacking Estonia and indirectly likening the Bush administration to the Hitler regime; and again this week. Source:

The Root of Vulnerability The main root of DDoS is the fact that the IP has an open structure and it is had to block distributed users to send traffic to a specific address. As of now, there is no solution to DDoS problem. Some of the solutions partially solve the problem.

Some of the Difficulties The source IP addresses are often spoofed. Therefore, it is hard to identify the real sources. In the network layer and the interim routers, the DDoS traffic looks like normal traffic. Often the sources are very distributed across the internet, and the number of active sources range from a few hundred to tens of thousands.

Example: reflected attacks The source sends traffic to a so-called reflector. The source IP address is spoofed as the IP address of the victim. Therefore, the response of the reflector is sent to the victim. Advantage: hiding the identity of the source, and reflection gain.

Illustrating Reflected Attack S SYN S: (spoofed) D: V R SYN SYN-ACK S: D: SYN-ACK S: source R: reflector V: Victim For every SYN at the source, the victim receives 3-5 SYN-ACKs. So the attack is amplified at the victim.

Some of the Proposed Solutions Egress (Ingress) filtering Route based filtering Probabilistic packet marking Pushback D-ward I-trace through ICMP messages

Ingress and Egress Filtering When leaving a network, the source IP address is checked for its validity. Therefore, the IP packets with a spoofed source do not leave the network

Issues of Egress Filtering No incentive for the source domains to implement: DDoS does not harm them! The attackers can still hide themselves within the IP address range of the domain.

Route-based filtering A router checks to see if a packet with a given source IP address is supposed to pass through that router Routers use BGP route information for such tests Route-based filtering is a generalization of egress filtering.

Illustrating Route-based Filtering Node 7 uses IP address belonging to node 2 when attacking node 4. Node 6 detects that a packet from node 2 is not supposed to be received On the interface connecting it to node 7. The packet is filtered.

Issues of Route-based Filtering A huge network support is needed Same problems as egress filtering Needs exchanging BGP route tables among routers

Probabilistic Packet Marking Each router randomly writes a piece of its IP address on some unused field in IP header. By using enough packets, the victim can recover the complete path to the sources.

Problems of Probabilistic Packet Marking Usually, the victim needs to receive too many packets from a source to be able to completely recover the path. The sources may be programmed to stop before they will be detectable by PPM It can only find the source networks not the real source machines.

I-trace through ICMP Messages For each IP packet being received, with a small probability, an ICMP packet with the complete information of the packet and the IP address of the router through which the packet was forwarded is generated. The probability of generating an ICMP message is 1/20,000 per receive packet If a DDoS source generates enough packets, then enough ICMP messages will be generated to help recover the complete path to the source.

Problems of I-trace through ICMP Messages The approach requires sources generate too many messages. It can only find the source networks not the real source machines.

Pushback Pushback is based on the fact that DDoS causes congestion A congestion signature is identified by the routers in proximity of the victim. The congestion signature is advertised to the upstream routers. Whenever there is a high rate of packets matching the congestion signature, the mechanism continues iteratively. Pushback is designed to continue toward the sources

Illustrating Pushback Pushback limits the traffic rate closer to the sources

Pushback in More Details ACC: Aggregate-based Congestion Control RED: Random Early Detection (Drop)

Problems of Pushback Many false positives and false negatives Often hard to extract a congestion signature Traffic becomes very sparse close to the sources. Therefore, pushback often fails to continue all the way to a DDoS source.

D-WARD D-WARD monitors the traffic at the egress router of a stub domain in order to determine whether the ratio of outgoing to incoming traffic for a set of remote addresses is abnormally high. A high ratio is taken as a signal that an attack is being mounted from within the stub domain.

Issues of D-WARD Performance of D-WARD degrades in detecting DDoS in transit domains because possibility of asymmetry in routes. D-WARD does not work when routes are not symmetric. D-WARD is not well suited for UD traffic.