Defending against Flooding-Based Distributed Denial-of-Service Attacks: A tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Rocky K. C. Chang.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Distributed Reflection Denial of Service Networking Talks for the Insufficiently Paranoid Based on:
1.1 Operating System Concepts An Introduction to DDoS And the “Trinoo” Attack Tool Acknowledgement: Ray Lam, Ivan Wong.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
DDoS: Distributed Denial of Service Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Rock K. C. Chang.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Defending against Flooding-based Distributed Denial-of- Service Attacks: A Tutorial AUTHOR ROCKY K. C. CHANG, THE HONG KONG POLYTECHNIC UNIVERSITY PRESENTED.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
An Introduction to DDoS And the “Trinoo” Attack Tool Prepared by Ray Lam, Ivan Wong July 10, 2003.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Computer Security and Penetration Testing
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Distributed Denial of Service Attacks 1 Defending against Distributed Denial of Service Attacks: A Tutorial Rocky K. C. Chang, The Hong Kong Polytechnic.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
DoS Seminar 2 Spoofed Packet Attacks and Detection Methods By Prateek Arora.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
TCP/IP Vulnerabilities
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang DDoS Defense by Offense Michael Walfish,
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service Attacks: Methods, Tools, and Defenses Prof. Mort Anvari Strayer University at Arlington.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
Distributed Denial of Service (DDoS)
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
© 2002, Cisco Systems, Inc. All rights reserved..
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Denial-of-Service Attacks
Comparison of Network Attacks COSC 356 Kyler Rhoades.
DDoS Attacks on Financial Institutions Presentation
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Error and Control Messages in the Internet Protocol
Presentation transcript:

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren

Overview DDoS overview Types of attacks Solutions to DDoS attacks Internet Firewall Comparisons Conclusions

DDoS Attacks Do not rely on particular network protocols or system weaknesses Exploit huge resources of the Internet  Many attackers, one victim Traffic jams or crashes the victim, or its Internet connection Yahoo!, eBay, Amazon, were attacked by DDoS attacks in February 2000

DDoS Attacks Are most common form of attacks on the Internet today Most go unreported A recent study observed more than more than 12,000 DoS (DDos?) attacks during a three-week period  Actual number is probably much higher

DDoS Attacks Already a major problem Attacks are made easy by user-friendly tools Still a lack of effective defense  Aborting attack in progress  Tracing back to attack sources Expected to become more severe and serious Cyber Warfare  Disable strategic business, government, public utility and military sites  Blackmail Companies have appeared in the last 2 years to offer solutions

Direct Attacks An attacker sends a large number of attack packets directly to a victim Spoofed addresses in packets, so responses go un- ACKed to R until timeout

SYN flooding If port is listening, victim responds with SYN- ACK packets Source addresses are spoofed, responses go to other hosts Victim retransmits SYN-ACK packet several times Half-open connections consume all the resources for pending connections, prevents new requests

Attacks by protocol TCP attacks are mainly SYN-ACK based, RST packets, or ICMP error messages ProtocolPercentage TCP94% UDP2% ICMP2%

Attack Process Attacker sets up attack network Attacking host is compromised by attacker Attacking host implanted with master and agent programs  Trinoo, Tribe Flood Network 2000, Stacheldraht

Reflector Attacks Intermediary nodes (routers & servers) are used to launch attack Attacker sends packets with source address set to victim’s Reflectors send response to victim

Attack Process Based on reflector generating messages in response to other messages Any protocol that supports “automatic message generation” can be used SYN-ACK or RST packets When SYN-ACK used, reflector behaves like victim of SYN flooding due to ½ open connections Clog network link

Types of Reflector Attacks Packets with inactive destination ports result in ICMP port unreachable messages Packets with small TTL result in ICMP time exceeded messages Bandwidth amplification  Attack packet results in reflected packet much larger in size (DNS replies)

Analyzing Reflector Attacks Cannot be observed by backscatter analysis, because victims do not send back any packets Number of reflector attacks unknown Reflected packets are normal packets, so they cannot be filtered based on address spoofing or route-based mechanism

Attack Packets Required Modeled as a G/D/∞/N queue  G – general arrival process  D – lifetime for each ½ open connection  N – ½ open connections allowed by victim  Infinite server queuing model yields the minimal rate of SYN packets required to exhaust server’s resources

Server Comparison BSD – retransmission timeout at 6, 24, 48s, gives up after total of 75s Linux – 3, 6, 12s, etc. Up to 7 retransmissions, gives up after 309s Windows 2000 Advanced Server – retransmits SYN packets at most twice, gives up after 9s

Server Comparison If SYN packet is 84 bytes long, a 56 kb/s connection will stall Linux and BSD, N ≤ 6,000 A 1 Mb/s connection will stall all three with N ≤ 10,000 Direct ICMP ping flooding attack requires 5,000 agents for a T1 link  Reflector attack requires 5,000 reflectors, but agents are much fewer if each agents sends requests to multiple reflectors

Solutions to DDoS Problems Attack prevention and preemption  Before the attack Attack detection and filtering  During the attack Attack source traceback and identification  During and after the attack

Attack Prevention and Preemption Signatures and scanning procedures exist to detect agent implants Monitor network traffic for known attack messages between attackers and masters Cyber-informants and cyber-spies Some users just don’t care No incentive for ISPs or enterprise networks do not have incentive to monitor for attack packets

Attack Source Traceback and Identification Trackback – identifying the actual source of packets, without relying on header information Two approaches  Router records information about packets  Router sends addition information to destinations, via the packets or ICMP messages Cannot be used to stop an ongoing attack Packet’s origin cannot always be traced (firewalls and NAT) Ineffective in reflector attacks – Packets come from legitimate sources in Used to collect evidence for post-attack law enforcement

Attack Detection and Filtering False positive ratio (FPR)  Packets classified as attack packets that are actually normal, divided by total normal packets False negative ratio (FNR)  Packets classified as normal that are actually attack packets, divided by total attack packets Packet filtering drops attack and normal packets  Effectiveness measured by normal packet survival ratio (NPSR)

Attack Detection and Filtering

Source Networks – can filter packets Victim’s Networks – can detect attack Victim’s Upstream ISP  Requested to filter attack packets (by phone)  Ideally an intrusion alert protocol would be used Further Upstream ISP  Networks would have to cooperate and install packet filters when intrusion alerts are received

Internet Firewall Detect DDoS attack in the Internet core Could maintain a victim’s normal service during an attack

Route-based Packet Filtering Extends ingress packet filtering to core Checks if packet comes from correct link, according to inscribed source and destination  If packet is from unexpected source it is dropped  Route changes can cause false positives Packet filters in 18% of ASs in Internet can significantly reduce spoofed packets BGP messages would require source addresses, increasing message size and time Currently there are > 10,000 ASs, so 1800 filters would have to be in place

Distributed Attack Detection Approach Extends intrusion detection system to core Detects based on network anomalies and misuses observed by detection systems (DSs) Anomaly detection determines normal and deviant traffic patterns Misuse detection identifies attack signatures

Detection Systems Placed in strategic locations Nonintrusively monitor traffic Exchange attack information from local observations Stateful to presence or absence of DDoS attacks Need a separate channel to communicate Number of DSs is much smaller than RPF, DSs does not rely on routing information More DSs would result in a larger delay response

Detection System Design Process packets at very high speeds  Need a high-speed packet classifier Local and global detection  H 1 – presence of a DDoS attack  H 0 – a null hypothesis When H 1 occurs, alerts sent to other DSs  Each DS analyzes its results and other DSs results to make a global detection decision  Attack confidence level  If DS is confirmed, filters are installed, optionally notifies upstream routers

Detection System Design Install filters only on suspected switch interfaces DSs must always be connected, physically and have usable paths Questions remain – best topology, how to reconnect DSs, how does DSs send alerts when it is under attack Communication Protocols  Intrusion Detection Exchange Protocol  Intrusion Detection Message Exchange Format

Quickest Detection Studied in signal processing, quality control, and wireless channel monitoring DS periodically computes instantaneous traffic intensity Objective is to minimize the expected delay in detection, based on thresholds

Limitations and problems Need to determine thresholds for local and global thresholds and traffic modeling There is a delay to reach global detection, DS network does not detect short attacks  DS network should be designed for attacks > 5 min (75% of all attacks in a recent study) Flash crowds result in false alarms  Unpredictable – major news stories  Predictable but nonrepetitive – sports  Predictable and repetitive – opening of stock market Use a different traffic model when flash crowd occurs Degradation of Service Attacks (DeS)  Short bursts of attack packets

Comparison

Conclusion Current defense in inadequate Still many insecure areas on the Internet More effective detect-and-filter approaches must be developed

What's the big deal? Argues for the use of an Internet Firewall Compares and contrasts route-based packet filtering and distributed attack detection

Questions