Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.

Slides:



Advertisements
Similar presentations
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Advertisements

TCP Flooding. TCP handshake C S SYN C SYN S, ACK C ACK S Listening Store data Wait Connected.
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Availability Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Aspects of Computer.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 Reading Log Files. 2 Segment Format
1 A TCAM-based solution for integrated traffic anomaly detection and policy filtering Author: Zhijun Wang, Hao Che, Jiannong Cao, Jingshan Wang Publisher:
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
PERSISTENT DROPPING: An Efficient Control of Traffic Aggregates Hani JamjoomKang G. Shin Electrical Engineering & Computer Science UNIVERSITY OF MICHIGAN,
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Firewalls and Intrusion Detection Systems
Outline Definition Point-to-point network denial of service
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
A DoS-Limiting Network Architecture Presented by Karl Deng Sagar Vemuri.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Statistical based IDS background introduction. Statistical IDS background Why do we do this project Attack introduction IDS architecture Data description.
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Rocky K. C. Chang.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
“On Scalable Attack Detection in the Network” Ramana Rao Kompella, Sumeet Singh, and George Varghese Presented by Nadine Sundquist.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Detecting SYN Flooding Attacks Haining Wang, Dandle Zhang, Kang G. Shin Presented By Hareesh Pattipati.
A DoS Limiting Network Architecture An Overview by - Amit Mondal.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
The Security Aspect of Social Engineering Justin Steele.
Protocol(TCP/IP, HTTP) 송준화 조경민 2001/03/13. Network Computing Lab.2 Layering of TCP/IP-based protocols.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Protecting Web Servers from Content Request Floods Srikanth Kandula ▪ Shantanu Sinha ▪ Dina Katabi ▪ Matthias Jacob CSAIL –MIT.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Transmission Control Protocol TCP. Transport layer function.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
CSE 461 Section. Let’s learn things first! Joke Later!
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Packet-Marking Scheme for DDoS Attack Prevention
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
TCP Security Vulnerabilities Phil Cayton CSE
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
DoS/DDoS attack and defense
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
© 2002, Cisco Systems, Inc. All rights reserved..
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Outline Basics of network security Definitions Sample attacks
Introduction to Networking
Outline Basics of network security Definitions Sample attacks
دیواره ی آتش.
Firewalls.
Statistical based IDS background introduction
Session 20 INST 346 Technologies, Infrastructure and Architecture
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004

Overview SYN attack/floods Correlation between ”SYN” “FIN” ratio and “RST” How to detect deviations from these trends Solutions to detect and stop SYN attacks

Goals of authors To stop SYN attacks at leaf routers that connect users to internet Requires less overhead computation Stateless (simple) Make detection technique that is immune to flooding attacks

Syn Flood / Attack 90% of DoS attacks use TCP SYN floods Streaming spoofed TCP SYNs Takes advantage of three way handshake Server start “half-open” connections These build up… until queue is full and all additional requests are blocked

Problems with previous solutions Solutions such as: SYN cookies, SYNDefender, SYN proxying,SYNkil Knew nothing of source Relied on “costly IP traceback” These solutions are “statefull” so they can be overwhelmed by SYN attacks –14,000SYN/sec can overload

Flood Detection System (FDS) Stateless, simple, edge (leaf) routers Utilize SYN-FIN pair behavior Include (SYNACK - FIN) so client or server However, RST violates SYN-FIN behavior Placement: First/last mile leaf routers –First mile – detect large DoS attacker –Last mile – detect DDoS attacks that first mile would miss

SYN – FIN Behavior

Generally every SYN has a FIN

What to do about “RST” We can’t tell if RST is active or passive Consider 75% active Active represents a SYN passive does not Should balance out to be background noise RED – SYN BLUE- FIN BLACK – RST Make sense?

Statistical Attack Detection There are very many SYN’s necessary to accomplish a DoS attack At least 500 SYN/sec 1400 SYN/sec can overwhelm firewall 300,000 SYNs necessary to shut down server for 10 minutes So SYN-FIN ratio should be very skewed during an attack

False Positive Possibilities Many new online users with long sessions –More SYNs coming in than FINs A major server is down which would result in 3 SYNs to a FIN –Because clients would retransmit the SYN

CUSUM Algorithm Finding average number of FINs over a time period, and looking for a time period and testing for statistical homogeneity. If there are significant changes to this, then find when they changed.

Detection The algorithm will result in zero for all normal activity and cumulatively track (i.e. CUSUM = “cumulative sum”)

Detection The internet can be quite dynamic and too complicated for a parametric estimation, so we use sequential testing which requires much less computation Two aspects of detection: –1) False alarm time: the time without attacks between unique false alarms –2) Detection time: the detection delay after the attack starts. The goal is to minimize the second and maximize the first. However, the conflict and require trade offs

Performance Trends SYN-FIN

SYN attack vs Normal operation

Sensitivity of Detection 500 SYN/sec are required to shut down a server It takes a last mile FDS 20 seconds to detect 500 SYN/sec DDoS attack Once detected SYN defender could be used to protect victim

Detection is able to Distinguish between attacks and background noise Detect DDoS with last mile FDS Not effected by changes in overall traffic Detect attacks within seconds and implement protection. Do you think this would always work? Can you think of any exceptions??

Related Work SYN flood defense categories 1. Firewall based 2. Server based 3. Agent based 4. Router based

Firewall based Examples: SYN Defender, SYN proxying Filters packets and requests before router Maintains state for each connection Drawbacks: can be overloaded, extra delay for processing each packet

Server Based Examples: SYN Cache, SYN cookies SYN cache receives packets first and then uses a hash table, to partially store states, however much more streamlined than firewall. If the SYN-ACK is “acked” then the connection is established with the server.

SYN kill – this is kind of cool SYN kill monitors the network and if it detects SYNs that are not being acked, it automatically generates RST packets to free resources, also it classifies addresses as likely to be spoofed or legitimate… Performance???

MULTOPS Monitors the packets going to and from a victim and then blocks IPs from outside of network… limiting IP range of attack.

Route-based Distributed Packet filtering Uses packet information to determine if packet arriving at router has a spoofed Source / Destination addresses Results show many packets can be filtered and those that can’t can be traced back easily

Future Work Any ideas on how to break the SYN-FIN pair scheme?? Just send FINs along with the SYNs… Will result in more traffic… but what about DDoS that send FINs and SYNs

Alternatives to improve detection Monitoring SYN-ACK packets also SYN-ACKs wont go back through the same router that they originally passed through Backbone Router to Spoofed IP Router to Attacker Router to Victim

Can it work??? Spoofed address must be in different AS Also, if packet does not take same path back and forth from server it could possibly result in false positives Any other ways to beat it Large enough AS could spoof in AS Requires inter-FDS communication