DDoS Attack Prevention by Rate Limiting and Filtering d’Artagnan de Anda CS239 Network Security 26 Apr 04.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

Why Is DDoS Hard to Solve? 1.A simple form of attack 2.Designed to prey on the Internet’s strengths 3.Easy availability of attack machines 4.Attack can.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
CIS 459/659 – Introduction to Network Security – Spring 2005 – Class 13 – 4/5/05 1 D-WARD 1  Goal: detect attacks, reduce the attack traffic, recognize.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
MULTOPS A data-structure for bandwidth attack detection Thomer M. Gil Vrije Universiteit, Amsterdam, Netherlands MIT, Cambridge, MA, USA
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
2005 Stanford Computer Systems Lab Flow Cookies Bandwidth Amplification as Flooding Defense Martin Casado, Pei Cao Niels Provos.
1 Controlling High Bandwidth Aggregates in the Network.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
CS682 Session 6 Prof. Katz. Firewalls An intelligent router? Used as a traffic control mechanism Based on information in the Layer 3 and 4 headers Administrator.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
March 1, Packet Classification and Filtering for Network Processors JC Ho.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
Chapter 6: Packet Filtering
Common Devices Used In Computer Networks
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
(c) University of Technology, Sydney Firewall Architectures.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Distributed Denial of Service Attacks
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Packet-Marking Scheme for DDoS Attack Prevention
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
CIS 459/659 – Introduction to Network Security – Spring 2005 – Class 12 – 3/24/05 1 Resource Limitations  Don’t allow an individual attack machine to.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
1 Defense Strategies for DDoS Attacks Steven M. Bellovin
1 Attacking DDoS at the Source Jelena Mirković, Gregory Prier, Peter Reiher University of California Los Angeles Presentation by: David Allen.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
Network Devices and Firewalls Lesson 14. It applies to our class…
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
An Introduction To ARP Spoofing & Other Attacks
CS590B/690B Detecting Network Interference (Fall 2016)
Outline Basics of network security Definitions Sample attacks
The Taming of The Shrew: Mitigating Low-Rate TCP-targeted Attack
Defending Against DDoS
Introduction to Networking
Firewalls.
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
DDoS Attack and Its Defense
Session 20 INST 346 Technologies, Infrastructure and Architecture
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

DDoS Attack Prevention by Rate Limiting and Filtering d’Artagnan de Anda CS239 Network Security 26 Apr 04

 Pushback Paper  NetBouncer  D-WARD Paper  Questions for Discussion Overview

 Filtering – requires real time algorithms, and most likely pre- deployment of resources for trust  Rate Limiting – Hard to prevent collateral damage to “good” and “poor” traffic v. just bad traffic Overview

Pushback  Ioannidis and Bellovin attempt to implement Pushback  Problem: We can’t tell legitimate traffic from illegitimate traffic  Goal: Develop heuristics that try to identify most bad packets while not disturbing most good packets.  Aggregate-based Congestion Control  A subset of the traffic with an identifiable property, e.g.:  Packets to destination D  TCP SYN packets  IP packets with a bad checksum  Identify “attack signature” -> “congestion signature”  Sort of recursive – It tells the next level of routers to back off, as it is backing off.  Rationale: The packets will be dropped at the destination anyway, so why not just drop them at the routers above too?

Pushback  Good architecting by allowing the pushback daemon to exist out of band.  Router must have some sort of inherent traffic shaping capability to take advantage of this  Only logs packets dropped for queue discipline reasons  pushbackd processes the saved drop-set to try to detect congestion.  “The exact algorithm(s) to run will be an important research topic for some time to come.”  The algorithm detects aggregates based only on IP destination address – the simplest implementation

Pushback  The pushback daemon listens for requests from its downstream routers. => Necessitates greater deployment  Probability of keeping a packet is inversely proportional to its size – smart!  “In a real router with hardware-assisted fast switching paths for the common cases, the overhead of imposing a number of rate limiting sessions may be much higher.”

Pushback  “Even though the prefix garnered from the routing table will be shorter than 32 bits, the address of the selected aggregate will be the full 32 bits.” Why? Because a specific machine is targeted.  “It is likely that more than one attack is happening at the same time.” Why? More than one attack does happen at the same time and one should design a system that works for the real world.  The algorithm should run in less time than it takes to collect the packets. Why? Queuing system theory: You want the server to operate faster than the queue can fill up.  “Pushback is most effective when the attack is non-isotropic. (most attack traffic close to victim and from a subset of the in-links)” Why? Smaller area to graph. More likely to have a complete deployment of Pushback in that area.

NetBouncer  Claim: NetBouncer can tell the difference between legitimate and illegitimate traffic in a hardware implementation of a router.  “End-point-based solution to DDoS protection  Goals:  No changes in current network protocols  No administrator intervention for legitimacy tests  State safety: legitimacy tests do not become vulnerabilities  “A NetBouncer device maintains a large legitimacy list of clients that have been proven to be legitimate”  Not on the legitimacy list? Administer tests to prove legitimacy.

NetBouncer  Use of TCP SYN cookies was a good idea  Interception of SYN packets  Handles TCP connection in a “stateless manner”  Good job addressing Application and Session-oriented legitimacy tests (structured- and ad hoc- composite services i.e., SCS and ACS). But…  “The ACS subcategory is currently a topic if intense research and will be reported in the future.

NetBouncer  NetBouncer “should be placed upstream of potential chokepoints…” How is this location determined? There really aren’t great places to deploy NetBouncer. Must be placed where it can handle all of the attack traffic. Otherwise, rate limiting before NetBouncer will reduce the good and bad traffic it sees.  Use of ICMP echo messages touted, and then acknowledged as not likely to be effective…  How does the list of legitimate sources get instantiated? This is hard to do.  “We are currently exploring how ICWFQ can be supported within the IXP based hardware prototype of NetBouncer.”

D-WARD  DDoS defense mechanism intended to be deployed at the source to detect and stop attacks by evaluating traffic signatures  Problems:  Attack traffic is too aggregated at the victim so it makes on-the-fly packet dropping difficult.  Core routers cannot spare enough resources to do a good job so much collateral damage is suffered from implementation there.  Solution: Stop attacks at the source

D-WARD  Configure outgoing addresses to be policed  Monitor traffic between these addresses and the rest of the internet.  Compare traffic against historical data and curtail deviating behavior. Autonomous adjustment.  Addresses TCP, ICMP, and UDP –  Definitions provided for “normal, suspicious, or attack”  # of machines attacking is transparent to the system

D-WARD  “We assume that D-WARD is able to identify the police address set.” Probably not a simple task. Fairly easy to identify what machines are in your own network.  “We assume that all machines from the police address set use the source router as the exit router” (i.e., Asymmetric routes – you have to check between every possible pair, with secure communication and clock synchronization, exposing more points to be attacked.)  What would be the maintenance cost of keeping the police address set up to date? Not much.  Most networks DO have more than one border router. D-WARD would be most effective if deployed on each border router.  Possibly, the correct assumption is that if an ISP chooses to implement this system on one border router, they would do so for all…

D-WARD  Hardware vs. Software Router  “and enable us [to] test whether D-WARD can handle traffic at high speeds.” Implemented on IXP-1200  Legitimate flows that start during the attack  Hash table size limitation  Detection of UDP packets  Cannot detect “the shrew” attack from non-spoofed sources. Can now detect some UDP traffic flows too.

Questions for Discussion  Will any of these DDoS prevention schemes be deployed?  Of the three papers, which is the most scalable?  Is it better to filter at the source or at the destination  How do we expose the benefits of every one filtering at the source?  Are we stuck with DDoS attacks forever?