Steps Towards a DoS-resistant Internet Architecture Mark Handley Adam Greenhalgh CII/University College London.

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

Network Support for Sharing. 2 CABO: Concurrent Architectures are Better than One No single set of protocols or functions –Different applications with.
Why Is DDoS Hard to Solve? 1.A simple form of attack 2.Designed to prey on the Internet’s strengths 3.Easy availability of attack machines 4.Attack can.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168) Limited Transmit (RFC 3042)
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
Stream Control Transmission Protocol 網路前瞻技術實驗室 陳旻槿.
Introduction to TCP/IP
DoS-resistant Internet - progress Bob Briscoe Jun 2005.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #8 Explicit Congestion Notification (RFC 3168) Limited Transmit.
Lecture 15 Denial of Service Attacks
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
– Chapter 4 – Secure Routing
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Papers covered ● K. Lakshminarayanan, D. Adkins, A. Perrig, I. Stoica, “Taming IP Packet Flooding Attacks”, HotNets-II. ● M. Handley, A. Greenhalgh, “Steps.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Addressing IP v4 W.Lilakiatsakun. Anatomy of IPv4 (1) Dotted Decimal Address Network Address Host Address.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Module 10: How Middleboxes Impact Performance
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Multimedia & Mobile Communications Lab.
Page 1 Network Addressing CS.457 Network Design And Management.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring Presented by: Dedicated Instructor: Hiteshkumar Thakker.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
DoS/DDoS attack and defense
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
K. Salah1 Security Protocols in the Internet IPSec.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
1 Protecting SIP Against DoS An Architectural Approach.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
TCP Transport layer Er. Vikram Dhiman LPU.
* Essential Network Security Book Slides.
NET323 D: Network Protocols
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Presentation transcript:

Steps Towards a DoS-resistant Internet Architecture Mark Handley Adam Greenhalgh CII/University College London

Internet Service Model Single global address space. Routers don’t know about flows or applications - just move packets as fast as they can. Rely on co-operative end systems to perform congestion control. Route advertisement is an “invitation” to send packets, no matter what their purpose. Destination-based routing: paths are normally asymmetric. Source addresses only used by receiving host.

Threat Model Thousands of machines compromised:  Rapidly spreading worms  Automated scanning by bots  Viruses Compromised machines used for distributed DoS attacks:  Attack traffic can total many gigabits/second. Source-address spoofing.  Actually not very common because not necessary. Reflection attacks  Serve as amplifiers  Obfuscate attack origin.

Hypothesis The Internet Service Model provides many modes of interaction between systems.  Some are necessary to do useful work  Many are unnecessary, but can be used by attackers. Question Are there cost-effective ways to limit the modes of interaction in such a way that normal traffic is unaffected, and the balance of power moves in favor of defense?

Internet Service Model Single global address space. Routers don’t know about flows or applications - just move packets as fast as they can. Rely on co-operative end systems to perform congestion control. Route advertisement is an “invitation” to send packets, no matter what their purpose. Destination-based Routing: paths are normally asymmetric. Source addresses only used by receiving host.

Internet Service Model Single global address space. Routers don’t know about flows or applications - just move packets as fast as they can. Rely on co-operative end systems to perform congestion control. Route advertisement is an “invitation” to send packets, no matter what their purpose. Destination-based Routing: paths are normally asymmetric. Source addresses only used by receiving host.

Clients and Servers To a first approximation, hosts divide into “clients” and “servers”. Desired service model:  Clients can send unsolicited requests to servers.  The only traffic that can reach a client is from a server to which it sent a request. Yes there are other things than clients and servers  We’ll get to them later.

Towards a DoS-resistant Internet Architecture: Step 1: Separate Address Spaces  Separate the address space into client addresses and server addresses.  Allow packets from client  server and server  client and nothing else. Benefits:  Fast worms prevented (client  server  client is slow)  Reflection attacks on servers prevented because this needs server  client  server and typically reflectors are “servers”. This is similar to the asymmetry that NAT creates, but makes it a consistent part of the architecture.

Towards a DoS-resistant Internet Architecture: Step 2: Non-Global Client Addresses A client address does not need to have global significance.  Only needs significance on the path back from server  client  In fact, a client wants its address to not have global significant, because this prevents distributed DoS attacks on a client host. Solution:  Path-based addressing of clients.

Path-based Addressing AXAXBA  XCBA  XDCBA  X DCBA  XCBA  XBA  XAXAX

Path-based Addressing Benefits Prevents client address spoofing.  Thus reflection attacks on remote clients not possible. Prevents DDoS of clients.  Client addresses not guessable. Paths are symmetric at the inter-domain level  Unidirectional traffic is then clearly visible as malicious, even in the core of the Internet. Remote subversion of client routing not possible. DCBA  XCBA  XBA  XAXAX AXAXBA  XCBA  XDCBA  X

Path-Based Addressing Issues Client addresses are inherently changeable.  Needs an additional stable namespace to allow connections to bind to a stable name.  HIP would provide one such namespace. Routing change can render server  client path unusable if client is idle.  Either need client  server keepalives, or client visibility of route changes.

Towards a DoS-resistant Internet Architecture: Step 3: Server RPF Checking  The use of path-based client addresses means routing is symmetric at the inter-domain level.  This allows all domain boundaries to perform reverse-path forwarding (RPF) checks on server  client traffic. Benefits  Server address spoofing is prevented.  As neither client nor server address can be spoofed, remote injection attacks on ongoing communications (such as TCP Reset injection) are prevented.

Towards a DoS-resistant Internet Architecture: Step 4: State Setup Bit Not all packets are equal. Packets that cause state setup are especially risky from a DoS point of view. Introduce a state-setup bit in the IP header.  Must be set on packets that cause communication state to be instantiated, and unset on others.  Server ignores packets for new flows that don’t have bit set. Benefits  Protocol-independent way to identify packets requiring special validation.

The State Setup Bit Benefits  Stateful firewalls can validate packets with this bit set before instantiating state.  Server addresses cannot send state-setup packets Routers would drop such packets. State-holding attacks not possible from server addresses.  Sites might rate-limit state-setup packets. Inherent conflict between security and network evolution: A state setup bit at the IP level makes it easier to evolve transport and application protocols.

Towards a DoS-resistant Internet Architecture: Step 5: Nonce Exchange and Puzzles Need mechanisms to validate a client, and to add asymmetric costs to communications to change the balance of power towards the server. Nonce-exchange:  Generic response to state-setup packet requiring a nonce to be echoed. Puzzles:  Generic response to state-setup packet requiring client solves a puzzle before communication can continue.

Nonce Exchange, Puzzles. Request Bounce + Puzzle Request + Puzzle Answer Not a new idea, but the addressing constraints make it much safer to deploy - much harder to use the puzzle mechanism as a DoS attack in its own right. Only helps with IP/Transport level attacks. Application will still need to do DoS prevention.

Towards a DoS-resistant Internet Architecture: Step 6: Middlewalls Traditional firewalls are too close to the server host to provide much protection against DoS.  Need some form of access control that is upstream of the bottleneck link or router. Middlewall  A simple special-purpose high-speed firewall deployed in the core the Internet at an inter-domain boundary.  Performs nonce-validation, issues puzzles, drops specific traffic flows.

Middlewall Activation Middlewall normally acts as a transparent relay. A middlewall’s help is solicited by a destination subnet:  For specific sources: Control message travels back along client-address path. Hard to spoof due to RPF checks. Issue puzzles, or do nonce exchange and block specific source.  For DDoS attack: General solicitation to issue puzzles, carried in routing messages from destination subnet. Interesting question: can a middlewall charge money for the service?

The story so far... No rapidly spreading worms. No source address spoofing. No reflection attacks. Clients completely protected from direct attack. Servers protected from attack by servers (and clients are much harder to compromise) Simple pushback mechanisms against known malicious clients. No per-flow state, except when actively solicited by servers. Puzzles make all but the largest DDoS attacks unsustainable. Large DDoS attacks cannot use unidirectional traffic. The remaining attacks mostly look like a flash crowd.

What did we give up? Potential problems due to loss of symmetry Application-level relays: SMTP, NNTP, SIP.  Need both client and server addresses.  As far as possible, try to avoid needing both addresses to be globally routable. Peer-to-peer applications and Internet telephony:  Need client-to-client communications.

Client-to-client communications. Peer-to-peer applications and Internet telephony both have out- of-band signaling/discovery mechanisms which can work client-server. The actual client-to-client communication can then be simultaneously setup from both ends.  Simultaneous setup is not nearly so vulnerable to DoS because both parties have to consent to it.  Needs the help of one or more server addresses to bootstrap - there are multiple possible solutions to this.

Domain 1 Broker A Domain 2 Broker B Host XHost Y Client-to-Client Communication Data B’  X Request Y  A’ Request Y  A’ Request X  A Request X  A Request Y  B Request Y  B Request X  B’ Request X  B’ Data A’  Y

Summary Simple architectural changes can make a big different to the DoS threat space. Making asymmetry an integral part of the architecture seems key.  “Client” vs “Server” split is a big win. Symmetric applications supported through simultaneously setup.  More complicated, but not disasterously so.  Peer-to-peer may be just too risky though, as it permits fast spreading worms.

Big Question What do we actually want from a network architecture?