08/02/01S. Felix Wu --UCCS Visit1 Distributed Denial of Services the Problem, its Solutions, and their Problems Dr. S. Felix Wu Computer Science Department.

Slides:



Advertisements
Similar presentations
IP Forwarding Relates to Lab 3.
Advertisements

CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS 457 – Lecture 16 Global Internet - BGP Spring 2012.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
02/15/2007ecs2361 Tracing & Traceability S. Felix Wu UC Davis
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
08/02/2001S. Felix Wu and Dan Massey1 iTrace Probability: 1/20,000 For routers closer to the victim, useful iTrace messages will be produced very frequently.
1 Controlling High Bandwidth Aggregates in the Network.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.
04/22/2001ecs289K: Intention Driven iTrace1 ecs298k Intention-Driven iTrace lecture #6 Dr. S. Felix Wu Computer Science Department University of California,
03/19/2001ICMP Traceback Working Group, IETF'50, Minneapolis, MN 1 Intention-Driven iTrace S. Felix “Last Minutes” Wu UC Davis
04/12/2001ecs289k, spring ecs298k Distributed Denial of Services lecture #5 Dr. S. Felix Wu Computer Science Department University of California,
04/05/20011 ecs298k: Routing in General... lecture #2 Dr. S. Felix Wu Computer Science Department University of California, Davis
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
CS 6401 IPv6 Outline Background Structure Deployment.
Computer Networks Layering and Routing Dina Katabi
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
IP Forwarding.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
1 IP : Internet Protocol Computer Network System Sirak Kaewjamnong.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
Distributed Denial of Service Attacks
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Routing and Routing Protocols
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
DoS/DDoS attack and defense
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
Lecture 17 Page 1 CS 236, Spring 2008 Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
K. Salah1 Security Protocols in the Internet IPSec.
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Denial of Service attack in IPv6 networks and Counter measurements
Defending Against DDoS
Defending Against DDoS
IP : Internet Protocol Surasak Sanguanpong
Chapter 20 Network Layer: Internet Protocol
Networking and Network Protocols (Part2)
IP Forwarding Relates to Lab 3.
ITIS 6167/8167: Network and Information Security
DHCP: Dynamic Host Configuration Protocol
Outline The spoofing problem Approaches to handle spoofing
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

08/02/01S. Felix Wu --UCCS Visit1 Distributed Denial of Services the Problem, its Solutions, and their Problems Dr. S. Felix Wu Computer Science Department University of California, Davis

08/02/01S. Felix Wu --UCCS Visit2 Denial of Service attack beyond Authenticity, Authority, and Privacy Computer system finite resources-- bandwidth, connections, buffer space…. attacker victims consume all or most of the resources! Services are Denied!

08/02/01S. Felix Wu --UCCS Visit3 Distributed DoS yahoo, ebay, msn,... Slave Master Slave Attack traffic aggregated! Denial of Service! Hundreds/thousands of Slaves simultaneously launch attacks! no service or degraded service

08/02/01S. Felix Wu --UCCS Visit4 The Plain DDoS Model ( ) Masters Slaves Victim... ISP.com ::::. Attackers src: random dst: victim 1,500 bytes per pkt ~10K bits per pkt ~100K pkts per second 2000 slaves 50 pkts per second per slave 0.5M bits per second

08/02/01S. Felix Wu --UCCS Visit5 Reflector Use a legitimate network server/client as the reflector to avoid being traced. (stepping stone). Reflector VictimSlave Service Request Packet src: Victim dst: Reflector Service Reply Packet src: Reflector dst: Victim

08/02/01S. Felix Wu --UCCS Visit6 The Reflective DDOS Model (2000) Masters Slaves Victim... ISP.com ::::. Reflectors Attackers src: victim dst: reflector src: reflector dst: victim

08/02/01S. Felix Wu --UCCS Visit7 Internet Source Accountability UCD AOL UUNet Header src: AOL dst:UCD Payload …………….. A B

08/02/01S. Felix Wu --UCCS Visit8 Possible Solutions Stop it!! –egress/ingress filtering –aggregated-flow anomaly-based rate limiting ISP, dot-COM,... Trace it!! –where are the slaves and masters? Law enforcement agencies,...

08/02/01S. Felix Wu --UCCS Visit9 Ingress/egress filtering boosting source accountability drop it or not?? Is the source IP address of this incoming IP packet valid from this particular network interface??? 1. Static configuration 2. Routing table reverse look-up 3. Routing information analysis (BGP/OSPF/RIP) Net: * filtering policies

08/02/01S. Felix Wu --UCCS Visit10 Aggregate-Based Congestion Control avoiding micro-flow management RED buffer (Random Early Dropping) 50%80% good for aggressive but responsive TCP flows...

08/02/01S. Felix Wu --UCCS Visit11 Aggregate-Based Congestion Control avoiding micro-flow management 50%80% rate limiters High bandwidth AG-Flow? yes no High-Bandwidth AG-Flow Analyzer E.g., all ICMP packets toward dst: *. (1). How to determine the signature of an AG-Flow?? (2). How to set the limited rate for an AG-Flow??

08/02/01S. Felix Wu --UCCS Visit12 Packet Tracing A transit router puts a mark in the data packets themselves. (like UPS/FedEx) –find the space in the packet to perform the mark? A transit router puts a mark outside of the data packets. (I have seen it!!) –find the bandwidth in the Internet?

08/02/01S. Felix Wu --UCCS Visit13 Statistical Packet Marking Masters Slaves Victim... ISP.com ::::. Attackers src: random dst: victim

08/02/01S. Felix Wu --UCCS Visit14 Marking procedure at router R: for each packet w let x be a random number from [0..1) if x < p then write R into w.start and 0 into w.distance else if w.distance == 0 then write R into w.end increment w.distance A5R9 R8 R4 R7 R6 R3 R 5 R2 R1 A6 verhlenTOSTotal Length Identificationflagsoffset Time to liveProtocol Header checksum Source IP address Destination IP address offsetDistanceEdge fragment

08/02/01S. Felix Wu --UCCS Visit15 Problems with Packet Marking 16 bits is unreliable and restrictive. –partial IP header information –weak authentication –inefficiency can not handle reflective DDoS. –require modification of TCP protocol stack (and specification) -- not sure exactly how to do it completely and correctly.

08/02/01S. Felix Wu --UCCS Visit16 Masters Slaves Victim... ISP.com ::::. Reflectors Attackers src: victim dst: reflector src: reflector dst: victim ???

08/02/01S. Felix Wu --UCCS Visit17 ICMP Traceback For a very small probability (about 1 in 20,000), each router will send the destination a new ICMP message indicating the previous hop for that packet. Net traffic increase at endpoint is probably acceptable. iTrace it or not??

08/02/01S. Felix Wu --UCCS Visit18 Original iTrace Masters Slaves Victim... ISP.com ::::. Attackers src: random dst: victim

08/02/01S. Felix Wu --UCCS Visit19 iTrace in Reflective DDOS Masters Slaves Victim... ISP.com ::::. Reflectors Attackers src: victim dst: reflector src: reflector dst: victim

08/02/01S. Felix Wu --UCCS Visit20 Improved ICMP Traceback For a very few packets (about 1 in 20,000), each router will send the destination and the source a new ICMP message indicating the previous hop for that packet. Net traffic increase at endpoint is probably acceptable.

08/02/01S. Felix Wu --UCCS Visit21 Reflector VictimSlave Service Request Packet src: Victim dst: Reflector Service Reply Packet src: Reflector dst: Victim source Traceback Messages Who has spoofed me??

08/02/01S. Felix Wu --UCCS Visit22 Improved iTrace Masters Slaves Victim... ISP.com ::::. Reflectors Attackers src: victim dst: reflector src: reflector dst: victim

08/02/01S. Felix Wu --UCCS Visit23 VictimISP Service Request Packet src: Victim dst: source Traceback Messages Is that really me??? How can I tell??

08/02/01S. Felix Wu --UCCS Visit24 Maybe it is my friend... Masters Slaves Victim... ISP.com ::::. Attackers src: random dst: victim Are you sure that this is from a slave or not? customers

08/02/01S. Felix Wu --UCCS Visit25 Emitting a “relatively small” amount Masters Slaves Victim... ISP.com ::::. Attackers src: random dst: victim

08/02/01S. Felix Wu --UCCS Visit26 iTrace Probability: 1/20,000 Attack traffic Background traffic For a router with “lots” of background traffic, it will take a long time before we really generate a “useful” iTrace.

08/02/01S. Felix Wu --UCCS Visit27 A Statistic Problem with iTrace Routers closer to the victims have higher probability to generate iTrace packets toward the true victims in the first N iTrace messages generated. Routers closer to the DDoS slaves might have relatively small probability (smaller than the routers around the victims) to generate “useful” iTrace packets fast enough.

08/02/01S. Felix Wu --UCCS Visit28 “Usefulness” Useful: –It carries attack packets. Valuable: –It carries attack packets from a router that is very close to the original slaves. –We have not received the same “kind” of iTrace messages before. –The iTrace messages are received fast.

08/02/01S. Felix Wu --UCCS Visit29 Three Types of Nodes DDoS victim with the intention to trace the slaves. DDoS victim without the intention. non-DDoS victims (assuming they do not have the intention as well -- and very likely they hope they won’t receive ones).

08/02/01S. Felix Wu --UCCS Visit30 Intention-driven iTrace Different destination hosts, networks, domains/ASs have different “intention levels” in receiving iTrace packets. –We propose to add one “iTrace-intention” bit. Some of them might not care about iTrace, and some of them might not be under DDoS attacks, for example.

08/02/01S. Felix Wu --UCCS Visit31 Issues How to determine the intention bit How to distribute the intention bits to routers globally? How to use the intention bits at each router?

08/02/01S. Felix Wu --UCCS Visit32

08/02/01S. Felix Wu --UCCS Visit33 packet- forwarding table Decision Module iTrace Generation (1/20000) BGP routing table packets iTrace generation bit, (1/20000) intention bits iTrace/Intention-Driven iTrace architecture

08/02/01S. Felix Wu --UCCS Visit34 Processing Overhead Processing for each data packet: 1. if the iTrace flag bit is 1, (1). send an iTrace message for this data packet. (2). reset the iTrace bit to 0. 1/20K iTrace message trigger occurs: 1. Select and Set one iTrace bit in the forwarding table.

08/02/01S. Felix Wu --UCCS Visit / / / / / / / / / / / /160 (1). Before iTrace trigger: (2). After iTrace trigger: I(n) iTrace bit

08/02/01S. Felix Wu --UCCS Visit / / / / / /16 (3). After iTrace sent: I(n) iTrace bit

08/02/01S. Felix Wu --UCCS Visit37

08/02/01S. Felix Wu --UCCS Visit38 Usefulness in MSMV 0

08/02/01S. Felix Wu --UCCS Visit39 How to distribute I(n)? YABE: (Yet Another BGP Extension) –For every BGP route update, we include I(n) as a new string in the community attribute: 0x[iTrace-Intention]:0x[0-1] (optional & transitive) –These I(n) values will be forwarded or even aggregated by the routers who understand this new community attribute. aggregation: I(new) = max {I(n)} –Rate-Limiting on Intention Update: should not be more frequent than Keep-Alive messages. should not trigger any major route computation.

08/02/01S. Felix Wu --UCCS Visit40 Signaling (BGP extension) AS500 AS 120 AS200 AS300 AS250 AS600 AS800 AS900 AS700 AS 100 IDS Intention-bit update request BGP update prefix: 900 attribute: Intend to receive iTrace

08/02/01S. Felix Wu --UCCS Visit41 Summary Improve the probability of “useful” iTrace. Require some “minor” changes to the router forwarding process. Require a new BGP community string. The amount of generated iTrace messages should be no more than the current iTrace proposal.

08/02/01S. Felix Wu --UCCS Visit42 DECIDUOUS Reliably identify the source(s) of attack packets. (Tracing) –Intrusion Detection, Response, Source Identification. Collaborating with Edge Routers or Security Gateways that support IPSEC or other types of Tunnels –Utilize the IPSEC framework –Requirements for IPSEC Policy System –Interacting with IDS and IRS/FW.

08/02/01S. Felix Wu --UCCS Visit43 Spoofed IP Address NCSU AOL UUNet Header src: AOL dst:NCSU Payload …………….. A B

08/02/01S. Felix Wu --UCCS Visit44 IPSec Tunnel NCSU AOL UUNet Header src: AOL dst: NCSU Payload …………….. A B Header + IPSec src: A SPI=0x104 dst: B

08/02/01S. Felix Wu --UCCS Visit45 IPSEC/AH, tunnel mode Router or Security Gateway IPSEC Module freeSWAN & Pluto Depending on the results from both IDS and IPSEC modules as well as the nature of the detected attack itself, the Deciduous daemon will decide dynamically where to setup SAs. Attacker’s Target Intrusion Detection System IPSEC Module IPsec PHIL/API Deciduous Daemon Every single SA that has been or has not been used by the attack packet will provide some location information about the true source.

08/02/01S. Felix Wu --UCCS Visit46 Collaboration Internet Core NCSU ISP Attacker’s Target Intrusion Detection System IPSEC Module IPsec PHIL/API Deciduous Daemon

08/02/01S. Felix Wu --UCCS Visit47 Tunnel Path NCSU ISP Attacker’s Target Intrusion Detection System IPSEC Module IPsec PHIL/API Deciduous Daemon Deciduous Daemon Internet Core Phase II-SA

08/02/01S. Felix Wu --UCCS Visit48 DECIDUOUS Testbed at SHANG LAB Stone 163 Stone 4 Sun 2 Hychang2 3 Redwing 164 Squeeze 175 Bone 177 Norwork eth0 152, eth1eth2eth1 eth eth eth eth eth eth eth2 eth eth eth eth2eth eth eth2 Simple Single Source Simple multiple Sources Coordinated Multiple Sources

08/02/01S. Felix Wu --UCCS Visit49 Results

08/02/01S. Felix Wu --UCCS Visit50 Magic Marks: concept src/dst IP addresses the rest….. an outgoing packet src/dst IP addresses 128 bit digest HMAC selector 16 bit mark src/dst IP addresses the rest….. 16 bit mark iTrace message either a SRC itrace or DST itrace... Private key

08/02/01S. Felix Wu --UCCS Visit51 Magic Marks: design src/dst IP addresses the rest….. an outgoing packet Src IP address plus N bits (N=8) of the dst IP address 128 bit digest HMAC selector 16 bit marks Private key Pre-compute the Marking table with 2 N entries! Mark Table look-up

08/02/01S. Felix Wu --UCCS Visit52 A scenario src/dst IP addresses the rest….. 16 bit mark dst iTrace message src/dst IP addresses the rest….. 16 bit mark verify message 16 bit mark src response (Y/N)