Kill-Bots: Surviving DDoS Attacks That Mimic Legitimate Browsing Srikanth Kandula Dina Katabi, Matthias Jacob, and Arthur Berger.

Slides:



Advertisements
Similar presentations
Client Puzzles A Cryptographic Defense Against Connection Depletion Attacks Most of slides come from Ari Juels and John Brainard RSA Laboratories.
Advertisements

CS 443 Advanced OS Fabián E. Bustamante, Spring 2005 Resource Containers: A new Facility for Resource Management in Server Systems G. Banga, P. Druschel,
Slides mostly by Sherif Khattab 1 Denial-of-Service [Gligor, 84] ``A group of otherwise-authorized users of a specific service is said to deny service.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
5/18/2015 Samarpita Hurkute DDoS Defense By Offense 1 DDoS Defense by Offense Michael Walfish,Mythili Vutukuru,Hari Balakrishnan,David Karger,Scott Shenker.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
PERSISTENT DROPPING: An Efficient Control of Traffic Aggregates Hani JamjoomKang G. Shin Electrical Engineering & Computer Science UNIVERSITY OF MICHIGAN,
CS470, A.SelcukReal-Time Communication Issues1 Real-Time Communication Security IPsec & SSL Issues CS 470 Introduction to Applied Cryptography Instructor:
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
2005 Stanford Computer Systems Lab Flow Cookies Bandwidth Amplification as Flooding Defense Martin Casado, Pei Cao Niels Provos.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
Mitigating Bandwidth- Exhaustion Attacks using Congestion Puzzles XiaoFeng Wang Michael K. Reiter.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Network Attacks. Network Trust Issues – TCP Congestion control – IP Src Spoofing – Wireless transmission Denial of Service Attacks – TCP-SYN – Name Servers.
Lecture 15 Denial of Service Attacks
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
DDoS Protection, An Inside Look The 3 main types of attacks Will I be victim ? Why Us ? The Top 3 Misconceptions Fact vs Fiction A Realistic Defense.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Firewalls. Similar to streaming a Video … Browser Network HTTP Requests Get: image.png HTTP Requests Get: image.png HTTP Requests Get: video.avi HTTP.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Network Security Denial of Service Attacks Dina Katabi nms.csail.mit.edu/~dina.
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds Srikanth Kandula, Dina Katabi, Matthias Jacob, and Arthur Berger Awarded Best Student.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Final Introduction ---- Web Security, DDoS, others
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Protecting Web Servers from Content Request Floods Srikanth Kandula ▪ Shantanu Sinha ▪ Dina Katabi ▪ Matthias Jacob CSAIL –MIT.
Transmission Control Protocol TCP. Transport layer function.
Detecting Targeted Attacks Using Shadow Honeypots Authors: K.G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A.D. Keromytis Published:
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Network & WebSecurity Dina Katabi nms.csail.mit.edu/~dina.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Mehmud Abliz, Taieb Znati, ACSAC (Dec., 2009). Outline Introduction Desired properties Basic scheme Improvements to the basic scheme Analysis Related.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
Fat Virtual Access Points Taken from Srikanth Kandula.
ACM Conference on Computer and Communications Security 2006 Puppetnet: Misusing web browsers as a distributed attack infrastructure Network Seminar Presenter:
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
© 2002, Cisco Systems, Inc. All rights reserved..
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Using Rhythmic Nonces for Puzzle-Based DoS Resistance Ellick M. Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, and Daniel Rebolledo University of.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
KEYNOTE OF THE FUTURE 3: DAVID BECKETT CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
Denial-of-Service Attacks
Comparison of Network Attacks COSC 356 Kyler Rhoades.
DDoS Attacks on Financial Institutions Presentation
Outline Basics of network security Definitions Sample attacks
A Cryptographic Defense Against Connection Depletion Attacks
A Cryptographic Defense Against Connection Depletion Attacks
Outline Basics of network security Definitions Sample attacks
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Presentation transcript:

Kill-Bots: Surviving DDoS Attacks That Mimic Legitimate Browsing Srikanth Kandula Dina Katabi, Matthias Jacob, and Arthur Berger

CyberSlam = DDoS that Mimics Legitimate Browsing

GET File.zip DO DBQuery 20,000+ zombies issue requests that mimic legitimate browsing Requests Look Legitimate  Standard filters don’t help CyberSlam

CyberSlam Attacks Happen! Instances of CyberSlam o First FBI DDoS Case – Hired professionals hit competitor o Mafia extorts online gaming sites … o Code RED Worm Why CyberSlam? o Avoid detection by NIDS & firewalls o High pay-off by targeting expensive resources E.g., CPU, DB, Disk, processes, sockets o Large botnets are available

Threat Model In scope o Attacks on higher layer bottlenecks, e.g., CPU, Memory, Database, Disk, processes, … o Attacks that fool the server to congest its uplink bandwidth o Mutating attacks Outside the scope o Flooding server’s downlink (prior work) o Live-lock in the device driver

Tentative Solutions Filter big resource consumers? Passwords? Computational puzzles? ????  No big consumers; Commodity OS do not support fine-grained resource accounting  Might not exist, expensive to check  Computation is abundant in a botnet

Reverse Turing Test (e.g., CAPTCHAs) to distinguish humans from zombies But… Partial Solution:

3 Problems with CAPTCHA Authentication (2) Bias against users who can’t or won’t answer CAPTCHAs Can’t see it (1) DDoS the authentication mechanism (connect to server, force context-switches, hog sockets etc.) (3) How to divide resources between service and authentication as to maximize system goodput? NONO

Kill-Bots’ Contributions First to protect against CyberSlam Solves problems with CAPTCHAs: o Cheap stateless authentication o Serves legit. users who don’t answer CAPTCHAs o Optimal balance between authentication & service Improves performance during Flash Crowds Order of magnitude improvement in goodput & response time

Kill-Bots is a kernel extension for web servers No Overhead Normal SuspectedAttack LOAD > L 1 LOAD < L 2 < L 1 New Clients are authenticated once and given HTTP Cookie

Authentication vulnerable to DDoS Problem 1:

Authentication vulnerable to DDoS Check cookie, socket, reserve buffers Causes context switch, buffer copies SYN HTTP Request SYNACKACK SYNACK TCP FIN Send CAPTCHA ServerClient Problem 1: SYN Cookie Standard Network Stack Resources are reserved till client sends a FIN but zombies don’t FIN

Authentication vulnerable to DDoS Problem 1: Modify network stack to issue CAPTCHAs without state Solution:

Authentication vulnerable to DDoS SYN Cookie Drop; SYN SYNACK TCP FIN Send CAPTCHA Kill-Bots Server Client Problem 1: Check cookie, send CAPTCHA without a socket! Solution: Modified Network Stack SYNACKACK HTTP Request Modify network stack to issue CAPTCHAs without state Stateless & Cheap Keep congestion control semantics No browser mods. Stateless & Cheap Keep congestion control semantics No browser mods.

Legit. Users who don’t answer CAPTCHA Use reaction to CAPTCHA Humans (1)Answer CAPTCHA (2) Reload; if doesn’t work, give up Zombies Can’t answer CAPTCHA, but have to bombard the server with requests Solution: Count the unanswered CAPTCHAs per IP, and drop if more than T; Problem 2: COUNTER Bloom Filter increase give captcha decrease correct ans. Cheap with a Bloom Filter

Stage 1: CAPTCHA Authentication Learn IP addresses of zombies using Bloom filter Stage 2: Use only Bloom filter for Authentication No CAPTCHAs Users who don’t answer CAPTCHAs can access the server despite the attack in Stage 2 Bloom Learns All Zombie IPs

To Authenticate or To Serve? Problem 3:

Authenticate all new arrivals  can’t serve all authenticated clients Authenticate very few arrivals  too few legitimate users are authenticated Authenticate new clients with prob.  (drop others)  A form of admission control with 2 arrival types But what  maximizes goodput? Solution: Problem 3: To Authenticate or To Serve?

Analysis Modeled system using Queuing Theory Found Optimal  * (proof in paper) But  * depends on many unknown parameters attack rate mean service time mean session size legitimate request rate, etc…

Kill-Bots adapts the authentication prob. by measuring fraction of time CPU is idle Solution to Problem 3:

Analysis says: if idle > 0,  is prop. to (1- idle) Say you want to keep server busy 90% of time: Kill-Bots adapts the authentication prob. by measuring fraction of time CPU is idle

Solution to Problem 3: Analysis says: if idle > 0,  is prop. to (1- idle) Say you want to keep server busy 90% of time: Kill-Bots adapts in real time Kill-Bots adapts the authentication prob. by measuring fraction of time CPU is idle

Solution to Problem 3: Analysis says: if idle > 0,  is prop. to (1- idle) Say you want to keep server busy 90% of time: Kill-Bots adapts in real time Kill-Bots adapts the authentication prob. by measuring fraction of time CPU is idle

Tying it Together

Recap: Kill-Bots addresses CyberSlam DDoS the authentication Serve legitimate users who don’t answer CAPTCHAs Divide resources between authentication & service Problem Solution Send CAPTCHAs cheaply without sockets Use reaction to CAPTCHA to identify zombies Adaptive authentication as admission control

Attacks & Defenses Replay Attacks? o Don’t work. Limit #connections per cookie Spoof IP, cause Bloom filter to block o Doesn’t happen. SYN cookie before updating Bloom Breaking the CAPTCHA? o Kill-bots can use any Reverse Turing Test

Performance

Wide-area Evaluation Using PlanetLab Legit. users are driven from CSAIL Web traces >25,000 attackers on PlanetLab request random pages 60% of legitimate users answer CAPTCHAs

Metrics Goodput (of Legitimate Users) Response time (of Legitimate Users) Maximum survivable attack rate

Kill-Bots under DDoS Goodput of Legit. (Mb/s) Attack Rate (Request/sec)

Kill-Bots under DDoS Goodput of Legit. (Mb/s) Attack Rate (Request/sec) Response Time (sec) Attack Rate (Request/sec)

Kill-Bots under DDoS Goodput of Legit. (Mb/s) Attack Rate (Request/sec) Response Time (sec) Attack Rate (Request/sec) 5-10 times better Goodput and Response Time

Why Adapt the Authentication Probability? Goodput of Legit. (Mb/s) Attack Rate (Request/sec) Server with adaptive authentication Server with authentication Base server Adaptive  is much better than authenticating every new user

Kill-Bots under Flash Crowd Goodput of legit. (Mb/s) Response Time (sec) Time (sec) Flash Crowd

Goodput of legit. (Mb/s) Response Time (sec) Time (sec) Flash Crowd Orders of magnitude better Response Time

Response Time (sec) Time (sec) Authentication Prob.  Time (sec) Flash Crowd Kill-Bots under Flash Crowd Adaptive  provides admission control

Response Time (sec) Time (sec) Kill-Bots under Flash Crowd Kill-Bots authenticates new clients only if it can serve them… 80,000360,000Number of dropped legitimate requests Kill-BotsBase Server

Kill-Bots’ Contributions First to protect Web servers from DDoS attacks that mimic legitimate browsing First to deal with CAPTCHA’s bias against legitimates users who don’t solve them Sends CAPTCHA and checks answer without any server state Addresses both DDoS attacks and Flash Crowds Orders of magnitude better response time, goodput, and survivable attack rate