Download presentation
Presentation is loading. Please wait.
1
DDoS Defense for a Community of Peers
Jem Berkes (Project PI) and Adam Wick (Transition Lead)
2
About DDoS
3
A DDoS Attack
4
Source data: Arbor Networks Worldwide Infrastructure Security Report, and recent media reports
5
When DDoS Becomes a Problem ...
Network Capacities (Gbps) Med. Organization ISP Internet Exchange Internet Backbone DDoS Attack Critical bottleneck The Internet has bottlenecks: internet exchanges, regional routing. The aggregate or world-wide capacity is NOT the issue! … 250 500 750 1000
6
Current Attacks Now Exceed Bottlenecks
Mirai / IoT botnets Enormous increase from 500 Gbps to 1,200+ Gbps Can’t stop this alone Tier 1 ISPs Cloud providers – not immune Aggregate, world-wide capacity is not the issue
7
Networks Must Collaborate
Effective defense requires collaboration between networks Must stop traffic closer to sources Automate response/coordination under attack stress We’re creating a tool to do this – 3DCoP
8
Handling DDoS with 3DCoP
9
Flow representation of traffic
IP IP IP SRCIP SPORT DSTIP DPORT PROTO COUNT … Big Packet bodies Compact summary NetFlow, IPFIX
10
Our approach Decentralized collaboration between networks
Share flow information (clues) from distributed sensors via P2P Use clues to compute Sources of attacks Spoofed traffic Optimal blocking
11
Decentralized P2P Network
Out-of-band P2P Can operate using cell phone tethering – during attack IPFS: Kademlia-based DHT swarm Every node has public key
12
What is shared? Subset of flow data, classified as Anomalies
Undesirable traffic (attacks) Assertions: present or not present Each node pushes data Decide what you want to share
13
Who is it shared with? Strict/private mode
Flow data only shared with owner of flow endpoint Enforced with public key cryptography Global announcements For very anomalous traffic, or attacks Groups/associations Each site always controls what they share, and with whom
14
Data Processing Traffic Router NetFlow SiLK Analysis Pipeline
3DCoP Engine
15
3DCoP Engine SiLK flow data P2P Network Site policy and configuration
16
3DCoP Engine I see anomalies SiLK flow data P2P Network
Site policy and configuration
17
You’re sending an attack
3DCoP Engine I see anomalies You’re sending an attack SiLK flow data P2P Network Site policy and configuration
18
Engine State tables Local anomalies, peer-reported anomalies, etc.
Rules-based algorithm State iterations with real-time updates Automatic traffic analysis leading to actions
19
Rules in the Engine if I see anomalous outbound flows
and others report anomalies from me then increase oddness score for flows foreach anomalous flow if oddness score > THRESHOLD and network utilization is high and many src_ip are sending to few dst_ip then promote anomaly to attack
20
More Rules… foreach peer-reported anomaly
if local anomaly matches port number then // might be related attack if port is a known amplifier service increase oddness score // we might all be part of // the same DDoS attack
21
Example
22
Demo scenario A 30 Mbps 700 Mbps Spoofing as C C B 30 Mbps 700 Mbps
23
Demo scenario A C B Spoofing as C Seeing attacks from A 30 Mbps
24
Seeing heavy traffic from C
Demo scenario Seeing heavy traffic from C A 30 Mbps 700 Mbps Spoofing as C C B 30 Mbps 700 Mbps
25
Seeing heavy traffic from C
Demo scenario Seeing heavy traffic from C We didn’t send that We didn’t send that traffic A 30 Mbps 700 Mbps Spoofing as C C B 30 Mbps 700 Mbps
26
Aha! That’s spoofed traffic
Demo scenario Aha! That’s spoofed traffic A 30 Mbps 700 Mbps Spoofing as C C B 30 Mbps 700 Mbps
27
Demo scenario Block inbound A Spoofing as C C B
28
Optimal mitigation Demo scenario A Spoofing as C C B
29
Demo scenario A Spoofing as C C B
30
State Iterations Network containing A (amplifier)
Network containing C (victim)
31
State Iterations Network containing A (amplifier) Inbound Anomalies
C --> A Outbound Anomalies A --> C Network containing C (victim) Inbound Attacks A --> C
32
State Iterations Network containing A (amplifier) Inbound Anomalies
C --> A Outbound Anomalies A --> C Network containing C (victim) Inbound Attacks A --> C
33
State Iterations Network containing A (amplifier) Inbound Anomalies
C --> A Outbound Attacks, Must Stop A --> C Network containing C (victim) Inbound Attacks A --> C
34
State Iterations Network containing A (amplifier) Inbound Anomalies
C --> A Outbound Attacks, Must Stop A --> C Network containing C (victim) Inbound Attacks A --> C Check flow repository…
35
State Iterations Network containing A (amplifier) Inbound Anomalies
C --> A Outbound Attacks, Must Stop A --> C Assertions that Peers Did Not Send Network containing C (victim) Inbound Attacks A --> C Someone is spoofing my IP C --> A
36
State Iterations Network containing A (amplifier)
Inbound Spoofed Attacks C --> A Outbound Attacks, Must Stop A --> C Assertions that Peers Did Not Send Network containing C (victim) Inbound Attacks A --> C Someone is spoofing my IP C --> A
37
We’ve learned a lot! Network containing A (amplifier)
Inbound Spoofed Attacks C --> A Outbound Attacks, Must Stop A --> C Assertions that Peers Did Not Send Network containing C (victim) Inbound Attacks A --> C Someone is spoofing my IP C --> A
38
Vital information learned through collaboration
We’ve learned a lot! Network containing A (amplifier) Inbound Spoofed Attacks C --> A Outbound Attacks, Must Stop A --> C Assertions that Peers Did Not Send Vital information learned through collaboration
39
What About Mischief and Lies?
We have considered this Peers make statements about their own traffic “I don’t want this traffic” Public key crypto ties ownership/responsibility
40
Status
41
Status Have an early prototype
We are seeking pilot and evaluation partners. Correctly computes results with a simple attack Identifies attack sources Identifies spoofed traffic Next steps Construct larger, more complex attack scenarios Develop the engine further Accuracy Better reasoning
42
Contact Us! Jem Berkes: Galois 3DCoP Team: We are actively seeking evaluation partners for 3DCoP. Please contact us if you’d be interested in trying 3DCoP out in your organization. All trademarks, service marks, trade names, trade dress, product names, and logos appearing in these slides are the property of their respective owners, including in some instances Galois, Inc. This project is the result of funding provided by the Science and Technology Directorate of the United States Department of Homeland Security under contract number D15PC The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Department of Homeland Security, or the U.S. Government.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.