This is not an impossible architecture – Incremental Deployment Compatible Unlike any previous papers, this paper addresses a lot of issues connected.

Slides:



Advertisements
Similar presentations
Martin Suchara, Ryan Witt, Bartek Wydrowski California Institute of Technology Pasadena, U.S.A. TCP MaxNet Implementation and Experiments on the WAN in.
Advertisements

Security Issues In Mobile IP
Shutup An E2E Approach to DoS Defense Paul Francis Saikat Guha Cornell.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
NETWORK LAYER (1) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
A Survey of Secure Wireless Ad Hoc Routing
Phalanx: Withstanding Multimillion-Node Botnets Colin Dixon Arvind Krishnamurthy Tom Anderson University of Washington NSDI 2008.
Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Internet Celio Albuquerque, Brett J. Vickers, Tatsuya Suda 1.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
A DoS-limiting Network Architecture CSCE 715: Fall’06 Presentation by: Amit Jain Shantnu Chaturvedi.
2005 Stanford Computer Systems Lab Flow Cookies Bandwidth Amplification as Flooding Defense Martin Casado, Pei Cao Niels Provos.
A DoS-Limiting Network Architecture Presented by Karl Deng Sagar Vemuri.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
Internet Networking Spring 2003
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
A DoS Limiting Network Architecture An Overview by - Amit Mondal.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
QOS مظفر بگ محمدی دانشگاه ایلام. 2 Why a New Service Model? Best effort clearly insufficient –Some applications need more assurances from the network.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
1 Flow Identification Assume you want to guarantee some type of quality of service (minimum bandwidth, maximum end-to-end delay) to a user Before you do.
CS4550 Computer Networks II IP : internet protocol, part 2 : packet formats, routing, routing tables, ICMP read feit chapter 6.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
2000 년 11 월 20 일 전북대학교 분산처리실험실 TCP Flow Control (nagle’s algorithm) 오 남 호 분산 처리 실험실
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Internet Protocol: Routing IP Datagrams Chapter 8.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Deadline-based Resource Management for Information- Centric Networks Somaya Arianfar, Pasi Sarolahti, Jörg Ott Aalto University, Department of Communications.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
DoS/DDoS attack and defense
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
4343 X2 – The Transport Layer Tanenbaum Ch.6.
Spring Computer Networks1 Congestion Control Sections 6.1 – 6.4 Outline Preliminaries Queuing Discipline Reacting to Congestion Avoiding Congestion.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
First generation firewalls packets filtering ريماز ابراهيم محمد علي دعاء عادل محمد عسجد سامي عبدالكريم.
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Chapter 11 User Datagram Protocol
Internet Networking recitation #9
Topics discussed in this section:
Chapter 4 Data Link Layer Switching
Hubs Hubs are essentially physical-layer repeaters:
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
A DoS-limiting Network Architecture
Hubs Hubs are essentially physical-layer repeaters:
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Presentation transcript:

This is not an impossible architecture – Incremental Deployment Compatible Unlike any previous papers, this paper addresses a lot of issues connected to DoS attacks This paper comes from the author of Active Networks! Remember the 835 citations? This paper has 83 citations and was regarded as a powerful technique by many authors. These techniques are powerful because they seek to block or explicitly limit unauthorized users…

This presentation was inspired from D. Witherall’s original work Presentation by: Rahul Potharaju

Ingress filtering Traceback Fair Queuing SOS, MayDay SIFF Discards packets with widely spoofed addresses at the edge of the network Uses routers to create state so that receivers can reconstruct the path of unwanted traffic Each flow gets its fair share of Bottleneck bandwidth Rely on an offline authenticator Refines the previously proposed capability approach Attack packets are dropped before they arrive at the destination! k hosts attacking a destination would lower the bandwidth by 1/k Requires prior-arrangement Doesn’t concentrate much on security of proposed method

The base already existed and improving – TVA is a robust approach to the earlier proposed methods using capabilities It allows the destination to control what it receives – No more false bills! Overcomes the shortcomings of current packet filtering techniques Automated validation of senders without prior arrangement Ensures that any two nodes can communicate regardless of the ‘k’ malicious nodes

Capabilities must be granted by the destination to the sender, so that they can be stamped on packets. Capabilities must be unforgeable and not readily transferable across senders and destinations Routers must be able to verify capabilities without trusting hosts. Capabilities must expire so that a destination can cut off a sender from whom it no longer wants to receive packets. Capabilities must add little overhead in the common case.

The network must discard unwanted packets before they reach the destination  Each packet must carry information that tells a router whether it is wanted by the destination in the first place. And that’s it… couldn’t be much simpler than this! The explicit identification information is known as Capability

SenderRouter Destination Request (Part of TCP SYN packet) Response (Part of TCP SYN/ACK packet) Routers add pre-capabilities Adds capabilities

Initial request channel should not be open to DoS attacks either by: Flooding the destination Rate limit requests at all network locations so that they cannot consume all bandwidth Request packets comprise only 5% of the total link capacity Blocking the requests of legitimate senders Use per-source fair queuing to ensure that no source can overwhelm others Spoofing? No problem because PSFQ requires authenticated source identifier

Path Identifier – Each router at the trust boundary tags (16—bit values) the packet with a small value derived from its incoming interface – Identifies the upstream party Fair queue requests using the tag to identify a queue Two Advantages: Tag space is bounded  Number of queues is bounded  Router resources are bounded Uses Trust domains

Rate-limited Preferential Remaining Bandwidth

This is a matter of policy, and it depends on the role, the destination plays in the network. Client -> Server possible but other way not possible (firewalls, NAT etc.) Public server -> Clients: Grant all requests with a default number of bytes and timeout, using the path identifier to fairly serve different sources when the load is high. If ( senders_action == misbehave ) Add sender to blacklist As a result: Sender’s capability will expire

Hashing Mechanism = f ( source IP, destination IP, timestamp, router secret) Each router that forwards a request packet generates its own pre-capability and attaches it to the packet. Router secret is changed at twice the rate of the timestamp rollover, and uses the previous secret to validate capability.  Pre-Capability expires within at most the timestamp rollover period and each is valid for about the same time period

Receiver: Oops… I authorized some unwanted traffic Attacker: Good… I can flood until my capability expires! Fatal problem: Evan a small number can raise a DoS attack Solution: Grant the right to send up to N bytes along a path within the next T seconds. Routers verify their portion of the capabilities by re-computing the hashes much as before, expect that now two hashes are required instead of one. The router now perform two checks, one for N and one for T.

Bounding Algorithm: If ( flow rate for a valid capability > N/T ) Keep router state If ( pkt_rcvd && no_state_for_pkt) Track byte count and associate a minimal ttl with state = L*T/N If ( ttl == 0) Reclaim the state for use with a new capability Max bytes used Creates statettl hits 0  Reclaim state Worst caseTotal of 2N bytes before capability expires

Efficient Capabilities: – Security benefits from long capabilities ( a long key length). Route Changes and Failures: – Demote packets to be the same priority as legacy traffic by changing a bit in the capability header. Balancing Authorized Traffic: – Floods of authorized traffic: A pair of colluding attackers can authorize high-rate transfers between themselves and disrupt other authorized traffic that shares the bottleneck – Use Fair Queuing Short, Slow or Asymmetric Flows: – TVA is designed to run with low overhead for long, fast flows that have a reverse channel. Short or slow connections will experience a higher relative overhead. But wait: Most bytes belong to long flows  Effect on aggregate efficiency would be small Design does not introduce any latency on handshaking  Remember piggybacking? Short flows are less likely because flows are defined from a sender to a destination basis

Packets carrying capability information Hosts that act as senders and destinations TVA Protocol Routers that process capability information Two types of capability packets: Request Packets: Carry a list of blank capabilities and path identifiers that are filled in by routers as requests travel towards destination Regular Packets: Two types, packets that carry both a flow nonce and a list of valid capabilities, and packets that carry only a flow nonce If a regular packet does not pass the capability check, it may be demoted to low priority traffic that is treated as legacy traffic. There are no separate capability packets! All packets carry a header that extends the behavior of IP. SenderRouter Destinatio n Request (Part of TCP SYN packet) Response (Part of TCP SYN/ACK packet) Routers add pre-capabilities Adds capabilities

19 Indicate the type and format of the packet Each capability has a 64-bit value, broken down into 8 bits of router timestamp in seconds ( a modulo 256 clock) and 56 bits of a keyed hash

Packets carrying capability information Hosts that act as senders and destinations TVA Protocol Routers that process capability information SenderRouter Destination Request (Part of TCP SYN packet) Response (Part of TCP SYN/ACK packet) Routers add pre-capabilities Adds capabilities Sender Side: If ( no valid capability ) Piggyback request onto TCP SYN Destination Side If ( willing to authorize ) Piggyback capabilities onto TCP SYN/ACK Send request for reverse directions Else Return empty capability list piggybacked onto TCP RST

Packets carrying capability information Hosts that act as senders and destinations TVA Protocol Routers that process capability information To process a request packet if( at trust boundary ) add pre-capability to the end of the list and add a new path identifier To process a regular packet If ( pkt_authorized ) update cached information & schedule for forwarding Locate an entry for the flow using source & destination IPs if ( cached entry ) update byte count else check capability and allocate entry if ( valid_capability & renewal pkt) mint pre-capability Routers route and forward packets as required by IP and additionally process packets according to the capability information that they carry.. SenderRouter Destinatio n Request (Part of TCP SYN packet) Response (Part of TCP SYN/ACK packet) Routers add pre-capabilities Adds capabilities

Uses ns to simulate TVA, SIFF, pushback and legacy Internet Rate-limit capability requests to 1% of link capacity (down from default 5% to stress the design)! Setup fixed length transfer between legitimate users and destination under various attacks and measure: i) the average fraction of completed transfers ii) the average time of the transfers that complete Reason: DoS attacks cause heavy loss  Slow transfers and eventual application abortion Dumbbell Topology SIFF - treats capacity requests as legacy traffic, does not limit the number of times a capability is used to forward traffic, and does not balance authorized traffic sent to different destinations Pushback - recursively pushes destination-based network filters backwards across the incoming link that contributes most of the flood.

Simulation Results Attacker floods the destination with legacy traffic at 1 Mb/s TVA: Legacy traffic has a lower priority compared to request traffic SIFF: Treats both legacy and request packets as equally low priority traffic Pushback: Performs well but as the number of attackers increase, it cannot isolate attack & legitimate traffic

Attacker floods the destination with request packets at 1 Mb/s TVA: Request packets are rate-limited SIFF: Treats both legacy and request packets as equally low priority traffic Pushback: Treats requests as regular data

Attacker is supported by a colluder TVA: Transfer time slightly increases but no user will be starved SIFF: Treats both legacy and request packets as equally low priority traffic  Users are completely starved Pushback: Treats requests as regular data

Prototyped TVA using the Linux netfilter framework Host Portion – Implemented as a user-space proxy :: Allows legacy applications to run without modifications Router Portion Kernel module using the AES-hash for pre-capabilities and SHA1 for capabilities Dual-processor 3.2 GHz Pentium Xeon machine running Linux Kernel Kernel packet generator to generate different types of packets Each run: One million packets of each type. Five Runs: Recorded the average number of instruction cycles for the router to process each type of packet

Regular with a cache entry is the most common so not a big deal! Regular without a cached entry – Two has functions Renewal without cached entry – Three hash functions Output rate α Input rate Reaches a peak depending on the type of input packet Problem of spoofed short renewal packets can be solved using Lazy Receiver Processing Implementation can handle 100 Mbps interfaces and intend to demonstrate gigabit handling in the near future

TVA uses standard cryptographic functions with sufficient amount of keys material and changes keys every 128 seconds! Breaking the hash scheme TVA uses a packet format that does not expose pre- capabilities in the first 8 bytes that are visible in ICMP error messages Observe pre-capabilities (using ICMP error messages) Attacker will not generally be able to send packets along the same path as the authorized sender because capabilities are bound to a specific source, destination and router. Steal Capabilities The compromised router is another attacker! As long as there are capability routers in the middle, DoS attacks are still limited. Eavesdropping (includes a compromised router) This attack has little effect on a sender’s traffic if per- destination queuing is used, which is TVA’s default. Spoof authorized traffic

No Flag Day: The design requires both routers and host to be upgraded, but does not require a flag day. Incremental Deployment Compatible : Routers can be upgraded incrementally, at trust boundaries and locations of congestion, i.e., the ingress and egress of edge ISP’s Host must be upgraded. This can be occurred with proxies at the edges of customer networks in the manner of a NAT box or Firewall. Expect to use DNS to signal which hosts can handle capabilities in the same manner as upgrades

There are three components in a network: Sender, Receiver and Destination. If one considers DoS as a serious problem, then we have to alters one of the three components! Main contribution is to flesh out the design of a comprehensive and practical capability system for the first time Practical design with an implementation to support it Constrained design to be easy to transition into practice – Incremental deployment

We have a website! Agreed that this is a new architecture but wait… it has its advantages and is incrementally deployable This architecture can be implemented and tested either internally or globally We considered attackers to be like-minded and are working on getting results for dynamic behavior patterns The attacker number we used will be increased by the next paper! Hash functions affect the performance but then there is a law of equivalence: One cannot gain anything without first giving something in return! – If there’s a better way, let us know and we’ll evaluate it… We don’t claim this to be the best design, its just a better design…