New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Ari Juels, J. Alex Halderman and Edward W. Felten.

Slides:



Advertisements
Similar presentations
Client Puzzles A Cryptographic Defense Against Connection Depletion Attacks Ari Juels and John Brainard RSA Laboratories.
Advertisements

Security Issues In Mobile IP
Client Puzzles A Cryptographic Defense Against Connection Depletion Attacks Most of slides come from Ari Juels and John Brainard RSA Laboratories.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
CSC 774 Advanced Network Security
CSC 774 Advanced Network Security
Digital Signatures and Hash Functions. Digital Signatures.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 Reading Log Files. 2 Segment Format
CS162 Section Lecture 9. KeyValue Server Project 3 KVClient (Library) Client Side Program KVClient (Library) Client Side Program KVClient (Library) Client.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
12/2/2003chow1 Network and System Support for Multi-Level Security C. Edward Chow Department of Computer Science University of Colorado At Colorado Springs.
LAAC: A Location-Aware Access Control Protocol YounSun Cho, Lichun Bao and Michael T. Goodrich IWUAC 2006.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
SSH Secure Login Connections over the Internet
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Lecture 14 – Web Security SFDV3011 – Advanced Web Development 1.
Chapter 6: Packet Filtering
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Secure Socket Layer (SSL)
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
IP Forwarding.
Transmission Control Protocol TCP. Transport layer function.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Theory of Computation II Topic presented by: Alberto Aguilar Gonzalez.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
1 TCP/IP based TML for ForCES Protocol Hormuzd Khosravi Furquan Ansari Jon Maloy 61 st IETF Meeting, DC.
Protecting Privacy in WLAN with DoS Resistance using Client Puzzle Team 7 Yanisa Akkarawichai Rohan Shah CSC 774 – Advanced Network Security Prof. Peng.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Mehmud Abliz, Taieb Znati, ACSAC (Dec., 2009). Outline Introduction Desired properties Basic scheme Improvements to the basic scheme Analysis Related.
Cody Brookshear Andy Borman
JELENA MIRKOVIC (USC) PETER REIHER (UCLA) Building Accountability into the Future Internet In Proc. IEEE NPSec, 2009 Speaker: Yun Liaw.
Prepared by Dr. Lamiaa Elshenawy
EC week Review. Rules of Engagement Teams selected by instructor Host will read the entire questions. Only after, a team may “buzz” by raise of.
1. U2F Case Study Examining the U2F paradox 3 What is Universal 2 nd Factor (U2F)?
New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Stanford University Ari Juels, RSA Laboratories Alex Halderman, Princeton University.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
RPSEC WG Issues with Routing Protocols security mechanisms Vishwas Manral, SiNett Russ White, Cisco Sue Hares, Next Hop IETF 63, Paris, France.
Denial of Service Attacks and Countermeasures Analysis Dang Nguyen Duc School of Engineering ( )
K. Salah1 Security Protocols in the Internet IPSec.
Using Rhythmic Nonces for Puzzle-Based DoS Resistance Ellick M. Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, and Daniel Rebolledo University of.
Outline Basics of network security Definitions Sample attacks
Lab 2: TCP IP Attacks ( Indirect)
CS/ECE 418 Introduction to Network Security
A Cryptographic Defense Against Connection Depletion Attacks
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
A Cryptographic Defense Against Connection Depletion Attacks
CIS 4930/6930 – Privacy-Preserving and Trustworthy Cyber-Systems Dr
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Ari Juels, J. Alex Halderman and Edward W. Felten

Motivation Client puzzle mechanism can become the target of DoS attacks Servers have to validate solutions which require resources Servers have to validate solutions which require resources Puzzles must be solved online User time is more important than CPU time User time is more important than CPU time

Properties of the Proposed Solution The creation of puzzles is outsourced to a secure entity, the bastion Creates puzzle with no regard to which server is going to use them Creates puzzle with no regard to which server is going to use them Verifying puzzle solutions is a table lookup Clients can solve puzzles offline ahead of time A puzzle solution gives access to a virtual channel for a short time period

Puzzle Properties Unique puzzle solutions Each puzzle has a unique solution Each puzzle has a unique solution Per-channel puzzle distribution Puzzles are unique per each (server, channel, time period) triplet Puzzles are unique per each (server, channel, time period) triplet Per-channel puzzle solution If a client has a solution for one channel, he can calculate a solution for another server with the same channel easily If a client has a solution for one channel, he can calculate a solution for another server with the same channel easily

Priv: X 1 Router Pub: Y 1 Virtual Channels Bastion G: A group of prime numbers with generator g. Pick r c,t  Z q a c,t  [r c,t, (r c,t + l) mod q] Let g c,t = g f’(a), puzzle  c,t = (g c,t, r c,t )  c,t  c,t for all channels Enumerate l values to solve a c,t Solution is  c,t = Y 1 f’(a) Take the easy way  c,t = g c,t X1

Priv: X 1 Server 1 Pub: Y 1 Virtual Channels Server 1:  c,t = Y 1 f’(a)  c,t = g c,t X1 Server 2:  c,t = Y 2 f’(a) Server 3:  c,t = Y 3 f’(a) Priv: X 2 Server 2 Virtual Channels  c,t = g c,t X2 Priv: X 3 Server 3 Virtual Channels  c,t = g c,t X3 Pub: Y 2 Pub: Y 3

System Description Solutions for puzzles are only valid for the time period t. (Order of minutes) Client: During T i, download puzzles for T i+1 and solve During T i, download puzzles for T i+1 and solve Check to see if server has a public key Check to see if server has a public key If so append puzzle solutions to messages If so append puzzle solutions to messagesServer: During T i, download and solve all puzzles for T i+1 During T i, download and solve all puzzles for T i+1 If server is under attack only accept requests that have valid tokens If server is under attack only accept requests that have valid tokens Checking puzzle solution is a simple table lookup Checking puzzle solution is a simple table lookup

Communication Public key: Y Puzzle index: c Token:  c,t Token:  c,t+1 c Client uses option field in TCP SYN to relay the token Only the first 48 bits of the solution is used The server determines the virtual channel Server limits new connection per channel Virtual Channels

Resilience Against Attacks 2.1 GHz Pentium can process 1024-bit DH key in 3.7ms. With 5% recourse it can populate tokens for 16,000 virtual channels. If s=2, every client can solve at least one puzzle and half of them can solve at least two If attacker has 50 zombie machines, it can create 2*50*2 = 200 puzzle solutions occupying 1.25% of the channels If attacker has 50 zombie machines, it can create 2*50*2 = 200 puzzle solutions occupying 1.25% of the channels Probability of a benign user not getting a normal channel <.625% Probability of a benign user not getting a normal channel <.625%

Experiment Puzzle checking (table lookup) is implemented at kernel lvl After the routing and before the packet reaches higher level protocols like TCP Simulate conventional puzzles by replacing the lookup code with a SHA-1 hash computation Simulate syncookies by allowing Linux to send an ACK packet back