Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Slides:



Advertisements
Similar presentations
Network Support for Sharing. 2 CABO: Concurrent Architectures are Better than One No single set of protocols or functions –Different applications with.
Advertisements

Loose Source Routing as a Mechanism for Traffic Policies Katerina Argyraki and David R. Cheriton Presented by Thuan Huynh, Robert Patro, and Shomir Wilson.
IUT– Network Security Course 1 Network Security Firewalls.
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
TCP for today’s Web. Connections today Web-page > 300KB but objects are small 7.5KB -2.4KB [25] lots of small objects in a page. Implication: TCP Handshake.
NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
July 2008IETF 72 - NSIS1 Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-01 Se Gi Hong & Henning Schulzrinne.
DDoS Attack Prevention by Rate Limiting and Filtering d’Artagnan de Anda CS239 Network Security 26 Apr 04.
John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff
04/12/2001ecs289k, spring ecs298k Distributed Denial of Services lecture #5 Dr. S. Felix Wu Computer Science Department University of California,
Efficient and Secure Source Authentication with Packet Passports Xin Liu (UC Irvine) Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Routing of Outgoing Packets with MP-TCP draft-handley-mptcp-routing-00 Mark Handley Costin Raiciu Marcelo Bagnulo.
Computer Networks Layering and Routing Dina Katabi
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
A question of protocol Geoff Huston APNIC 36. Originally there was RFC791: “All hosts must be prepared to accept datagrams of up to 576 octets (whether.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
1. SOS: Secure Overlay Service (+Mayday) A. D. Keromytis, V. Misra, D. Runbenstein Columbia University Presented by Yingfei Dong.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
BGP Man in the Middle Attack Jason Froehlich December 10, 2008.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Packet-Marking Scheme for DDoS Attack Prevention
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many.
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Data Security in Local Network Using Distributed Firewall Presented By- Rahul N.Bais Guide Prof. Vinod Nayyar H.O.D Prof.Anup Gade.
Spoofing Prevention Method Srikanth T.S.S. Sri Lakshmi Ramya S.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
IP Spoofing. What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Presentation on ip spoofing BY
1 Protecting SIP Against DoS An Architectural Approach.
An Introduction To ARP Spoofing & Other Attacks
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Defending Against DDoS
Chris Meullion Preston Burden Dwight Philpotts John C. Jones-Walker
Introduction to Networking
Defending Against DDoS
Firewalls Purpose of a Firewall Characteristic of a firewall
IP-Spoofing and Source Routing Connections
دیواره ی آتش.
DDoS Attack and Its Defense
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv University

Spoofing Used by hackers to mount denial of service attacks. Denial of service attacks – consume the resources of victim’s network/servers Spoofing- forging the source IP of packets. –Easy to create (4000 attacks per week [MVS01]) –Harder to filter –Harder to trace back

ISP B Spoofing Net B’ Attacker ISP A ISP C Net A’Victim Internet Net A’ victim Src dst

Prevention methods Today: “Good Net-Citizen“ Ingress/Egress filtering –Implementation uRPF,ACL –Administrative overhead –Poor incentive – “good-will” and not self-defensive methods ISP B Net B’ Filter out packets with src not in Net B’ ISP C Internet ISP A

Self-defense methods TCP intercept – router as a proxy completing the tcp handshake on behalf of the server. –Performance penalty, only TCP. Research: –TTL [PBRD01,JWS03] Filter out 90% of spoof traffic Route instability –Route path identifier [YPS03] Route instability Lack of motivation.

Spoofing Prevention Method (SPM) Self defense method Incentive to implement –Visibility of SPM members Stepwise deployment Light mechanism

SPM architecture Entities: AS Key: –Function of source AS and destination AS –Added to each packet by the source AS routers. Routers: –Mark at the original AS the outgoing traffic with key. –Verify at the destination AS the authenticity of the key on the incoming packets Key distribution: two options: – By protocol –Learned passively

ISP B SPM Architecture ISP A ISP C Net B’ Net A’ Victim Net A’ victim B  C src dst key Attacker Filtering spoof traffic Key does not match the src

Benefits of SPM Server Traffic: Server of SPM member domain can filter at attack time: – Spoofed traffic from other SPM ASs – Spoofed traffic that spoofs to SPM AS address space Client Traffic: Client of SPM member domain receives preferential treatment at SPM domain servers Visibility

Key Lightweight function - not crypto: Random constant 32 bit Guessing the key with low probability: reduce the volume of attack by Function of the source and destination AS –Acquiring the key is hard Key remove by routers, Change periodically –Sniffing is not a likely threat Place as an additional IP option

Key distribution The key information requires two small tables: –AS-out table - marking –AS-in table - verification Size of each table: 120KB each – future 480KB – AS coded by 2bytes (current 16,000, max ) – Key 4 bytes

Key distribution Key information: –AS-out: synchronization inside the AS –AS-in: needs to be learned from various ASes – a key from each AS. Key distribution: –Protocol: AS server (IRV[GAGIM03], route reflector). –Passively: Learn key passively from the regular non spoof traffic  traffic that comletes the TCP handshake.

Router job Marking – one lookup per destination (combine with IP lookup)  Place only on traffic destined to other SPM members. Verification – one lookup per source.  Categorize traffic: Spoofed, non-spoofed, other (no key)  Verification modes: Conservative verification : peace time (drop spoofed) Aggressive verification: attack time (drop spoofed + other). Implement in Edge Routers: Combine SPM with ingress/egress filtering

Motivation: Implementation benefit ( Symmetric Model ) Relative Benefit = reduction in attack traffic rate = cannot spoof from AS that is member (K/N)

Motivation:Implementation benefit ( Symmetric Model) Relative benefit SPM = Cannot spoof from SPM AS +Cannot spoof to SPM address (2K/N-(K/N)^2)

Motivation:Implementation benefit (As ymmetric Model) Traffic is proportional to the domain size Domain size ~ address space allocation ~ zipf distribution (top 10 ISP – 27.8% of the address space [Fixedorbit]).

Conclusions Ingress/Egress filtering – today’s technological solution is economically ineffective SPM – economically attractive: –AS that joins – gains significant relative benefits (server traffic/client traffic) –Stepwise deployment –Visibility –Simple Questions ? Thank you !