John Kristoff DePaul Security Forum 2003 1 Network Defenses to Denial of Service Attacks John Kristoff +01 312 362-5878.

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

Why Is DDoS Hard to Solve? 1.A simple form of attack 2.Designed to prey on the Internet’s strengths 3.Easy availability of attack machines 4.Attack can.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
1 Controlling High Bandwidth Aggregates in the Network.
Security Forum 2001John Kristoff - DePaul University1 Network Firewalls John Kristoff DePaul University Chicago, IL
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Mitigating Bandwidth- Exhaustion Attacks using Congestion Puzzles XiaoFeng Wang Michael K. Reiter.
July 2008IETF 72 - NSIS1 Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-01 Se Gi Hong & Henning Schulzrinne.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
Firewalls CS591 Topics in Internet Security November Steve Miskovitz, Steve Peckham, Kan Hayashi.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Lecture 15 Denial of Service Attacks
Design and Implementation of SIP-aware DDoS Attack Detection System.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Lecture 11 Intrusion Detection (cont)
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Department Of Computer Engineering
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Seminar Presentation IP Spoofing Attack, detection and effective method of prevention. Md. Sajan Sana Ansari Id: /8/20151.
INTERNATIONAL NETWORKS At Indiana University Hans Addleman TransPAC Engineer, International Networks University Information Technology Services Indiana.
--Harish Reddy Vemula Distributed Denial of Service.
Chapter 5: Implementing Intrusion Prevention
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
GORAN OSIM AND TIM MYERS CPSC 424 DDOS AND THE SYSADMIN.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Distributed Denial of Service Attacks
Bandwidth Distributed Denial of Service: Attacks and Defenses.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Evaluate the Merits of Using Honeypots to Defend against Distributed Denial- of-Service Attacks on Web Servers By Cheow Lip Goh.
DDoS Attack on GENI Ilker Ozcelik and Richard Brooks* Clemson University Detecting a DDoS Attack is not the solution for Internet security. After gaining.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Packet-Marking Scheme for DDoS Attack Prevention
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
1 Defense Strategies for DDoS Attacks Steven M. Bellovin
1 ForeScout Technologies Inc. Frontline Defense against Network Attack Tim Riley, Forescout.
1 Distributed Denial of Service Attacks. Potential Damage of DDoS Attacks l The Problem: Massive distributed DoS attacks have the potential to severely.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
DoS/DDoS attack and defense
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Jessica Kornblum DSL Seminar Nov. 2, 2001 Hash-Based IP Traceback Alex C. Snoeren +, Craig Partridge, Luis A. Sanchez ++, Christine E. Jones, Fabrice Tchakountio,
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Denial-of-Service Attacks
Denial of Service Mitigation with OpenFlow using SciPass
Defending Against DDoS
Filtering Spoofed Packets
Who should be responsible for risks to basic Internet infrastructure?
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
DDoS Attack and Its Defense
Presentation transcript:

John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff

John Kristoff DePaul Security Forum DoS attack prevention is difficult Applications, hosts and networks are often significantly oversubscribed. Internet (data) traffic is naturally bursty on all time scales, thus discerning bad traffic from good can be hard. There is no one, easy thing to fix that will make the problem go away. Its been proposed that re-architecting the Internet is a solution, but no one wants to go through that pain.

John Kristoff DePaul Security Forum Visualizing DoS Attack Data

John Kristoff DePaul Security Forum Visualizing Bottlenecks

John Kristoff DePaul Security Forum What are the popular defenses? Block bogon, invalid and attack packets. Monitor traffic thresholds, patterns and trends. Rate limit traffic to help prevent oversubscription. Prevent end hosts from becoming DoS agents. Black hole victim hosts/networks. Maintain good incident response and support staff. As you might guess, no one defense solves it all.*

John Kristoff DePaul Security Forum In depth look at packet blocking Blocking invalid/bogon packets from reaching the net is generally considered a best practice. However, it may severely impact forwarding performance and be difficult to manage. Blocking on general attack characteristics may also block and break legitimate applications. Many ISPs mitigated the recent Slammer/Sapphire worm by temporarily blocking UDP port 1434 traffic.

John Kristoff DePaul Security Forum Traceback Enabled routers generate or encode trace information to the traced destination. Victims can use trace information to discover the real path back to the original source. Authentication, deployment and practical issues exist.

John Kristoff DePaul Security Forum Source path isolation engine Routers keep a hash of all packets passing through and send to a collector. To trace a packet, query the collector based on packet characteristics. SPIE can potentially trace a single packet. Significant scaling and deployment issues.

John Kristoff DePaul Security Forum Pushback A mechanism to signal downstream routers to aggressively drop/limit attack traffic. Routers must detect attack traffic. A similar problem shared by signature based filters. If attack traffic is widely distributed, pushback may be ineffective. IMHO, pushback and related techniques are the most interesting and elegant network-based solutions.

John Kristoff DePaul Security Forum Slammer/Sapphire the DoS attack

John Kristoff DePaul Security Forum Other defenses Legal action. Costly (in more ways than one) and problematic when crossing legislative borders. Mirror and distribute victims. Costly and management intensive. User education? Security Forum 2003! Thanks! Stop by for a visit at