Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Slides:



Advertisements
Similar presentations
IPSec.
Advertisements

Secure Mobile IP Communication
Why Is DDoS Hard to Solve? 1.A simple form of attack 2.Designed to prey on the Internet’s strengths 3.Easy availability of attack machines 4.Attack can.
IUT– Network Security Course 1 Network Security Firewalls.
Leveraging Good Intentions to Reduce Unwanted Network Traffic Marianne Shaw (U. Washington) USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Firewall Configuration Strategies
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing Base on RFC 2827 Lector Kirill Motul.
Panel: Current Research on Stopping Unwanted Traffic Vern Paxson, Stefan Savage, Helen J. Wang IAB Workshop on Unwanted Traffic March 10, 2006.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Department Of Computer Engineering
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Edge Protection 111. The Old World: Network Edge Core routers individually secured Every router accessible from outside “outside” Core telnet snmp.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
– Chapter 4 – Secure Routing
Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.
Steps Towards a DoS-resistant Internet Architecture Mark Handley Adam Greenhalgh CII/University College London.
TCOM 515 Lecture 6.
Chapter 6: Packet Filtering
I-4 routing scalability Taekyoung Kwon Some slides are from Geoff Huston, Michalis Faloutsos, Paul Barford, Jim Kurose, Paul Francis, and Jennifer Rexford.
Dynamic Firewalls and Service Deployment Models for Grid Environments Gian Luca Volpato, Christian Grimm RRZN – Leibniz Universität Hannover Cracow Grid.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
CS 3830 Day 29 Introduction 1-1. Announcements r Quiz 4 this Friday r Signup to demo prog4 (all group members must be present) r Written homework on chapter.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Firewall Security.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
JELENA MIRKOVIC (USC) PETER REIHER (UCLA) Building Accountability into the Future Internet In Proc. IEEE NPSec, 2009 Speaker: Yun Liaw.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
IP Traffic Engineering RSP draft-shen-ip-te-rsp-01.txt Naiming Shen Albert Tian Jun Zhuang
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—2-1 BGP Transit Autonomous Systems Forwarding Packets in a Transit AS.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
An Introduction to Mobile IPv4
Spoofing Prevention Method Srikanth T.S.S. Sri Lakshmi Ramya S.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Deployable Filtering Architectures Against Denial-of-Service Attacks Department of Computer Science University College London Telephone: +44 (0)
IP Spoofing. What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)
Atrium Router Project Proposal Subhas Mondal, Manoj Nair, Subhash Singh.
11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.
Introduction Wireless devices offering IP connectivity
Zueyong Zhu† and J. William Atwood‡
Chapter 18 IP Security  IP Security (IPSec)
Network Security Marshall Leitem 11/30/04
Network Design & Analysis
Defending Against DDoS
BGP Overview BGP concepts and operation.
Preventing Internet Denial-of-Service with Capabilities
Server-to-Client Remote Access and DirectAccess
Firewalls Purpose of a Firewall Characteristic of a firewall
DDoS Attack and Its Defense
Fixing the Internet: Think Locally, Impact Globally
Network Layer: Internet Inter-Domain Routing
Presentation transcript:

Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London

Background: Using Addressing to Combat DoS Attacks In previous work, we suggested that many of unwanted modes of operation of the Internet could be prevented by simple changes to the addressing architecture. Unfortunately these changes would be hard to deploy in practice.  Needs IPv6, HIP, large-scale agreement on the solution.

Towards deployable solutions. To be deployable in the near term, a solution needs to satisfy the following criteria:  Feasible with IPv4.  Use off-the-shelf hardware.  No changes to most Internet hosts.  No changes to most Internet routers.  Use existing routing protocols.

Towards evolvable solutions It is important that in providing short-term solutions we don’t sacrifice the future evolution of the Internet. Anything that goes in the middle of the network should be:  Application independent.  Impose minimal dependencies on transport protocols.

Goals Defend servers against DoS attacks.  Opt-in. Servers have to choose to be defended. Shut down unwanted traffic in the network as close to the source of that traffic as possible.  Server decides certain traffic is unwanted.  Requests traffic is shut down.  Network filters traffic. Only network filtering can defend against link-flooding attacks.

Very Simple Architectural Overview Place control points in the network that are capable of performing IP-level filtering.  Cause unwanted traffic to our servers to traverse these control points.  Provide a signalling mechanism to allow the servers to request certain traffic is filtered. Problem 1: How to determine which control point can shut down certain traffic? Problem 2: How to ensure that only the recipient of unwanted traffic can request its filtering.

Revised Architectural Overview Place control points in the network. Cause all traffic to server subnets to traverse at least one control point.  Control points mark the traffic with their identity. Receivers can see which control points are on the path from sender.  Can request correct control point to install filter.

Constraints To provide a protocol-independent solution, we must primarily work at the IP layer. The main IP-layer tools available to us are:  Addressing  Routing  Encapsulaton

Using these tools... Addressing  To identify server subnets. Routing  To limit and control the paths to the server subnets.  To direct traffic through control points near to the source of the traffic. Encapsulation  To record information about the control points traversed on the path from client to server.

Incremental Deployment First we’ll sketch out how servernets might be deployed in a single ISP.  Can only push back as far as ISP border.  Useful for large ISPs with many peering points, as attack has not yet fully converged. Next we’ll explain how cooperating ISPs can deploy multi-ISP servernets.  Greater benefits as pushback can be much closer to attack source.

S 12 Border Router Local Router Server ISP Network Normal ISP Routing E-BGP I-BGP + OSPF 3 Traffic Source

S 12 Server ISP Network Encapsulation E-BGP: Advertise S E-BGP Advertise S I-BGP 3 Traffic Source Monitor Request Filter

S 12 Server ISP Network Routing I-BGP Net S Nexthop D, “servernet” “no export” I-BGP Net S Nexthop D, “servernet” “no export” 3 D E1 E2 S not advertised E-BGP Net S Nexthop E1 E-BGP Net S Nexthop E1 E-BGP Net S Nexthop E2 E-BGP Net S Nexthop E2 Key Points: Only route from outside to S is via an encapsulator. Net D is not externally advertised at all. Key Points: Only route from outside to S is via an encapsulator. Net D is not externally advertised at all.

S 1 Server Routing for Internal Clients I-BGP Net S Nexthop D, “servernet” “no export” I-BGP Net S Nexthop D, “servernet” “no export” 3 D E1 E2 C Client Local DoS attack? OSPF: Net S via E1 OSPF: Net S via E1 OSPF: Net S via E2 OSPF: Net S via E2

S Server D1 R1 I-BGP Net S Nexthop D, “servernet” “no export” I-BGP Net S Nexthop D, “servernet” “no export” R2 I-BGP Net S Nexthop R1, “servernet” “servernet-transit” “no export” I-BGP Net S Nexthop R1, “servernet” “servernet-transit” “no export” Multi-ISP Servernets I-BGP Net S Nexthop R1, “servernet” “servernet-transit” “no export” I-BGP Net S Nexthop R1, “servernet” “servernet-transit” “no export” To rest of world (external clients) E-BGP Net S, R1 “servernet” “no export” E-BGP Net S, R1 “servernet” “no export”

S Server D1 R1 R2 Multi-ISP Servernets I-BGP Net S Nexthop R1, “servernet” “servernet-transit” “no export” I-BGP Net S Nexthop R1, “servernet” “servernet-transit” “no export” Client

Protection Provide defense against non-spoofed traffic for servers that opt-in.  Automatic mechanism reduces costs for ISP.  Lower collateral damage for ISP. Assumes a detection mechanism exists that can identify bad traffic sources. What about spoofed traffic?

Attack landscape Currently most DoS attacks are not spoofed.  No need to! Servernets change the landscape. Attackers will then need to:  Spoof source addresses.  Disguise their attack traffic to fly below the detection threshold.

Spoofing The existence of servernets would provide stronger motivation for deployment of ingress filtering.  Currently there’s limited gain from doing so. Servernet encapsulators are a natural place to perform source address validation.  Only current ways to do this are hacks, but future extensions to protocol stack could provide simple address authentication.  Eg. ICMP nonce-exchange.  This is a longer-term solution.

Implement and test the scheme in the lab.  Software implementation on fast PC hardware.  Goal is to encap/decap and firewall at 1Gb/s.  Already in progress (3 to 6 months). Deploy the scheme in the wild.  Industrial collaborators are most welcome. Future work