Autonomous Anti-DDoS Network V2.0 (A2D2-2) Sarah Jelinek University Of Colorado, Colo. Spgs. Spring Semester 2003, CS691 Project.

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Self-Managing Anycast Routing for DNS
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Agent Caching in APHIDS CPSC 527 Computer Communication Protocols Project Presentation Presented By: Jake Wires and Abhishek Gupta.
Behavior Intrusion Detection: Enhanced Hakan Evecek Rodolfo Ortiz Hakan Evecek Rodolfo Ortiz.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Mobile IP Overview: Standard IP Standard IP Evolution of Mobile IP Evolution of Mobile IP How it works How it works Problems Assoc. with it Problems Assoc.
Design and Implementation of Alternative Route Against DDOS Jing Yang and Su Li.
Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 TPAC 10/10/2003 chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department of Computer Science.
PSMC Proxy Server-based Multipath Connection CS 526 Advanced Networking - Richard White.
ChowSCID1 Secure Collective Internet Defense (SCID) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
ChowSCOLD1 Secure Collective Defense Network (SCOLD) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
Multipath Routing: Proxy Selection By Joseph A LaConte CS 591 – Semester Project December 07, 2005.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Design of an Autonomous Anti-DDOS Network (A2D2) Angela Cearns Thesis Proposal Master of Software Engineering University of Colorado, Colorado Springs.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
Secure Collective Internet Defense (SCID) Yu Cai 05/30/2003
Using Multiple Gateways to Foil DDOS Attack by David Wilkinson.
SensIT PI Meeting, April 17-20, Distributed Services for Self-Organizing Sensor Networks Alvin S. Lim Computer Science and Software Engineering.
Enhanced Secure Dynamic DNS Update with Indirect Route David Wilkinson, C. Edward Chow, Yu Cai 06/11/2004 University of Colorado at Colorado Springs IEEE.
ChowSCOLD1 Secure Collective Internet Defense (SCOLD) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
Investigations into BIND Dynamic Update with OpenSSL by David Wilkinson.
1 Cybersecurity Symposium 9/19/2003 chow C. Edward Chow Yu Cai Dave Wilkinson Department of Computer Science University of Colorado at Colorado Springs.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
1 DACAManet Proposer’s Workshop UCCS-Raytheon Terry Boult C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs Leland.
1 Security Research 2/7/2003 chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department of.
1 Security Research 1/10/2003 chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department of.
A Policy-based Approach to Wireless LAN Security Management George Lapiotis, Byungsuk Kim, Subir Das, Farooq Anjum Speaker: George Lapiotis
Intrusion Detection Systems Francis Chang Systems Software Lab OGI.
1 Automated Fault diagnosis in VoIP 31st March,2006 Vishal Kumar Singh and Henning Schulzrinne.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
03/09/2003Helsinki University of Technology1 Overview of Thesis Topic Presented By: Zhao Xuetao.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Lecture 7 Network & ISP security. Firewall Simple packet-filters Simple packet-filters evaluate packets based solely on IP headers. Source-IP spoofing.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
Connecting to a Network Lesson 5. Objectives Understand the OSI Reference Model and its relationship to Windows 7 networking Install and configure networking.
Client-Server Processing, Parallel Database Processing and Distributed Database Systems. KEVIN ROBERTS ANIKET MURLIDHARAN.
Application of Content Computing in Honeyfarm Introduction Overview of CDN (content delivery network) Overview of honeypot and honeyfarm New redirection.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
Locating Mobile Agents in Distributed Computing Environment.
1 ITS-ZeeWave Meeting 2/26/2004 UCCS Chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department.
1 Quick Overview Overview Network –IPTables –Snort Intrusion Detection –Tripwire –AIDE –Samhain Monitoring & Configuration –Beltaine –Lemon –Prelude Conclusions.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Lecture 4: Sun: 23/4/1435 Distributed Operating Systems Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
Copyright © 2013 Curt Hill SOAP Protocol for exchanging data and Enabling Web Services.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.
7200 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/4- OfficeServ 7200 Enterprise IP Solutions - Data Server –
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Security System for KOREN/APII-Testbed
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
Network Devices and Firewalls Lesson 14. It applies to our class…
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Internet Networking recitation #4
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Host and Small Network Relaying Howard C. Berkowitz
Global One Communications
Presentation transcript:

Autonomous Anti-DDoS Network V2.0 (A2D2-2) Sarah Jelinek University Of Colorado, Colo. Spgs. Spring Semester 2003, CS691 Project

Project Goals Ultimate goal of project –To make DDoS technology more robust Relationship to other projects –Enhancements of existing A2D2 architecture to incorporate IDIP and Alternate Proxy Servers High-level timing goals –Research and new architecture, now –Project completion planned for 9/03

Description - A2D2 Developed by Angela Cearns, UCCS Masters Thesis DDoS Intrusion Detection and Response Uses freeware as main detection component Modifications made to affect better response FOR MORE INFO... final.pdf

A2D2, cont..

Strengths –Uses open source components –Portable –Configurable Weaknesses –Host Based –Local Network response –No attempt made to actively trace intruder –Possible bottleneck at firewall –Static thresholds

A2D2-2 Technology New technology being used –Intrusion Detection and Isolation Protocol (IDIP) –Alternate Proxy Servers Standards being adopted –IDIP Will work with other IDIP enabled Intrusion Detection Networks –Service Location Protocol (SLP) Allows discovery of registered IDIP Nodes

A2D2-2 What It Solves Host Based –Now a dynamic, network wide solution Will work with other IDIP enabled Intrusion Detection Networks utilizing CITRA Active Tracing of Intruder –SLP is used to discover other network IDIP services

A2D2-2 What It Solves, cont.. Local Response –SLP used for location of alternate proxy servers for more global response Firewall Bottleneck –Response Coordination Centralized

A2D2-2 & IDIP IDIP –Developed by Boeing and NAI Labs –Supports real-time tracking and containment of DDoS attacks –Three layers: Application Layer Message Layer Discovery Coordinator

A2D2-2 - Discovery Coordinator IDIP Discovery Coordinator –Bulk of the work done here –Network wide response coordinator –Will notify clients and client dns of alternate routes available –Standardized language used for messages and topology (CISL) –Local attack response still active if down

IDIP Nodes FOR MORE INFO...

A2D2-2 Proposed Architecture

Alternate Routes FOR MORE INFO...

Alternate Routes, cont..

A2D2-2 & SLP -> Alternate Routes DNS1... A2D2-2 Network IDS AAAAAAAA net-a.comnet-b.comnet-c.com DNS2 DNS3... RRR R IDIP Node A2D2-2 IDIP DC SLP Discovery and communication Proxy1 IDIP Node Proxy2 IDIP Node Proxy3 IDIP Node R2 R1 R3 Block and traceback Attack msgs blocked by IDS New route via Proxy3 to R3 Local IDS Response

A2D2-2 Futures IDIP Redundant/Cooperative Discovery Coordinators Discovery Coordinator Response Optimization Enhancements Updates To Snort Secure DNS (already started?)