Phalanx: Withstanding (?) Multimillion-Node (?) Botnets Paper by Colin Dixon, Thomas Anderson and Arvind Krishnamurthy NSDI ‘08 ?? by Mark Ison and Gergely.

Slides:



Advertisements
Similar presentations
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
SCTP v/s TCP – A Comparison of Transport Protocols for Web Traffic CS740 Project Presentation by N. Gupta, S. Kumar, R. Rajamani.
Camarillo / Schulzrinne / Kantola November 26th, 2001 SIP over SCTP performance analysis
Phalanx: Withstanding Multimillion-Node Botnets Colin Dixon Arvind Krishnamurthy Tom Anderson University of Washington NSDI 2008.
Congestion Control Created by M Bateman, A Ruddle & C Allison As part of the TCP View project.
CS 408 Computer Networks Congestion Control (from Chapter 05)
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
(4.4) Internet Protocols Layered approach to Internet Software 1.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
CS 268: Project Ideas Kevin Lai Feb 6, Announcements  Summary submission method -cp laik.jac88.html ~cs268/reviews -chmod.
VIPER – Voice over IP with Enhanced Resiliency Abstract: VoIP call quality is subject to Internet conditions, and users may experience periods of low quality.
15-441: Computer Networking Lecture 26: Networking Future.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
PSMC Proxy Server-based Multipath Connection CS 526 Advanced Networking - Richard White.
Mitigating Bandwidth- Exhaustion Attacks using Congestion Puzzles XiaoFeng Wang Michael K. Reiter.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
Promoting the Use of End-to- End Congestion Control in the Internet Sally Floyd and Kevin Fall Presented by Scott McLaren.
Network Architectures Week 3 Part 2. Comparing The Internet & OSI.
Internet In A Slice Andy Bavier CS461 Lecture.
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 (Solutions) Shivkumar Kalyanaraman:
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Whither Congestion Control? Sally Floyd E2ERG, July
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
1 © 2008 Nokia continous_scheduling_fmn_2008 / / JAk Continuous Scheduling for Data-Driven Peer-to-Peer Streaming Jyrki Akkanen Peer-to-peer.
3: Transport Layer3b-1 Principles of Congestion Control Congestion: r informally: “too many sources sending too much data too fast for network to handle”
Quick-Start for TCP and IP A.Jain, S. Floyd, M. Allman, and P. Sarolahti ICSI, April 2006 This and earlier presentations::
Kamal Singh, Árpád Huszák, David Ros, César Viho and Jeney Gábor
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
Congestion control for Multipath TCP (MPTCP) Damon Wischik Costin Raiciu Adam Greenhalgh Mark Handley THE ROYAL SOCIETY.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks Paper by: Bryan Parno et al. (CMU) Presented by: Ionut Trestian Gergely Biczók.
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
Withstanding Multimillion-Node Botnets Colin Dixon Arvind Krishnamurthy, Tom Anderson Affiliates Day, 2007.
Björn Landfeldt School of Information Technologies NETS 3303 Networked Systems Multicast.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Quick-Start for TCP and IP Draft-amit-quick-start-03.txt A.Jain, S. Floyd, M. Allman, and P. Sarolahti ICIR, December
Networking Basics CCNA 1 Chapter 11.
1 1 July 28, Goal of this session is too have a discussion where we learn about the relevant data to help us understand the problem and design.
Improving our Evaluation of Transport Protocols Sally Floyd Hamilton Institute July 29, 2005.
1 Transport Layer Lecture 10 Imran Ahmed University of Management & Technology.
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
PATH DIVERSITY WITH FORWARD ERROR CORRECTION SYSTEM FOR PACKET SWITCHED NETWORKS Thinh Nguyen and Avideh Zakhor IEEE INFOCOM 2003.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
UDP TCP.
CIS 700-5: The Design and Implementation of Cloud Networks
A quick intro to networking
Packets & Routing Lower OSI layers (1-3) concerned with packets and the network Packets carry data independently through the network, and into other networks…
Phalanx : Withstanding Multimillion-Node Botnets
Introduction to Networking
Magda El Zarki Professor, ICS UC, Irvine
Monitoring Network Bias
Presentation transcript:

Phalanx: Withstanding (?) Multimillion-Node (?) Botnets Paper by Colin Dixon, Thomas Anderson and Arvind Krishnamurthy NSDI ‘08 ?? by Mark Ison and Gergely Biczók

Nice idea, good conference, top university Use against large botnets Modest assumption: swarm’s aggregate BW exceeds botnet’s aggregate BW Detailed design Combines ideas from a number of areas Uses iPlane Evaluation PlanetLab Simulation on real topologies How can this ever go wrong?

The devil is in the details… About the modest assumption Routing and access control Mailbox buffers Attacking routers Deployment Transport protocols and congestion control Evaluation, evaluation, evaluation!

Modest assumption “Swarm’s aggregate BW exceeds botnet’s aggregate BW” Works for near-future scenarios as well! So, let’s calculate (10^6*10^7 bps)/10^4 = 10^9 bps ~1 Gbps This should be the average access link BW of a mailbox You must give very good incentive to deploy this More of this in evaluation

Routing and access control How and how much do you have to change routing, to use these multiple paths? Loose source routing of requests from server to mailbox…OK Although double IP headers for small request packets What happens in the forward path? So you want every packet to go through a different mailbox You need root privileges on client to do that Yet applet is used (zero-installation) Either users have to trust all applets or click “I grant root access” for every single website

Mailbox buffers Don’t forget that the number of actual packets at least doubles!!! Given ~ 1 Gbps access links, what about mailbox buffer sizes? Recent work on sizing router buffers cannot be used (B = (RTT*C)/sqrt(n)) You have no “number of flows”! Badly needs further research

Attacking routers Mailboxes and end-systems are protected What about simple routers? near the border of filter ring at clients

Deployment How can you build a filter ring of 4 ASes in diameter? Contract issues

TCP, UDP, xxxP Concerned about how TCP performs in a multi-path scenario – you’d better be But what about UDP? Significant connection establishment delay for a connectionless transport? More of this in evaluation Back to TCP: simply get rid of it (“we build a simple congestion control protocol”) on all nodes! 30 years of engineering (Postel, Cerf, Kahn, Jacobson, Floyd, Kuzmanovic…) Congestion only at access links: not anymore! FEC or retransmissions: “we could use both” Not TCP friendly: “cannot be” – really?

(The lack of ) Evaluation By far the weakest part of the paper Integration w/ DNS is NOT implemented Evaluation without a major function ready PlanetLab 10 mailboxes: good against VERY-VERY small botnets UDP probe traffic: fetching dynamic webpages w/ UDP??? 25 kBps: going retro??? Attack resilience: 25 kBps can be sustained – bravo! Simulation for scalability Mailbox access links: 10 Mbps (<< 1 Gbps needed) Gain vs. TVA: minimal – even by sending every packet 3x Acceptable connections: ~50% when 2M attackers – good against multimillion-node botnets???

Not only in the details… Complex with a lot of problems But it is worth it right? You (claim to) beat large-scale DDoS at last! Wait a minute…. Works only for fetching dynamic web-content from a single server with UDP at 25 kBps Oops…so this is not THE solution for DDoS