05/2007ORNL Presentation Distributed Denial of Service Games by Chinar Dingankar, Student Dr. R. R. Brooks, Associate Professor Holcombe Department of.

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

Traveling Salesperson Problem
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Introduction to Algorithms
1 Advancing Supercomputer Performance Through Interconnection Topology Synthesis Yi Zhu, Michael Taylor, Scott B. Baden and Chung-Kuan Cheng Department.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
Chapter 6 Maximum Flow Problems Flows and Cuts Augmenting Path Algorithm.
Five Problems CSE 421 Richard Anderson Winter 2009, Lecture 3.
Towards Virtual Routers as a Service 6th GI/ITG KuVS Workshop on “Future Internet” November 22, 2010 Hannover Zdravko Bozakov.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
Lecture 1 - Introduction 1.  Introduction to Game Theory  Basic Game Theory Examples  Strategic Games  More Game Theory Examples  Equilibrium  Mixed.
Bottleneck Routing Games in Communication Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
The Maryland Optics Group Multi-Hop View: Interfaces not available between (s, d): Try to create multi-hop path. Link Selection: Local Optimization: Select.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
CS294-6 Reconfigurable Computing Day 15 October 13, 1998 LUT Mapping.
Quickest path and Quickest routing: A dynamic routing method Research Topic: Jiang, XidongMS candidate in computer science at California State University,
Lecture 3. Notations and examples D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2015.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Network Topologies.
Basic Concepts of Computer Networks
Game theoretic models for detecting network intrusions OPLab 1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Distributed Control of FACTS Devices Using a Transportation Model Bruce McMillin Computer Science Mariesa Crow Electrical and Computer Engineering University.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Operations Research Assistant Professor Dr. Sana’a Wafa Al-Sayegh 2 nd Semester ITGD4207 University of Palestine.
Programming for Geographical Information Analysis: Advanced Skills Online mini-lecture: Introduction to Networks Dr Andy Evans.
March 8, 2006  Yvo Desmedt Robust Operations Research II: Production Networks by Yvo Desmedt University College London, UK.
Introduction to Operations Research
Network Aware Resource Allocation in Distributed Clouds.
CS774. Markov Random Field : Theory and Application Lecture 13 Kyomin Jung KAIST Oct
Module 4: Planning, Optimizing, and Troubleshooting DHCP
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Announcements Network Flow today, depending on how far we get, we will do String Matching on Wednesday Then Review for Final next Monday This week’s lab.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
DDoS Attack on GENI Ilker Ozcelik and Richard Brooks* Clemson University Detecting a DDoS Attack is not the solution for Internet security. After gaining.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
1 Iterative Integer Programming Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Sethavidh Gertphol and Viktor K. Prasanna University.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Graphs A ‘Graph’ is a diagram that shows how things are connected together. It makes no attempt to draw actual paths or routes and scale is generally inconsequential.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
Static Process Scheduling
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Fundamentals of Computer Networks ECE 478/578
Graphs. Graph Definitions A graph G is denoted by G = (V, E) where  V is the set of vertices or nodes of the graph  E is the set of edges or arcs connecting.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Energy Aware Network Operations
Constraint-Based Routing
Advanced Computer Networks
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
Chapter 4 Data Link Layer Switching
CprE 458/558: Real-Time Systems
Games with Chance Other Search Algorithms
CSE 421 Richard Anderson Autumn 2016, Lecture 3
CSE 421 Richard Anderson Autumn 2015, Lecture 3
CSE 421, University of Washington, Autumn 2006
CSE 421 Richard Anderson Autumn 2019, Lecture 3
Presentation transcript:

05/2007ORNL Presentation Distributed Denial of Service Games by Chinar Dingankar, Student Dr. R. R. Brooks, Associate Professor Holcombe Department of Electrical and Computer Engineering Clemson University Clemson, SC Tel Fax

05/2007ORNL Presentation Introduction Combinatorial game theory to analyze the dynamics of DDoS attacks on an enterprise A game is played on a capacitated graph (computer network) –Nodes have limited CPU capacities –Links/Edges have bandwidth constraints A distributed application runs on the computer network Our approach gives two important results – –It quantifies the resources an attacker needs to disable a distributed application –If the attacker does not have enough zombies required  provide near optimal strategies for reconfiguration of the distributed application in response to attempted DDoS attacks

05/2007ORNL Presentation Physical Environment A simple two player game to be played on a computer network The “physical” graph (computer network) is represented by a directed graph structure (EG) with N nodes –EG = [EV,EE] –EV→ vertices with known CPU bandwidth –EE→ is a set of directed edges or links with known communication bandwidth –Local bandwidth on each node - Infinite Connectivity matrix (EE)= Note (6,6) =0 EV = [2, 3, 4, 2, 1, 3]

05/2007ORNL Presentation Players Two players in the game – –Blue – A set of distributed programs running on physically connected computers BG = [BV,BE] BV→ is a set of nodes representing distributed programs with known CPU load BE→ is a set of edges or links representing the communications bandwidth needed between two programs Local bandwidth on each node - Infinite Represented by the color BLUE –Red – Red is an attacker that places zombie processes on physical graph nodes. Zombies send network traffic over the physical edges Number of zombies and where to place them Represented by the color RED

05/2007ORNL Presentation Set of feasible Blue configurations  set of mappings of BV onto EV that satisfy two classes of constraints: –Nodal Capacity Constraint: –Edge Capacity Constraint: Two Blue nodes on same Physical node – Infinite Arc capacity Maxflow for each pair of source and sink on the network Set of feasible configurations  BC = {BC 1, BC 2... BC L } Nodal capacity of Physical node >= Nodal capacity of Physical node >= Nodal capacity of Blue Nodal capacity of Blue Feasible Blue Configurations Maxflow between two Physical nodes >= Arc capacity of two Blue nodes Arc capacity of two Blue nodes AB 2 AB A B 2 Infinite B/W AB 2

05/2007ORNL Presentation RED disrupts Blue Red disrupts a Blue configuration by placing zombies so as to - –Attack node capacities - Red places zombies nodes hosting one or more Blue processes. The node capacity attack is rather trivial and not very interesting Difficult for Red to compromise the servers used by Blue –Flood arcs – Red places zombies on nodes that do not host Blue processes. Zombies produce network traffic that consumes communications bandwidth on edges in EE A Blue configuration is disabled  required arc capacity of any Blue edge (s-t) becomes greater than the available maxflow from s-t on the physical graph Our analysis focuses on flooding attacks

05/2007ORNL Presentation To determine the set of zombies needed by Red, we: –Calculate the mincut for each element of BE –Blue slack capacity at the mincut (BS) –Expected number of blue packets dropped –Volume of red traffic so that  no. of blue packets dropped > BS –Red traffic (RT), Zombie Placement: If the Maxflow to a node in the mincut of an element of BE is > RT then that node is a candidate for zombie placement. –We need minimum number of zombies  so look for zombie nodes that can disable more than one element of BC. –We get a smallest set of zombies needed to disable all elements of BC Zombie Traffic and Zombie Placement        BS 1 C RT λ packets is the Blue traffic λ packets is the Blue traffic C is the capacity of the physical arc physical arc

05/2007ORNL Presentation Game If the attacker does not have enough zombies to disable all blue configurations  Blue has a chance to recover from the DDoS attack by reconfiguring. A simple board game. Rules for the game: –Blue starts the game. –Each player is allowed one move at a time. –Blue can take one possible configuration out of the available BC’s for one move. –Blue cannot have redundancy i.e. multiple Blue copies. –Once Red places a zombie on a node it cannot move that zombie until its next turn –Blue reconfigures by migrating a single process from a physical node to another. –Blue and Red have perfect knowledge of each other’s configurations. Aim of each player –Red tries to force Blue into a position where it cannot recover by transitioning to another element of BC. –Blue tries to find a “loopy” game where it can always return to a previous configuration.

05/2007ORNL Presentation An Example Game Blue ConfigurationReconfigure 12, 3, 4 21, 5, 6 31, 7 41,10 52, 8, 9 62, 9 73, , 6 104, 7 Zombie Move ZombiesDisrupt Blue Configurations A3, 51, 2, 7 B1, 63, 4, 5 C3, 42, 6, 9 D1, 58, 9, 10

05/2007ORNL Presentation NA – Zombie at A 6 is chosen NA – Zombie at C NA – Zombie at A A C [1, 2, 7] [2, 6, 9] RED WINS THE GAME !!!! An Example Game

05/2007ORNL Presentation 2 A [1, 2, 7] 516 NA – Zombie at A 5 is chosen B [3, 4, 5] 289 Loop – (2-5-2) Blue Wins 9 is chosen C [2, 6, 9] 56 NA – Zombie at CLoop – (5-9-5) Blue Wins BLUE WINS THE GAME !!!! An Example Game

05/2007ORNL Presentation Thermographs Any given enterprise relies on multiple distributed processes –Each distributed process represents a single game An attacker can not expect to destroy all of the processes at any point in time  tries to maximize the number of disabled processes This situation describes a “sum of games” problem Blue and Red have alternate moves At each turn, a player chooses a game (process) and a move to make in that game This problem has been shown to be  P-Space complete Thermographs can be used to find the near optimal solution Use of thermographs to choose a game from all the games and then make a move in that game

05/2007ORNL Presentation Applications Local Area Networks (LANs): Zombies in the larger Internet may target processes on the LAN –To identify system bottlenecks –To determine if volume of the external traffic can compromise distributed processes on the LAN. Corporate Networks: Zombies can attack the VPN traffic traveling through global Internet –Graph structure of the VPN connections can be used to create an adaptive VPN infrastructure that can tolerate DDoS attacks. Global routing problems: Routing between AS uses the BGP, which is subject to instability in the presence of flooding DDoS attacks. –AS graph structure can be used to determine if the volume of traffic reaching sensitive BGP nodes is enough to disrupt the routing between critical agencies.