1 Hop-Count Filtering: An Effective Defense Against Spoofed DDos Traffic Cheng Jin CS Department Caltech Pasadena Haining Wang CS Department College of.

Slides:



Advertisements
Similar presentations
A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Hop Count Filtering: An Effective Defense Against Spoofed DDoS Traffic Writers: Cheng Jin, CS Department Caltech Pasadena, Haining Wang, CS Department.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
Streaming Algorithms for Robust, Real- Time Detection of DDoS Attacks S. Ganguly, M. Garofalakis, R. Rastogi, K. Sabnani Krishan Sabnani Bell Labs Research.
Oct 26, 2004CS573: Network Protocols and Standards1 IP: Routing and Subnetting Network Protocols and Standards Autumn
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
SAVE: Source Address Validity Enforcement Protocol Jun Li, Jelena Mirković, Mengqiu Wang, Peter Reiher and Lixia Zhang UCLA Computer Science Dept 10/04/2001.
Examining IP Header Fields
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Routing.
Internetworking Devices that connect networks are called Internetworking devices. A segment is a network which does not contain Internetworking devices.
10/21/20031 Framework For Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Kavita Chada & Viji Avali CSCE 790.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #12 LSNAT - Load Sharing NAT (RFC 2391)
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
1 Semester 2 Module 6 Routing and Routing Protocols YuDa college of business James Chen
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Pi : A Path Identification Mechanism to Defend against DDos Attacks.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
10/8/2015CST Computer Networks1 IP Routing CST 415.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
CS4550 Computer Networks II IP : internet protocol, part 2 : packet formats, routing, routing tables, ICMP read feit chapter 6.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
Trajectory Sampling for Direct Traffic Oberservation N.G. Duffield and Matthias Grossglauser IEEE/ACM Transactions on Networking, Vol. 9, No. 3 June 2001.
Packet-Marking Scheme for DDoS Attack Prevention
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Routing and Routing Protocols
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
DoS/DDoS attack and defense
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Lecture 17 Page 1 CS 236, Spring 2008 Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Spoofing Prevention Method Srikanth T.S.S. Sri Lakshmi Ramya S.
Coping with Link Failures in Centralized Control Plane Architecture Maulik Desai, Thyagarajan Nandagopal.
IP Spoofing. What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
Pi: A Path Identification Mechanism to Defend Against DDoS Attacks
Forwarding and Routing IP Packets
Defending Against DDoS
RESOLVING IP ALIASES USING DISTRIBUTED SYSTEMS
Defending Against DDoS
Delivery and Routing of IP Packets
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
Delivery, Forwarding, and Routing of IP Packets
DDoS Attack and Its Defense
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

1 Hop-Count Filtering: An Effective Defense Against Spoofed DDos Traffic Cheng Jin CS Department Caltech Pasadena Haining Wang CS Department College of William and Mary Williamsburg Kang G. Shin EECS Department University of Michigan Ann Arbor CCS’03, October 27–31, 2003

1 Outline Introduction Hop-count inspection Feasibility of hop-count filtering Effectiveness of HCF Construction of HCF table Running states of HCF Resource Savings Related work Conclusion and future work

1 INTRODUCTION IP spoofing makes DDoS attack more difficult to defend against.  Conceal flooding sources and localities in flooding traffic  Coax legitimate hosts into becoming reflectors Two approaches to thwart DDoS attack  Router-based  Victim-based

1 INTRODUCTION Router-based : improve routing infrastructure  Off-line analysis of flooding traffic Off-line IP traceback  On-line filtering of DDoS traffic inside routers Rely on IP router enhancement Victim-based : enhances the resilience of Internet servers against attacks  Advantage of being immediately deployable  Current approach : resource management

1 INTRODUCTION Hop-Count Filtering (HCF)  Victim-based filtering  Using TTL field of IP header to determine hop counts  build an IP-to-hop count(IP2HC) mapping table using a moderate amount of storage clustering address prefixes based on hop-count.  pollution-proof method update procedure for the IP2HC mapping table that prevents pollution by HCF-aware attackers. IP2HC mapping table initialization and adding new IP addresses  Two running states : alert and action

1 HOP-COUNT INSPECTION TTL-based Hop-Count Computation The challenge in hop-count computation  a destination only sees the final TTL value. Final TTL value= initial TTL value – hop-count  cannot assume a single static initial TTL value for each IP address. Fortunately, most modern OSs use only a few initial TTL values, 30, 32, 60, 64, 128, 255.  most of these initial TTL values are far apart except {30,32} {60,64},{32,60}  Since Internet traces have shown that few Internet hosts are apart by more than 30 hops

1 HOP-COUNT INSPECTION Inspection Algorithm

1 FEASIBILITY OF HCF Hop-Count Stability The feasibility of HCF hinges on three factors:  (1) stability of hop-counts  (2) diversity of hop-count distribution  (3) robustness against possible evasions stability of hop-counts  Frequent changes in the hop-count excessive mapping updates out-of-date mapping  Dictated by the end-to-end routing behaviors two thirds of the Internet paths persist for either days or weeks 95%of the paths had fewer than five observable daily changes

1 FEASIBILITY OF HCF Diversity of Hop-Count Distribution a diverse hop-count distribution is critical to effective filtering. the hop-count distributions at all traceroute gateways  the Gaussian distribution (bell-shaped curve) is a good first- order approximation.  We are interested in the girth of a distribution  We are not making any definitive claim of whether hop-count distributions are Gaussian or not.  The largest percentage of IP addresses that have a common hop-count value is only 10%.

1 FEASIBILITY OF HCF Diversity of Hop-Count Distribution

1

1 most of the mean values fall between 14 and 19 hop

1 FEASIBILITY OF HCF Diversity of Hop-Count Distribution standard deviations between 3 and 5 hops.

1 FEASIBILITY OF HCF Robustness against Evasion The key for an attacker to evade HCF is to set an appropriate initial TTL value  build a priori an IP2HC mapping table that covers the entire random IP address space. attacker cannot observe the final TTL values of normal traffic at the victim. have to compromise at least one end-host behind every stub network whose IP addresses are in the random IP address space

1 FEASIBILITY OF HCF Robustness against Evasion Without compromising end-host  probe the hs value for the quiescent host (1) force the victim into the action state by launching a DDoS attack (2) probe the quiescent host and extract the latest value of its IP ID field of the header (3) send a spoofed packet with a tentative initial TTL (4) re-probe the quiescent host and check if its IP ID has increased by more than one.  accurate router-level topology of the Internet / the underlying routing algorithms and policies. topology maps are generally time-averaged approximations the routing policies are not disclosed to the public.

1 EFFECTIVENESS OF HCF Simple Attacks Single source  Given a single flooding source whose hop-count to the victim is h, let α h denote the fraction of IP addresses that have the same hop- count to the victim as the flooding source.  the fraction of spoofed IP addresses that cannot be detected is α h. The remaining fraction 1-α h will be identified and discarded by HCF. Multiple sources  n sources that flood a total of F packets, each flooding source generates F/n spoofed packets.  The fraction, Z, of identifiable spoofed packets generated by n flooding sources is:

1 EFFECTIVENESS OF HCF Simple Attacks

1

1 EFFECTIVENESS OF HCF Sophisticated Attackers

1 a uniform distribution  the range of possible hop-counts is [h i, h j ] where i ≤ j and H = j-i+1  the fraction of spoofed source IP addresses that have correct TTL values, is given as: initial TTLs within the range [h m,h n ], based on some known distribution  the probability of IP addresses with hop-count h k is p hk.  the fraction of the IP addresses that have a hop-count of h k is α hk,  the fraction of the spoofed IP packets that will not be caught by HCF is:

1 EFFECTIVENESS OF HCF Sophisticated Attackers Hop-count between 10~20,so H=11 Summation’s maximum=1 So maximum

1 EFFECTIVENESS OF HCF Sophisticated Attackers m=0,n=30

1 CONSTRUCTION OF HCF TABLE IP Address Aggregation objectives in building an HCF table are: (1) accurate IP2HC mapping, (2) up-to-date IP2HC mapping (3) moderate storage requirement. By aggregating IP address  reduce the space requirement of IP2HC  covers those unseen co-located IP addresses  Aggregation into 24-bit Address Prefixes straightforward to implement and can offer fast lookup a one-byte entry per network prefix for hop-count, the storage requirement is 2^24 bytes or 16 MB.  Aggregation with Hop-Count Clustering

1 CONSTRUCTION OF HCF TABLE IP Address Aggregation

1

1

1 CONSTRUCTION OF HCF TABLE Pollution-Proof Initialization and Update Keeping the IP2HC mapping up-to-date is necessary  initialization and dynamic update is through TCP connection establishment One way to ensure that only legitimate packets are used attacker cannot slowly pollute an HCF table by spoofing source IP addresses. may be too expensive to inspect and update with each newly- established TCP connection  user-configurable parameter to adjust the frequency of update. a counter p that records the number of established TCP connections p can also be a function of system load and hence, updates are made more frequently when the system is lightly-loaded.  mapping updates may require re-clustering hop-count changes are not a frequent event, the overhead incurred by re-clustering is negligible.

1 RUNNING STATES OF HCF

1 Introduction of the alert state  lowers the overhead of HCF  stop DRDoS HCF specifically looks for IP spoofing, so it will be able to detect attempts to fool servers into acting as reflectors. Blocking Bandwidth Attacks  detection and filtering (at the ISP’s edge router) of spoofed packets must be separated  One or more machines inside the stub network and the access router must run HCF  at least one machine inside the stub network maintain an updated HCF table

1 RUNNING STATES OF HCF

1 RESOURCE SAVINGS Building the Hop-Count Filter The test module  resides in the IP packet receive function, ip_rcv.  insert the filtering function before the expensive checksum verification. The hop-count mapping  4096-bucket hash table with chaining to resolve collisions.  Each entry in the hash table represents a 24-bit address prefix.  A binary tree is used to cluster hosts within each 24-bit address prefix. This tree can then be implemented as a linear array of 127 elements. Each element in the array stores the hop-count value of a particular clustering. the HCF-table update  insert the function call into the kernel TCP code

1 RESOURCE SAVINGS Experimental Evaluation

1 Without HCF,CPU cycles=a*t D +b*t L With HCF,CPU cycles=(1-α)*a*t DF +α*a*td+b*(t L +t LF )

1 RELATED WORK Despoof compares the TTL of a received packet with the actual TTL of a test packet sent to the source IP address Requires the administrator to determine,and manually verify. High overhead Detecting spoofed packets. S. Templeton/K. Levitt. using TTL for detecting spoofed packet ingress filtering blocks spoofed packets at edge routers, Rely on wide-eployment in IP routers. route-based distributed packet filtering (DPF) Given the reachability constraints

1 RELATED WORK SAVE builds a table of incoming source IP addresses at each router associates each of its incoming interfaces with a set of valid incoming network Path Identifier (Pi) IP traceback marking a path fingerprint in each packet

1 CONCLUSION FUTURE WORK HCF  Can detect and discard spoofed IP  Without router support  Using moderate storage NAT (Network Address Translator)  each of which may connect multiple stub networks,  could make a single IP address appear to have multiple valid hop-counts at the same time install the HCF system at a victim site for practical use