DoS attacks on transit network - David Harmelin ( ) Denial of Service attacks on transit networks David Harmelin DANTE
DoS attacks on transit network - David Harmelin ( ) DANTE advanced network services for the European research community: TEN-155, GÉANT active in testing and evaluating emerging technologies DANCERT
DoS attacks on transit network - David Harmelin ( ) Connecting 30 NRENs Backbone and access speeds up to 622 Mbps Research interconnections to North America (USA & Canada) and Asia-Pacific Multiple interconnections with the commercial Internet
DoS attacks on transit network - David Harmelin ( ) Definition of a DoS attack DoS attack DoS attack: an attack on a network or computer, the primary aim of which is to disrupt access to a given service. networked flood-based In this presentation, only DoS attacks involving flooding of networks are considered (networked flood-based DoS attacks).
DoS attacks on transit network - David Harmelin ( ) Example of a networked DoS ( )
DoS attacks on transit network - David Harmelin ( ) Why care about DoS attacks? DoS attacks add to the overall costs : –when unnoticed –one target, many outages –elements not targeted may still be victims all users (using the starved resource) suffer. No quick fix in sight! Need for better co-operation between ISPs.
DoS attacks on transit network - David Harmelin ( ) Are you affected by DoS attacks? Everybody running/using IP networks or services is. DoS attacks are rarely reported in the media. Most organisations do not notice when affected. Management may not be notified.
DoS attacks on transit network - David Harmelin ( ) DANTE and DoS attacks 1999: DoS attacks noticed regularly on TEN-155. Beginning 2000: DoS attacks against major companies in the news. 2000: first tool based on peer-peer matrix analysis. Failed. End 2000: second tool, based on sampled flow data. DANCERT relies on it to reduce the amount of DoS attacks.
DoS attacks on transit network - David Harmelin ( ) Detecting DoS attacks (1)
DoS attacks on transit network - David Harmelin ( ) Detecting DoS attacks (2) Central server: every X minutes, samples every PoP WS with rate 1/Y flows, during Z seconds. For each router, if more than N flows are received with the same destination IP, raise an alarm. Current values in use: –Routers with regular netflow: X=15, Y=100, Z=10, N=10 »most attacks > 100 pkts/s are detected –Routers with sampled netflow (rate: 1/200 packets): X=15, Y=10, Z=60, N=10 »most attacks > 330 pkts/s are detected
DoS attacks on transit network - David Harmelin ( ) Results Running the tool on 4 core routers since 12/2000. Logging all attacks detected since 03/2001 Trade-off between –accuracy (confirmed attacks/alarms raised=98%) –detection effectiveness (>100 pkt/s). Average of 34 different attacks per day logged, up to 5-6 concurrent (96 polls per day). 90% “C class” attacks - easily traceable. 75% of attacks are 40 bytes TCP packets.
DoS attacks on transit network - David Harmelin ( ) Results - “C class” attacks Spoofed source addresses within the /24 of the source. Coded by default in some DoS tools. Appears as if coming from: , , …
DoS attacks on transit network - David Harmelin ( ) Results - Durations Most attacks last less than 15 minutes. Fast inter-domain tracing required to find the source.
DoS attacks on transit network - David Harmelin ( ) Results - Traffic generated Approximate values only. Low accuracy due to sampling. Highest: pkts/s Highest: 32 Mbps
DoS attacks on transit network - David Harmelin ( ) Known limitations of this method Routers capabilities (netflow required) Detecting networked flood-based DoS attacks only... … but not ALL. Detection helps, but further need for co-operation.
DoS attacks on transit network - David Harmelin ( ) Other approaches exist No detection Human detection Monitoring CPU load, and traffic counters. IETF working on itrace Passive monitoring Other flow monitoring approaches
DoS attacks on transit network - David Harmelin ( ) IP network operators: –automatic detection and logging of DoS attacks –co-operation between CERT teams –SLAs End-sites: –prevention –trace when DoS traffic sources are reported DANTE: – –gives away the in-house software to transit providers. Who should help? How?