Hash-Based IP Traceback Alex C. Snoeren +, Craig Partridge, Luis A. Sanchez ++, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent and W. Timothy.

Slides:



Advertisements
Similar presentations
COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips.
Advertisements

Attacks and Defenses Nick Feamster CS 4251 Spring 2008.
IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson University of Washington- Seattle, WA Presented by Mohammad Hajjat- Purdue University Slides.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
IP Spoofing CIS 610 Week 2: 13-JAN Definition and Background n Def’n: The forging of the IP Source Address field in an IP packet n First mentioned.
Network Layer Packet Forwarding IS250 Spring 2010
IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1: Solutions Time: 60 min (strictly enforced) Points: 50 YOUR.
Look-up problem IP address did we see the IP address before?
CS335 Networking & Network Administration Tuesday, May 11, 2010.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Payload Attribution via Hierarchical Bloom Filters
Introduction to IP Traceback 交通大學 電信系 李程輝 教授. 2 Outline  Introduction  Ingress Filtering  Packet Marking  Packet Digesting  Summary.
Hash-Based IP Traceback Alex C. Snoeren, Craig Partidge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer.
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Princeton University Joint work with Jennifer.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Chapter 4 Queuing, Datagrams, and Addressing
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
15-744: Computer Networking L-22 Security and DoS.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
By Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker Presented by Fei Jia Revisiting IP Multicast.
Traceback Pat Burke Yanos Saravanos. Agenda Introduction Problem Definition Traceback Methods  Packet Marking  Hash-based Conclusion References.
Router Architecture Overview
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
CS4550 Computer Networks II IP : internet protocol, part 2 : packet formats, routing, routing tables, ICMP read feit chapter 6.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Large-Scale IP Traceback in High-Speed Internet : Practical Techniques and Theoretical Foundation Jun (Jim) Xu Networking & Telecommunications Group College.
Traceback Pat Burke Yanos Saravanos. Agenda Introduction Problem Definition Benchmarks and Metrics Traceback Methods  Packet Marking  Hash-based Conclusion.
EECB 473 DATA NETWORK ARCHITECTURE AND ELECTRONICS PREPARED BY JEHANA ERMY JAMALUDDIN Basic Packet Processing: Algorithms and Data Structures.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Trajectory Sampling for Direct Traffic Oberservation N.G. Duffield and Matthias Grossglauser IEEE/ACM Transactions on Networking, Vol. 9, No. 3 June 2001.
Packet-Marking Scheme for DDoS Attack Prevention
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
Hash-Based IP Traceback Alex C. Snoeren †, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, W. Timothy Strayer.
By Rod Lykins.  Brief DDoS Introduction  Packet Marking Overview  Other DDoS Defense Mechanisms.
ZyXEL Confidential ICMPv6 Feng Zhou SW2 ZyXEL Communications Corp. 03/27/2006.
Covert Channels in IPv6 Norka B. Lucena, Grzegorz Lewandowski, and Steve J. Chapin Syracuse University PET 2005, Cavtat, Croatia May 31 st, 2005.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Hash-Based IP Traceback Alex C. Snoeren †, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, W. Timothy Strayer.
Introduction to IP Traceback 交通大學 電信系 李程輝 教授 2004/3/26.
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
Jessica Kornblum DSL Seminar Nov. 2, 2001 Hash-Based IP Traceback Alex C. Snoeren +, Craig Partridge, Luis A. Sanchez ++, Christine E. Jones, Fabrice Tchakountio,
IP Fragmentation. Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on rcving side,
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 18 INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Chapter 4 Data Link Layer Switching
Defending Against DDoS
Single-Packet IP Traceback
CS 457 – Lecture 10 Internetworking and IP
What’s “Inside” a Router?
Defending Against DDoS
Bridges and Extended LANs
Network Support For IP Traceback
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
Router Construction Outline Switched Fabrics IP Routers
Network Layer 2019/1/13.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
Ch 17 - Binding Protocol Addresses
Presentation transcript:

Hash-Based IP Traceback Alex C. Snoeren +, Craig Partridge, Luis A. Sanchez ++, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent and W. Timothy Strayer BBN Technologies + MIT Laboratories ++ Megisto Systems Published SIGCOMM 2001

Who is attacking? r IP Traceback m Trace the path of IP packet(s) to their source r Why is this difficult? m IP networks are stateless m Spoofed source addresses m Many administration layers

Approach: Log-Based Traceback V R R1R1 R2R2 R3R3 RR RR R4R4 AR RR7R7 R6R6 R5R5

Logging Challenges r Attack path reconstruction is difficult m Packet may be transformed as it moves through the network r Full packet storage is problematic m Memory requirements are prohibitive at high line speeds (OC-192 is ~10Mpkt/sec) r Extensive packet logs are a privacy risk m Traffic repositories may aid eavesdroppers

Source Path Isolation Engine Goals r Trace a single IP packet back to source m Asymmetric attacks (e.g. Fraggle, Teardrop, ping-of-death) r Minimal cost (resource usage) r Maintain privacy (prevent eavesdropping) r Robustness (min. false pos., no false neg.)

Assumptions r Network: m Packets can be addressed to 1+ hosts (multicast, broadcast) m Duplicate packets may exist in network m Router infrastructure is unstable r Attacker: m Aware of Traceback mechanisms m Routers may be subverted r Mechanism: m Packet size should not grow due to Traceback

Goals r Find attack graph for single packet r Minimal cost (resource usage) r Maintain privacy (prevent eavesdropping) r Robustness (min. false pos., no false neg.)

SPIE Architecture r DGA: Data Generation Agent m computes and stores digests of each packet on forwarding path. m Deploy 1 DGA per router r SCAR: SPIE Collection and Reduction agent m Long term storage for needed packet digests m Assembles attack graph for local topology r STM: SPIE Traceback Manager m Interfaces with IDS m Verifies integrity and authenticity of Traceback call m Sends requests to SCAR for local graphs m Assembles attack graph from SCAR input

STM SCAR Router DGA DGA/Router DGA Router SCAR Router DGA DGA/Router Router DGA IDS 1: IDS identifies attack packet 2: Sends Packet, Time, Last Hop 3: Authenticates and verifies IDS request 4: Provisions SCAR’s to collect local DGA digests 5: Collect digest tables, time intervals, hash functions 6: Identify routers with Packet’s digest and construct graph 7: Collect SCAR local graphs 8: Assemble local graphs, query for missing info 9: Send attack graph to IDS

Goals r Find attack graph for single packet r Minimal cost (resource usage) r Maintain privacy (prevent eavesdropping) r Robustness (min. false pos., no false neg.)

Data Generation Agents r Compute “packet digest” r Store in Bloom filter r Flush filter every time interval, t

Packet Digests r Compute hash(p) m Invariant fields of p only m 28 bytes hash input, % WAN collision rate m Fixed sized hash output, n-bits r Compute k independent digests m Increased robustness m Reduced collisions, reduced false positive rate

Hash input: Invariant Content Total Length Identification Checksum VerTOSHLen TTLProtocol Source Address Destination Address Fragment Offset MFMF DFDF Options Remainder of Payload First 8 bytes of Payload 28 bytes

Hashing Properties r Each hash function m Uniform distribution of input -> output H1(x) = H1(y) for some x,y -> unlikely r Use k independent hash functions m Collisions among k functions independent m H1(x) = H2(y) for some x,y -> unlikely r Cycle k functions every time interval, t

Digest Storage: Bloom Filters r Fixed structure size m Uses 2 n bit array m Initialized to zeros r Insertion m Use n-bit digest as indices into bit array m Set to ‘1’ r Membership m Compute k digests, d 1, d 2, etc… m If (filter[d i ]=1) for all i, router forwarded packet 1 n bits 2 n bits H(P) H 2 (P) H k (P) H 3 (P) H 1 (P)

16 Hash-Based IP Traceback 1 n bits 2 n bits H 2 (P) H k (P) H 3 (P) H 1 (P) Total Length Identification Checksum VerTOSHLen TTLProtocol Source Address Destination Address Fragment Offset MFMF DFDF Options Remainder of Payload First 8 bytes of Payload 28 bytes DGA SCAR Bloom Filter

SPIE Collection and Reduction Agent r Polls DGA’s for digest tables, hash functions, time intervals m Time critical operation r Constructs local attack graph m Reverse Path Flooding m For each router, Compute k * hashes of p with local hash functions Membership test ( table[h i (p)]==1 for all i) r Sends Result to STM

SPIE Traceback Manager r Interface to IDS System m Receives attack signature for p m Returns attack graph r Authenticates/Verifies (no details) r Provisions SCAR’s m Send(packet, last hop router, arrival time) r Assembles local graph r Fills holes in graph

Goals r Find attack graph for single packet r Minimal cost (resource usage) r Maintain privacy (prevent eavesdropping) r Robustness (min. false pos., no false neg.)

20 Memory utilization r A Bloom filter is described in terms of: m Number of digest/hash functions (k) m The ratio of data items to be stored (n) to memory capacity (m) r The effective false positive rate (P) for a Bloom filter that uses m-bits memory to store n packets with k digest functions is given by:

SPIE Performance r Local false positive rate (n, k,b) r Length of time digests are stored (t) m IDS->STM->SCAR->DGA r Accuracy of attack graphs m Derived from local false positive rates m Network topology Why?

Conclusion r Find attack graph for single packet m Log every packet at every router r Minimal cost (resource usage) m Store fixed-sized hash(p), not p m 0.05% link bandwidth per time m Distribute graph creation (attack sub-graphs) r Maintain privacy (prevent eavesdropping) m Authenticate Traceback (IDS-> STM call) m No header fields stored r Robustness (min. false pos., no false neg.)?

23 Packet Marking Vs. Packet Logging Packet MarkingPacket Logging Basic methodrouters write their IDs (IP address) in the forwarded packets (deterministic/probabilistic) packet information (digests or signatures) is written into router's buffer (det./prob.) Number of attack packets needed to infer an attack path a large number of attack packets (probabilistic); single attack packet (deterministic) Same as packet marking Overheadno buffer overhead at routers; but high packet overhead; router CPU overhead for marking high buffer overhead at routers; but no packet overhead; router CPU overhead for logging Collecting path information not a big issue, i.e., can be done using the attack packets coordination among routers required ExamplesProbabilistic Packet MarkingHash-based Traceback