Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014
Lecture 20 Page 2 Advanced Network Security Outline Basic DDoS defense approaches Some example DDoS defenses
Lecture 20 Page 3 Advanced Network Security Basic Approaches to DDoS Defense Don’t let it happen at all Add resources to stay ahead of it Track attack streams to their source –And, presumably, stop them Filter attacks to remove attack traffic
Lecture 20 Page 4 Advanced Network Security Prevention It would be nice if attackers could not perpetrate DDoS attacks at all How to prevent them? –Hygiene approaches –Resource limitations –Hide from the attackers
Lecture 20 Page 5 Advanced Network Security Hygiene Approaches 1.Make protocols less susceptible to DDoS 2.Make computers harder to enlist as zombies 3.Close holes at potential targets that can be used for DDoS All these are good and worthy approaches None of them are enough in isolation Hygiene alone hasn’t solved any other computer security problem, and won’t solve this one, either
Lecture 20 Page 6 Advanced Network Security Resource Limitations Don’t allow an individual attack machine to use many of a target’s resources Requires: –Authentication, or –Making the sender do special work (puzzles) Authentication schemes are often expensive for the receiver Existing legitimate senders largely not set up to handle doing special work Can still be overcome with a large enough army of zombies
Lecture 20 Page 7 Advanced Network Security Hiding From the Attacker Make it hard for anyone but legitimate clients to deliver messages at all E.g., keep your machine’s identity obscure A possible solution for some potential targets –But not for others, like public web servers To the extent that approach relies on secrecy, it’s fragile –Some approaches don’t require secrecy
Lecture 20 Page 8 Advanced Network Security Resource Multiplication As attacker demands more resources, supply them Not always possible and usually expensive Not clear that defender can keep ahead of the attacker But still a good step against limited attacks –Has sometimes worked in practice –And sometimes not More advanced versions use Akamai-like techniques
Lecture 20 Page 9 Advanced Network Security Trace and Stop Attacks Figure out which machines attacks come from Go to those machines (or near them) and stop the attacks Tracing is trivial if IP source addresses aren’t spoofed –Tracing may be possible even if they are spoofed May not have ability/authority to do anything once you’ve found the attack machines Not too helpful if attacker has a vast supply of machines
Lecture 20 Page 10 Advanced Network Security Filtering Attack Streams The basis for most defensive approaches Addresses the core of the problem by limiting the amount of work presented to target Key question is: –What do you drop? Good solutions drop all (and only) attack traffic Less good solutions drop some (or all) of everything
Lecture 20 Page 11 Advanced Network Security Filtering Versus Rate Limiting Filtering drops packets with particular characteristics –If you get the characteristics right, you do little collateral damage –But no guarantee you have dropped enough Rate limiting drops packets on basis of amount of traffic –Can thus assure target is not overwhelmed –But may drop some good traffic Not really a hard-and-fast distinction
Lecture 20 Page 12 Advanced Network Security 12 Where Do You Filter? Near the target? Near the source? In the network core? In multiple places?
Lecture 20 Page 13 Advanced Network Security Implications of Filtering Location Choices Near target Near source In core
Lecture 20 Page 14 Advanced Network Security Implications of Filtering Location Choices Near target –Easier to detect attack –Sees everything –May be hard to prevent collateral damage –May be hard to handle attack volume –Good deployment incentive Near source In core
Lecture 20 Page 15 Advanced Network Security Implications of Filtering Location Choices Near target Near source –May be hard to detect attack –Doesn’t see everything –Easier to prevent collateral damage –Easier to handle attack volume –Poor deployment incentive In core
Lecture 20 Page 16 Advanced Network Security Implications of Filtering Location Choices Near target Near source In core –Easier to handle attack volume –Sees everything (with sufficient deployment) –May be hard to prevent collateral damage –May be hard to detect attack –Poor deployment incentive
Lecture 20 Page 17 Advanced Network Security Example Defenses Pushback DWard Netbouncer SOS Defcom
Lecture 20 Page 18 Advanced Network Security Pushback Goal: Preferentially drop attack traffic to relieve congestion Enable core routers to respond to congestion locally by: –Profiling traffic dropped by RED –Identifying high-bandwidth aggregates –Preferentially dropping aggregate traffic to enforce desired bandwidth limit Pushback: A router identifies the upstream neighbors that forward the aggregate traffic to it, requests that they deploy rate-limit
Lecture 20 Page 19 Advanced Network Security 19 Pushback Example P P P P
Lecture 20 Page 20 Advanced Network Security 20 Pushback Example P P P P
Lecture 20 Page 21 Advanced Network Security 21 Pushback Example P P P P
Lecture 20 Page 22 Advanced Network Security 22 Pushback Example P P P P
Lecture 20 Page 23 Advanced Network Security 23 Pushback Example P P P P
Lecture 20 Page 24 Advanced Network Security 24 Pushback Example P P P P
Lecture 20 Page 25 Advanced Network Security Can it work? Even a few core routers are able to control high-volume attacks Separation of traffic aggregates improves current situation –Only traffic for the victim is dropped –Drops affect part of traffic that contains the attack traffic Likely to successfully control the attack, relieving congestion in the Internet Will inflict collateral damage on legitimate traffic
Lecture 20 Page 26 Advanced Network Security Advantages and Limitations +Routers can handle high traffic volumes +Deployment at a few core routers can affect many traffic flows, due to core topology +Simple operation, no overhead for routers +Pushback minimizes collateral damage by placing response close to the sources –Pushback only works in contiguous deployment –Collateral damage is inflicted whenever attack traffic is not clearly separate from legitimate traffic –Deployment requires modification of existing core routers and likely purchase of new hardware