Towards Robust Protocol Design: 4 Ways to Kill TCP without Much Trouble Aleksandar Kuzmanovic Northwestern University

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

Michele Pagano – A Survey on TCP Performance Evaluation and Modeling 1 Department of Information Engineering University of Pisa Network Telecomunication.
When TCP Friendliness Becomes Harmful Amit Mondal Aleksandar Kuzmanovic Northwestern University
TCP Vegas: New Techniques for Congestion Detection and Control.
Ph.D. Thesis Presentation Aleksandar Kuzmanovic Edge-based Inference, Control, and DoS Resilience for the Internet.
Rice Networks Group Aleksandar Kuzmanovic Edward W. Knightly Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew.
Camarillo / Schulzrinne / Kantola November 26th, 2001 SIP over SCTP performance analysis
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
School of Information Technologies TCP Congestion Control NETS3303/3603 Week 9.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #05: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
The Power of Explicit Congestion Notification Aleksandar Kuzmanovic Northwestern University
Rice Networks Group Aleksandar Kuzmanovic & Edward W. Knightly TCP-LP: A Distributed Algorithm for Low Priority Data Transfer.
Rice Networks Group Ph.D. Thesis Proposal Aleksandar Kuzmanovic Edge-based Inference and Control in the Internet.
Presented by Prasanth Kalakota & Ravi Katpelly
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168) Limited Transmit (RFC 3042)
A Poisoning-Resilient TCP Stack Amit Mondal Aleksandar Kuzmanovic Northwestern University
High-performance bulk data transfers with TCP Matei Ripeanu University of Chicago.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Rice Networks Group Aleksandar Kuzmanovic Edward W. Knightly Rice University R. Les Cottrell SLAC/SCS-Network Monitoring.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
Defending Against Low-rate TCP Attack: Dynamic Detection and Protection Haibin Sun John C.S.Lui CSE Dept. CUHK David K.Y.Yau CS Dept. Purdue U.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
Low-Rate TCP- Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants) Written by: Aleksandar Kuzmanovic Edward W. Knightly SIGCOMM’03,
1 TCP-LP: A Distributed Algorithm for Low Priority Data Transfer Aleksandar Kuzmanovic, Edward W. Knightly Department of Electrical and Computer Engineering.
Countering Large-Scale Internet Pollution and Poisoning Aleksandar Kuzmanovic Northwestern University
Random Early Detection Gateways for Congestion Avoidance
Transport Layer3-1 Announcement r Homework 2 in tonight m Will be graded and sent back before Th. class r Midterm next Tu. in class m Review session next.
Advanced Computer Networks: TCP Congestion Control 1 TCP Congestion Control Lecture material taken from “Computer Networks A Systems Approach”, Fourth.
Low-Rate TCP-Targeted Denial of Service Attacks Presenter: Juncao Li Authors: Aleksandar Kuzmanovic Edward W. Knightly.
Low-Rate TCP Denial of Service Defense Johnny Tsao Petros Efstathopoulos Tutor: Guang Yang UCLA 2003.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Advanced Computer Networks : RED 1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking,
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 25: Network security Slides used with permissions.
Whither Congestion Control? Sally Floyd E2ERG, July
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
Towards a Scalable and Secure VoIP Infrastructure Towards a Scalable and Secure VoIP Infrastructure Lab for Advanced Networking Systems Director: David.
Advanced Network Architecture Research Group 2001/11/149 th International Conference on Network Protocols Scalable Socket Buffer Tuning for High-Performance.
3: Transport Layer3b-1 Principles of Congestion Control Congestion: r informally: “too many sources sending too much data too fast for network to handle”
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Fairness Attacks in the eXplicit Control Protocol Christo Wilson Christopher Coakley Ben Y. Zhao University of California Santa Barbara.
TCP/IP Vulnerabilities
CSE679: Computer Network Review r Review of the uncounted quiz r Computer network review.
Advanced Network Architecture Research Group 2001/11/74 th Asia-Pacific Symposium on Information and Telecommunication Technologies Design and Implementation.
HighSpeed TCP for High Bandwidth-Delay Product Networks Raj Kettimuthu.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen, Mohammad Malli, Chadi Barakat PLANETE group, INRIA.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
Computer Networking Lecture 18 – More TCP & Congestion Control.
TCP: Transmission Control Protocol Part II : Protocol Mechanisms Computer Network System Sirak Kaewjamnong Semester 1st, 2004.
1 SIGCOMM ’ 03 Low-Rate TCP-Targeted Denial of Service Attacks A. Kuzmanovic and E. W. Knightly Rice University Reviewed by Haoyu Song 9/25/2003.
PCP: Efficient Endpoint Congestion Control NSDI, 2006 Thomas Anderson, Andrew Collins, Arvind Krishnamurthy and John Zahorjan University of Washington.
TCP Congestion Control 컴퓨터공학과 인공지능 연구실 서 영우. TCP congestion control2 Contents 1. Introduction 2. Slow-start 3. Congestion avoidance 4. Fast retransmit.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
© 2002, Cisco Systems, Inc. All rights reserved..
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
1 ICCCN 2003 Modelling TCP Reno with Spurious Timeouts in Wireless Mobile Environments Shaojian Fu School of Computer Science University of Oklahoma.
Denial of Service Attacks
Topics discussed in this section:
COMP 431 Internet Services & Protocols
TCP-LP Distributed Algorithm for Low-Priority Data Transfer
Aleksandar Kuzmanovic
TCP-LP: A Distributed Algorithm for Low Priority Data Transfer
Removing Exponential Backoff from TCP
Lecture 19 – TCP Performance
Self Organized Networks
Lecture 6, Computer Networks (198:552)
Presentation transcript:

Towards Robust Protocol Design: 4 Ways to Kill TCP without Much Trouble Aleksandar Kuzmanovic Northwestern University

A. Kuzmanovic Towards Robust Protocol Design 2 The Internet 1969 The system of astonishing scale and complexity 2007

A. Kuzmanovic Towards Robust Protocol Design 3 Denial of Service Problem Assumption –Trust and cooperation among endpoints Denial of Service Attacks –A malicious way to consume resources in a network, a server cluster or in an end host, thereby denying service to other legitimate users FBI Computer Crime & Security Survey: –Overall financial losses: $201,000,000 –Denial of Service: $65,000,000

A. Kuzmanovic Towards Robust Protocol Design 4 Approach Should we find ways to defend the Internet from DoS attacks? –Of course! Anticipating novel types of DoS attacks is essential –More relevant and more challenging My focus: TCP –More than 90% of traffic today is TCP

A. Kuzmanovic Towards Robust Protocol Design 5 Outline Brief background on TCP Four ways to kill TCP –Shrew attacks –Padding misbehavior –TCP poisoning attacks –Receiver-driven TCP stacks

A. Kuzmanovic Towards Robust Protocol Design 6 Slow-start phase Double the sending rate each round-trip... time Reach high throughput...quickly TCP Congestion Control

A. Kuzmanovic Towards Robust Protocol Design 7 TCP Congestion Control Additive Increase –...Multiplicative Decrease Fairness among flows

A. Kuzmanovic Towards Robust Protocol Design 8 TCP Congestion Control Exponential.backoff System stability Vulnerability to.....high-rate attacks

A. Kuzmanovic Towards Robust Protocol Design 9 TCP is vulnerable to low-rate DoS attacks Shrew Attacks

A. Kuzmanovic Towards Robust Protocol Design 10 Shrew Very small but aggressive mammal that ferociously attacks and kills much larger animals with a venomous bite Reviewer 3: “only some shrews are venomous and the amount of venom in even the venomous species is very mild.”

A. Kuzmanovic Towards Robust Protocol Design 11 TCP: a Dual Time-Scale Perspective Two time-scales fundamentally required –RTT time-scales (~ ms) AIMD control –RTO time-scales (RTO=SRTT+4*RTTVAR) Avoid congestion collapse Lower-bounding the RTO parameter: –[AllPax99]: minRTO = 1 sec to avoid spurious retransmissions –RFC2988 recommends minRTO = 1 secRFC2988

A. Kuzmanovic Towards Robust Protocol Design 12 The Shrew Attack

A. Kuzmanovic Towards Robust Protocol Design 13 A short burst (~RTT) sufficient to create outage Outage – event of correlated packet losses that forces TCP to enter RTO mechanism The Shrew Attack

A. Kuzmanovic Towards Robust Protocol Design 14 The outage synchronizes all TCP flows –All flows react simultaneously and identically backoff for minRTO The Shrew Attack

A. Kuzmanovic Towards Robust Protocol Design 15 Once the TCP flows try to recover – hit them again Exploit protocol determinism The Shrew Attack

A. Kuzmanovic Towards Robust Protocol Design 16 And keep repeating… RTT-time-scale outages inter-spaced on minRTO periods can deny service to TCP traffic The Shrew Attack

A. Kuzmanovic Towards Robust Protocol Design 17 l/T << 1 Low-rate flow is hard to detect –Most counter-DOS mechanisms tuned for high-rate attacks –Detecting Shrews may have unacceptably many false alarms (due to legitimate bursty flows) Shrews are Hard to Detect

A. Kuzmanovic Towards Robust Protocol Design 18 Outline Brief background on TCP Four ways to kill TCP –Shrew attacks –Padding misbehavior –TCP poisoning attacks –Receiver-driven TCP stacks

A. Kuzmanovic Towards Robust Protocol Design 19 The Source of the Problem TCP optimized for throughput –Interactive applications may suffer telnet, ssh, games, chat… RTO improvement A B CD Incentive for misbehavior!

A. Kuzmanovic Towards Robust Protocol Design 20 data packets “dummy” packets strict priority TCP-fair rate Padding misbehavior Upgrading Mice to Elephants

A. Kuzmanovic Towards Robust Protocol Design 21 Implication Packet switched => Circuit switched

A. Kuzmanovic Towards Robust Protocol Design 22 REDFIFO Fully-backlogged flows always achieve gain relative to interactive flows Gain

A. Kuzmanovic Towards Robust Protocol Design 23 Short-term padding with dummy packets –Enable that a packet loss is detected via fast retransmit mechanism – Actual packet followed by three tiny dummy packets. A diversity approach – TCP sends k (k>1, k is a small integer) copies of the packet without violating congestion control mechanism – In reality k=2 is sufficient Sustainable Countermeasures Both approaches de-motivate greedy users from using the fully-backlogged approach

A. Kuzmanovic Towards Robust Protocol Design 24 Outline Brief background on TCP Four ways to kill TCP –Shrew attacks –Padding misbehavior –TCP poisoning attacks –Receiver-driven TCP stacks

A. Kuzmanovic Towards Robust Protocol Design 25 A TCP Poisoning Attack Background –Mis-configured load balancers can reset TCP connections –Simply send a RST packet to an endpoint Implication –Monitoring -> DoS attacks Just send a bogus packet and poison an endpoint –TCP behaves as a dummy state machine Both control and data planes are vulnerable

A. Kuzmanovic Towards Robust Protocol Design 26 Large-Scale TCP Poisoning Attacks C1 C2 Cn A1 A2 Server Example –Poison clients instead of a server

A. Kuzmanovic Towards Robust Protocol Design 27 Why Not Cryptography? Explicit monitoring required in networks –Advanced congestion control protocols (e.g., XCP) –Intrusion-detection mechanisms Not implemented widely –E.g., IPSec Even cryptography won’t help –Key exchange vulnerable to poisoning

A. Kuzmanovic Towards Robust Protocol Design 28 Our Approach Deferred protocol reaction –Attack detection Forward nonces –Distinguish packet streams from different hosts Self-clocking based correlation –Identify the valid packet stream

A. Kuzmanovic Towards Robust Protocol Design 29 How long to defer?

A. Kuzmanovic Towards Robust Protocol Design 30 Forward Nonces FNPNFNPNFNPNFNPN … FNPNFN … Chaining mechanism to distinguish among different packet sources Past and future nonce 8-bit random numbers Overhead: 2 bytes/packet

A. Kuzmanovic Towards Robust Protocol Design 31 Server Client IATi IDTi+1 IDTi+2 IDTi IATi+1 IATi+2 ACKi ACKi+1 ACKi+2 ACKi+3 DATAi DATAi+1 DATAi+2 DATAi+3 Self Clocking Based Correlation Idea: Exploit strong correlation among inter- departure and inter-arrival times at an endpoint

A. Kuzmanovic Towards Robust Protocol Design 32 Evaluation Our approach dramatically improves performance over standard TCP

A. Kuzmanovic Towards Robust Protocol Design 33 Outline Brief background on TCP Four ways to kill TCP –Shrew attacks –Padding misbehavior –TCP poisoning attacks –Receiver-driven TCP stacks

A. Kuzmanovic Towards Robust Protocol Design 34 Why Receiver-Based TCP? Example: Busy web server –Receiver-based TCP distributes the state management across a large number of clients Generally –Whenever a feedback is needed from the receiver, receiver- based TCP has advantage over sender-based schemes due to the locality of information Benefits [RCP03] Performance Functionality - Loss recovery- Seamless handoffs - Congestion control- Server migration - Power management for - Bandwidth aggregation mobile devices - Web response times - Network-specific congestion control

A. Kuzmanovic Towards Robust Protocol Design 35 Vulnerability Receivers remotely control servers by deciding which packets and when to be sent Receivers have both means and incentive to manipulate the congestion control algorithm –Means: open source OS –Incentive: faster web browsing & file download

A. Kuzmanovic Towards Robust Protocol Design 36 An Example: Request-Flood Attack Request flood attack –A misbehaving receiver floods the server with requests, which replies and congests the network

A. Kuzmanovic Towards Robust Protocol Design 37 Conclusions Think of attacks, not just defenses –More challenging and more relevant Robust protocol design –Avoid determinism whenever you can –Understand extreme scenarios –Explore novel defense mechanisms E.g., use measurements to achieve DoS resilience –Anticipate effects before applying a change

A. Kuzmanovic Towards Robust Protocol Design 38 Thank You! More information available at – Questions?