Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani.

Slides:



Advertisements
Similar presentations
The role of network capabilities Xiaowei Yang UC Irvine NSF FIND PI meeting, June
Advertisements

Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Introduction 2 1: Introduction.
IPv4 - The Internet Protocol Version 4
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
CCNA – Network Fundamentals
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Chapter 7 – Transport Layer Protocols
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
A DoS-limiting Network Architecture CSCE 715: Fall’06 Presentation by: Amit Jain Shantnu Chaturvedi.
2005 Stanford Computer Systems Lab Flow Cookies Bandwidth Amplification as Flooding Defense Martin Casado, Pei Cao Niels Provos.
A DoS-Limiting Network Architecture Presented by Karl Deng Sagar Vemuri.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168) Limited Transmit (RFC 3042)
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
This is not an impossible architecture – Incremental Deployment Compatible Unlike any previous papers, this paper addresses a lot of issues connected.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
A DoS Limiting Network Architecture An Overview by - Amit Mondal.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Gursharan Singh Tatla Transport Layer 16-May
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Switching Techniques Student: Blidaru Catalina Elena.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
University of the Western Cape Chapter 12: The Transport Layer.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Packet-Marking Scheme for DDoS Attack Prevention
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Networking Basics CCNA 1 Chapter 11.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
DoS/DDoS attack and defense
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
© 2002, Cisco Systems, Inc. All rights reserved..
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Providing QoS in IP Networks
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Instructor Materials Chapter 6: Quality of Service
Internet Networking recitation #9
Topics discussed in this section:
Error and Control Messages in the Internet Protocol
PART 5 Transport Layer Computer Networks.
Net 221D : Computer Networks Fundamentals
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
A DoS-limiting Network Architecture
Transport Layer Unit 5.
Preventing Internet Denial-of-Service with Capabilities
The IP, TCP, UDP protocols
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Network Core and QoS.
Switching Techniques.
Internet Networking recitation #10
Congestion Control Reasons:
Network Core and QoS.
Presentation transcript:

Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

This Presentation covers:  Design of Traffic Validation Architecture to limit the impact of DoS.  The TVA Protocol.  Full range of attacks have been addressed.  Simulations results for TVA are shown proving it better than others.  Deployment of the architecture.  Pros and Cons of this mechanism.

What is DoS?  A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users.  Generally, the purpose of DoS attacks is to prevent an Internet site from functioning efficiently or at all, temporarily or indefinitely.  One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable.

Introduction  DoS attacks have been of major concern considering the reliability of internet.  Proposed defense mechanisms. oIngress Filtering oOverlay Filtering oTraceback oPushback of Traffic Filters oSIFF  The above mentioned mechanisms did not provide complete solution. Hence, a better mechanism was required.

Ingress Filtering (RFC 2827)  Is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.  Packets coming into the network are filtered using ISP if originating from an unknown network.  Limitation –  Works Only with edge routers.  The destination needs to know which IP addresses of each of the networks to which it is communicating.

Traceback  Determines the origin of the attack.  Requires privileged access to routers.  Uses routers to create tables to reconstruct the path of unwanted traffic.  Limitation –  Destination becomes aware of it only if attack sustains for long.  Fails if the attacking frequency is varied.  Attacking from multiple hosts.

Pushback A mechanism in which the congested router asks the upstream routers to limit the amount of traffic during the time of severe congestion which can be due to flash crowd or denial of service attack. Limitation – No way of distinguishing between flash crowd, i.e, requests from good clients, and DoS attacks.

SIFF (Stateless Internet Flow Filter)  Privileged Communication is established by providing clients with capability token via handshake protocol. Privilege Token Limitation – Short capability length (2 bits).

The Solution : Traffic Validation Architecture (TVA)  Covers the shortcomings of previously discussed mechanisms.  Counters attacks that: oFlood the setup channel oExhaust router state oConsume network bandwidth  Allows destination to control the number of packets it receives.

TVA Design Overview  Packets with Capabilities  Bootstrapping Capabilities  Destination Policies  Unforgeable Capabilities  Fine-Grained Capabilities  Bound Router State  Efficient Capabilities  Router Changes and Failures  Balancing Authorized Traffic  Short, Slow or Asymmetric Flows

TVA Design Overview Capabilities  A piece of information authorizing a packet.  Must be unforgeable.  Cannot traverse readily across senders or destinations (valid only between a specific source and a specific destination).  Routers must be able to verify capabilities explicitly.  Each packet carries unique stamp which is necessary for its validation.  Must expire to cut-off unneeded sender.

TVA Design Overview Bootstrapping Issues  Acquiring capabilities without having capabilities by sending request packets.  Once capabilities are obtained, the communication is bootstrapped.  Fair queuing combined with path identifiers prevents overwhelming requests from legitimate clients.

TVA Design Overview Destination Policies  Policies depend on the role destination plays in the network. That is, a client and a public server  A client establishes contact with the server and is not contacted otherwise.  A public server can temporarily block a misbehaving client.

TVA Design Overview Unforgeable Capabilities  Capabilities should not be forgeable.  Each router generates its pre-capability and attaches it with the outgoing packet.  Router verifies the hash using its secret.  Router changes its secret at twice the rate of timestamp rollover.  Destination receives these pre-capabilities, preventing spoofed attacks.

TVA Design Overview Fine-Grained Capabilities  Designed to tackle with false authorizations which can cause the DoS until capability expires.  Limits the amount of data and period of validity.  Two hashes are required now instead of one.

TVA Design Overview Bound Router State  Router memory can get exhausted if the attacker creates authorized connections across a target link.  Router state is maintained only for flows with valid capabilities and send faster than N/T.  For newly arriving packets, router begins a byte count and associates a minimal time-to-live with the state. TTL = L*(N/T) ; L  Length of the packet

TVA Design Overview  Consider the router creates a capability at time “ts” valid uptil “ts + T”, then it allows data till the ttl field is decremented to zero, after which the router state is reclaimed.

TVA Design Overview Efficient Capabilities  Long key length ensures security and short key length expedites the communication.  To increase the efficiency, we use long capabilities to ensure security and cache capabilities at routers so that they can subsequently be omitted for bandwidth efficiency.  Necessary condition for proper working – senders must know when routers will evict their capabilities from the cache.  If capabilities are not found in the router’s cache, the packets will be demoted to legacy packets.

Reduced Packet Overhead  No separate packet is needed to obtain capabilities.  Capability Header adds 8 bytes to packet header for each router on path.  Furthermore, router’s cache entry also helps in reducing the overhead.

Impact of Router Changes  Route change invalidate capabilities causing packets to traverse through different path.  Packets are demoted and forwarded as legacy traffic.  When destination receives it, it marks a bit in the return packet, informing sender to request new capabilities.  Consequent packets are sent as request packets again.

TVA Design Overview Balancing Authorized Traffic  Balancing of the authorized traffic is done by fair-queuing based on the authorizing destination IP address.  To limit the number of queues, a bounded policy is used which only queues those flows that send faster than N/T.  Low-rate flows receive FIFO service.  For Low-rate flows fairness is not guaranteed but FIFO prevents starvation.

TVA Design Overview Short, Slow or Asymmetric Flows  TVA is designed to run efficiently for long, fast flows.  For short or slow connections can be inefficient.  Overall impact is small assuming maximum traffic to be of long flows.

The TVA Protocol  Consists of three elements Packets that carry capability information. Hosts that act as senders and destinations. Routers that process capability information.

The TVA Protocol Packets with Capabilities  Capabilities are piggybacked rather than using separate packets.  There are two types of packets Request Packet Regular Packet  Both the packets share an identifying capability header.

Common Header  Is the opening tag of both request and regular packets.  The “type” field gives important information about the outgoing packet.

The TVA Protocol Request Packet  Carry a list of blank capabilities and path identifiers, that are filled in by routers.

The TVA Protocol Regular Packet  Have two formats: oCarry both flow nonce and a list of valid capabilities. oCarry only a flow nonce.  A regular packet with a list of capabilities may be used to request new set of capabilities

The TVA Protocol Senders and Destinations  A sender first sends a request piggybacked on the first packet.  If the destination chooses to authorize, it sends a response with TCP SYN/ACK, else sends TCP RST.

The TVA Protocol Routers  Process packets according to the capability information and forwards them.  Shares the capacity of each outgoing link with three classes of traffic: oRequest Packets oRegular Packets oLegacy Traffic  Add pre-capabilities and even a path identifier (if it is at the trust boundary)

The TVA Protocol Routers (Contd.)  The cache entry stores the: oValid capability oFlow nonce oAuthorized bytes to send oValid time oTTL oByte Count  Various checks are done to know the type of incoming packet.  The packet is demoted to be of legacy traffic if neither its nonce nor its capabilities are valid.

Simulation Setup  Bottleneck link is shared by:  10 legitimate users each sending a file of 20KB thousand times using TCP (efficiency is 53.3%).  attackers  One legitimate destination and one colluder at the far end.  TVA is changed to rate-limit capacity requests to 1% of link capacity.  Attack intensity is varied by changing the number of attackers.  The timeout for TCP SYN is fixed at one second with up to eight transmissions being performed.

Simulation  The data exchange aborts connection if its retransmission timeout for a regular packet exceeds 64 seconds or the frame has been retransmitted more than 10 times.

Simulation First Scenario  Legacy Packet Floods  Legacy Traffic is considered to be 1Mbps.  The result of the simulation is shown below:

Simulation Legacy Packet Flood (Contd.)  With TVA, almost 100% completion is present because TVA treats legacy traffic with lower priority than request traffic.  Performance of SIFF degrades slowly because it treats both legacy and request packets equally.  Pushback performs well until the number of attackers is increased, after which it performs poorly. The reason being that it is unable to differentiate between attack traffic and legitimate traffic.  With the Internet, the legitimate and attack traffic are considered alike and hence the probability for a successful file transfer decreases exponentially.

Simulation Second Scenario  Request Packet Floods  Attacker is flooding the destination with request packets at 1 Mbps.  Assumption  the destination was able to differentiate between requests from legitimate users and attackers.

Simulation Request Packet Flood (Contd.)  With TVA, requests from attackers and legitimate users are queued separately so that excessive packets from the attackers will be dropped off.  Behavior of SIFF is similar to the previous case as it treats both legacy and request packets as same.  Pushback and Internet also treat them as the regular data traffic.

Simulation Third Scenario  Authorized Packet Floods  TVA still completes the transfer although time taken increases.

Simulation Authorized Packet Flood (Contd.)  TVA allocates bandwidth equally among all users, allowing colluder and destination to have bandwidth fairly allocated.  As the number of colluders increase, although the bandwidth allocated to each of them decreases but no one starves, consequently increasing the transfer time.  With SIFF, legitimate users are completely starved when the intensity of the attack increases because the request packets are treated with lower priority.  Internet and Pushback behave in the same manner described in the previous two scenarios.

Simulation Scenario 4  Imprecise Authorization Policies  Even if the attacker gets the authorization and starts flooding the destination, TVA capabilities will expire after sometime hindering further inflow of packets.  Once the destination realizes that a sender is misbehaving, it stops renewing the capabilities.  In SIFF, the expiration of capabilities depend on changing the router secret.

Simulation Imprecise Authorization Policies (Contd.)

Implementation  The TVA was prototyped using Linux netfilter framework.  AES-hash is used as the first hashing function and SHA 1 as the second.  A kernel packet generator was used to generate different packets and send them through the router to check the behavior of TVA.  The average number of instruction cycles for the router to process each type of packet was recorded.

Security Analysis  The security of TVA depends on ability of the attacker to obtain capabilities for router.  Use of cryptographic hash functions is made having a sufficient amount of key which changes every 128 seconds making it practically impossible to break.  Since the IP source and destination addresses are included, an attacker who steals the packets cannot use them unless he know the router’s secret.

Deployment  The design requires both routers and hosts to be upgraded.  Routers can be upgraded incrementally, at trust boundaries and locations of congestion.  Hosts must also be upgraded by setting proxies at the edges of customer networks.

Pros  Overhead is reduced since no separate request packet is required to acquire capabilities.  Secured transmission with the help of capabilities.  Request Traffic is prioritized ahead of the legacy traffic.  Resistant to infrequent router failures.  Making use of router’s cache entry to expedite the communication.  Rate-limiting the bandwidth helps in minimizing the effect of bad authorizations.

Cons  All the routers need to be synchronized in time, a condition difficult to achieve.  Little protection if a router gets compromised.  High bandwidth is needed for short, slow or asymmetric flows.  The assumption that the destination can differentiate between request packets from attackers and legitimate senders is weak.  After capabilities are validated for each router, packets must follow the same path or be demoted as legacy traffic.

Conclusion  The TVA makes effective communication possible between any two hosts despite a large number of attackers.  Simulation results show that the performance of TVA is better than existing mechanisms.  The implementation of TVA in the Linux kernel showed that TVA can run at gigabit speeds on commodity PCs.