Controlling High Bandwidth Aggregates in the Network Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker AT&T.

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

RED-PD: RED with Preferential Dropping Ratul Mahajan Sally Floyd David Wetherall.
Data and Computer Communications
Authors: Alexander Afanasyev, Priya Mahadevany, Ilya Moiseenko, Ersin Uzuny, Lixia Zhang Publisher: IFIP Networking, 2013 (International Federation for.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli University of Calif, Berkeley and Lawrence Berkeley National Laboratory SIGCOMM.
MULTOPS A data-structure for bandwidth attack detection Thomer M. Gil Vrije Universiteit, Amsterdam, Netherlands MIT, Cambridge, MA, USA
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
PERSISTENT DROPPING: An Efficient Control of Traffic Aggregates Hani JamjoomKang G. Shin Electrical Engineering & Computer Science UNIVERSITY OF MICHIGAN,
Ion Stoica, Scott Shenker, and Hui Zhang SIGCOMM’98, Vancouver, August 1998 subsequently IEEE/ACM Transactions on Networking 11(1), 2003, pp Presented.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
By Sam Rossoff. The Red Police Controlling High- Bandwidth Flows at the Congested Router By Ratul Mahajan Sally Floyd and David Wetherall.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
15-441: Computer Networking Lecture 26: Networking Future.
Controlling High- Bandwidth Flows at the Congested Router Ratul Mahajan, Sally Floyd, David Wetherall AT&T Center for Internet Research at ICSI (ACIRI)
1 Controlling High Bandwidth Aggregates in the Network.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Mitigating Bandwidth- Exhaustion Attacks using Congestion Puzzles XiaoFeng Wang Michael K. Reiter.
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
Defending Against Low-rate TCP Attack: Dynamic Detection and Protection Haibin Sun John C.S.Lui CSE Dept. CUHK David K.Y.Yau CS Dept. Purdue U.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
1 Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks Ion Stoica,Scott Shenker, and Hui Zhang SIGCOMM’99,
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
A Real-Time Video Multicast Architecture for Assured Forwarding Services Ashraf Matrawy, Ioannis Lambadaris IEEE TRANSACTIONS ON MULTIMEDIA, AUGUST 2005.
Promoting the Use of End-to- End Congestion Control in the Internet Sally Floyd and Kevin Fall Presented by Scott McLaren.
DDoS Attack Prevention by Rate Limiting and Filtering d’Artagnan de Anda CS239 Network Security 26 Apr 04.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
1 Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks Ion Stoica,Scott Shenker, and Hui Zhang SIGCOMM’99,
Core Stateless Fair Queueing Stoica, Shanker and Zhang - SIGCOMM 98 Rigorous fair Queueing requires per flow state: too costly in high speed core routers.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Whither Congestion Control? Sally Floyd E2ERG, July
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
1 Congestion Control Computer Networks. 2 Where are we?
Distributed Denial of Service Attacks
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
1 Defense Strategies for DDoS Attacks Steven M. Bellovin
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Overload Design Team Status Jonathan Rosenberg Cisco.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
Coping with Link Failures in Centralized Control Plane Architecture Maulik Desai, Thyagarajan Nandagopal.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
CS4470 Computer Networking Protocols
Congestion Control, Internet transport protocols: udp
The Network Layer Network Layer Design Issues:
Congestion Control (from Chapter 05)
PRESENTATION COMPUTER NETWORKS
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Presentation transcript:

Controlling High Bandwidth Aggregates in the Network Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker AT&T Center for Internet Research at ICSI (ACIRI) and AT&T Labs Research Presented by Scott McLauren

Overview Introduction Overview of ACC Local ACC Pushback Simulations Discussion Related Work Conclusions

Introduction Overloads can result from a single flow not using congestion control. These flows continue to transmit, despite packet drops DoS – when a large amount of traffic is directed at a network link or server Flash crowd – A large number of users try to access a server. They can overload the server and network link, which interferes with unrelated traffic

Introduction ACC – Aggregate-based Congestion Control Aggregate – a collection of packets from one or more flows that have some property in common  Source or destination addresses, application type, TCP traffic, HTTP traffic to a specific server Local ACC and Pushback  Expected to be invoked rarely

Overview of ACC 1. Am I seriously congested? 2. If so, can I identify an aggregate responsible for an appreciable portion of the congestion? 3. If so, to what degree do I limit the aggregate? 4. Do I also use pushback? 5. When do I stop? When do I ask upstream routers to stop?

Policies Very large number of possible policies  Protect high bandwidth aggregates  Punishing some aggregate when congestion starts  Fairness  Restricting max throughput of an aggregate Policies are left as future work

Detecting congestion Apply ACC only when output queue has sustained severe congestion Monitor loss rate at the queue, and looking for an extended high loss rate period

Types of Congestion Undifferentiated congestion  Under-engineered network  Fiber cut Traffic clustering to form aggregates  Flash crowds, flooding attacks, application types ( worms) DDoS attacks – the attacker can vary the traffic to escape detection

Identifying Responsible Aggregates Congestion signature  The router does not need to make any assumptions about the malicious or benign nature of the aggregate Collateral damage  Signature is too broad – traffic beyond the aggregate is included in the signature

Determining the Rate Limit for Aggregates Rate limit is determined such that a minimum level of service is guaranteed for the remaining traffic Completely shutting off traffic is not used because of:  Flash crowds  An aggregate for a DDoS attack will also contain innocent traffic

Pushback Used to control an aggregate upstream Congested router asks (recursively) its neighbors to rate-limit the aggregate Can be invoked by a router, or a server connected to a router

Reviewing Rate-limiting Rate-limiting is updated periodically, to update the limit based on current conditions, and to release aggregates that start to behave Decisions are easy for local ACC, difficult with pushback An attacker could predict these decisions to evade ACC

Local ACC Triggered when the output queue experiences sustained high congestion Using the packet drop history of the last K seconds, the ACC agent tries to identify the high bandwidth aggregates, and the limit to which they should be restricted

Identification of High Bandwidth Aggregates Expectation is that most aggregates will be based on either a source or destination address prefix Detection based on destination address is presented, other algorithms require further research

Identification of High Bandwidth Aggregates From the drop history, extract a list of high-bandwidth addresses (32-bit) Cluster these into 24-bit prefixes  For each of these, try obtaining a longer prefix that still contains most of the drops

Determining the Rate Limit for Aggregates ACC agent sorts the list of aggregates based on the number of drops Uses the total arrival rate at the output queue and the drop history to estimate the arrival rate ACC agent calculate the excess arrival rate at the output queue  Traffic that would be dropped at the rate limiter to bring the drop rate down to the target drop rate Compute rate-limit L for each aggregate, such that:  Aggregate[k].arr is the arrival rate of the kth aggregate

Rate-limiter Controls the throughput of the aggregates, and estimates arrival rate using exponential averaging It is in the forwarding fast path, so it must be light-weight Once a packet is past the rate-limiter, packets lose their identity as part of an aggregate Implemented as a virtual queue

Narrowing the Congestion Signature Goal is to drop more of the attack traffic  Based on dominant signature within an aggregate  Drop more heavily from this subset Flow-aware rate-limiting during flash crowds  Drop more heavily from SYN packets, so connections that are established get better service  Dangerous in DDoS attacks, the attacker could just send the packets that are being favored (TCP above)

Simulations Aggregates 1-4 are composed of multiple CBR flows. Aggregate 5 is a VBR source whose sending rate increases at t=13, decreases at t=25

Invoking Pushback Invoked if the drop rate for an aggregate remains high for several seconds  The high drop rate indicates the router hasn’t been able to control the aggregate by preferential dropping (RED)

Sending Pushback Requests Upstream Each upstream link is classified as  Non-contributing – send a small fraction of aggregate’s traffic  Contributing – send a large fraction of aggregate’s traffic Non-contributing aggregates do not receive pushback requests, only limit those aggregates sending most of the traffic Algorithm used:  max-min Arrival rates of 2, 5, and 12 Mbps Desired arrival rate of 10 Mbps Limited to 2, 4, and 4 Mbps  Non-contributing neighbors could start sending more traffic, but it doesn’t matter because they are using rate-limiting Protocol defined in IETF draft, since deleted

Feedback to Downstream Routers Upstream routers send status messages to downstream routers  Report total arrival rate for that aggregate  Messages enable congested router to decide if it want to continue pushback Ending pushback may result in larger arrival rate  Because dropping is no longer contributing to congestion control Solid lines indicate arrival rate estimate in the status message Dashed lines did not receive pushback requests Labels indicate arrival rate estimate

Simulations Simple Intended to illustrate some of the basic functionality of the ACC mechanisms Bad sources – send attack traffic to victim D Poor sources – innocent sources sending traffic to D Good sources – send traffic to destinations other than D

Local ACC Good and Poor aggregates contain 7 infinite demand TCP connections Bad sources use a UDP flow with equal on-off sending times, randomly chosen between 0 and 4 seconds  1 MBps during on period

DDoS Attacks 10 good sources & 4 poor sources spawn web-like traffic Sparse-attack – 4 random 2 MBps on-off bad sources Diffuse-attack – 32 UDP 0.25 MBps on-off sources

Flash Crowds Flash traffic from 32 sources sending web traffic to the same destination Good traffic from ten other sources sending web traffic to other destinations  Accounts for 50% link utilization without flash

Pushback Discussion Advantages  Prevents scarce upstream bandwidth from being wasted on packets that will eventually be dropped  When traffic can be localized spatially, pushback can effectively concentrate rate-limiting on attack traffic within aggregate Disadvantages  For DDoS attacks uniformly distributed across inbound links, pushback is not effective at rate-limiting  May overcompensate, especially during flash crowds, dropping extra traffic resulting in link being underutilized  Can sometime increase damage done to legitimate traffic – when legitimate and attack sources are within the same aggregate and the sources are in a edge network without pushback

Pushback Implementation Identification of aggregates can be done as a background task, or on a separate machine, so processing power is not an issue Router needs to determine if a packet is part of an aggregate. If number of aggregates is large, router has a large lookup table. The lookup-time increases with the number of aggregates These should not be an issue, pushback will only be used occasionally, on a handful of aggregates

Pushback Deployment Estimating Upstream Contribution  Difficult for routers joined by LANs, VLANs, or frame relay circuit – multiple routers attached to interface  Downstream router my not be able to distinguish between upstream routers  Workaround – send dummy pushback request that doesn’t rate-limit, status messages with estimated arrival rate are returned, then actual pushback requests can be sent to the necessary routers. Deployment  Incrementally at the edges of an island of routers

Related Work Ingress Filtering  Attempts to stop the attacks, ACC doesn’t Traceback  Attempts to find the sources of the attacks, ACC doesn’t IDS  Protocol for interaction between routers  Does not deal with identification or rate-limiting CDNs and Multicast  Prevent flash crowds by mirroring data  What about traffic not yet cached? Traffic not suitable for multicast? Flow-based congestion control  Doesn’t handle aggregates of many flows that are low-bandwidth CBQ  Used for fixed definitions of aggregates, not dynamic aggregates

Conclusions Local and cooperative mechanisms for aggregate-based congestion control have potential to control DDoS attacks and flash crowds More research needs to be done  Need to understand pitfalls and limitations of ACC  How frequently is sustained congestion caused by aggregates, and not by failures?  What do attack traffic and topologies look like?  Policy decision will play a role in shaping ACC mechanisms

Questions