Download presentation
Presentation is loading. Please wait.
Published byJulianna Cowles Modified over 9 years ago
1
dFence: Transparent Network- based Denial of Service Mitigation Ajay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick Vin, Yin Zhang University of Texas at Austin mahimkar@cs.utexas.edu
2
The Problem Denial of Service (DoS) attacks –A significant threat to Internet reliability & availability –Many forms – SYN flood, Data flood, NAPTHA, HTTP request flood, Botnet Lots of research and commercial products –Speak-up, SIFF, Kill-botz, TVA, Pushback, Cisco Guard, Arbor, … Yet, lots of attacks still out there –Feb 6. 2007 DDoS attack on 6 of 13 root DNS servers –Domain registrar GoDaddy.com was DDoSed (March 2007)
3
dFence Principles Transparency –No software modifications to end-hosts or routers In-Network defense –Filter attack traffic before it gets close to server Shared on-demand infrastructure –Multiplex defense resources to protect multiple customers –No performance penalty during peace time Stateful mitigation –Necessary for effective defenses against a broad range of DoS attacks
4
dFence Overview Customer Network under protection Internet Service Provider Other Customer Networks Attack Detected Distributed Set of Middleboxes Only Good traffic Apply stateful filtering
5
Challenges Bidirectional Traffic Interception Attack Mitigation Functionality Dynamic State Management Robustness to route changes, failures and DoS attacks on middleboxes
6
Outline Bidirectional Traffic Interception Attack Mitigation FunctionalityAttack Mitigation Functionality Dynamic State ManagementDynamic State Management
7
Inbound Traffic Interception
8
Internet Service Provider Other Customer Networks 12.0.0.0/24 10.0.0.0/24 Customer Network (D) under protection iBGP advertisements to attract only traffic going to the customer network under protection PBR rule 10.0.0.0/24 D (on internal) 12.0.0.0/24 R 1 10.0.0.0/24 R 2 12.0.0.0/24 R 1 10.0.0.0/24 M R1R1 R2R2 M Routing table Inbound Traffic Interception
9
Outbound Traffic Interception
10
Customer Network (D) under protection Other Customer Networks 10.0.0.0/24 12.0.0.0/24 R1R1 R2R2 M PBR rule Src = 10.0.0.0/24 M (on external) Internet Service Provider Outbound Traffic Interception
11
Outline Bidirectional Traffic InterceptionBidirectional Traffic Interception Attack Mitigation Functionality Dynamic State ManagementDynamic State Management
12
Attack Mitigation at Middlebox Stateful policies are a good match for TCP-based attacks Careful creation of minimal state for connections Attack Classification Attack ExamplesState Requirement SpoofedSpoofed SYN Spoofed TCP data Reflector attacks Zero Un-spoofed mis-behaving NAPTHA Un-spoofed data flood Temporary Un-spoofed well-behaving Normal trafficLife-time of connection
13
An Example Policy Mitigating Spoofed Attacks –SYN flood: exhaust server resources by flooding it with bogus SYN requests –Network-based SYN cookie generation –Advantages over server-side Transparency Multiplexing
14
SYN Cookie [D. Bernstein] Client Server SYN C ACK S (Cookie+1) SYN S, ACK C (Seq# = Cookie) No state maintained Establish connection if cookie is correct Cookie is an unforgeable token
15
Network-based SYN Cookie Challenges –How to handle mismatch in sequence number generated by middlebox and server –How does middlebox handle data received from clients before its handshake with server is complete
16
What does not work Full TCP splicing with address / port / sequence / acknowledgement number translations –Increases state requirement at middlebox –Adds more processing burden Buffer data packets till handshake with server is complete –Opens door to another DoS attack Drop data packets till handshake with server is complete –Client enters TCP time-out and suffers 3 second delay
17
Client Server Middlebox SYN C SYN S, ACK C (Seq# = Cookie) Window = 0 ACK S (Cookie+1) SYN C SYN S, ACK C (Seq# = Value S ) SYN S, ACK C (Seq# = Cookie) Re-open window ACK S (Cookie+1) ACK S (Value S +1) Choke client Sequence # translation Acknowledgement # translation Un-choke client No State Maintained Verify cookie & establish state
18
Outline Bidirectional Traffic InterceptionBidirectional Traffic Interception Attack Mitigation FunctionalityAttack Mitigation Functionality Dynamic State Management
19
Middlebox introduction –How to capture state for ongoing connections ? –Naïve solution: terminate all ongoing connections and let clients start anew (not transparent!!) –Our solution Add grace period to transparently bootstrap state for ongoing connection –During bootstrap SYN cookies for new connection request Data packets (good or bad) are forwarded to the server State established for data packets for which ACK is seen
20
Dynamic State Management Middlebox removal –What about active connections established via middlebox ? –Naïve solution: terminate all and remove middlebox from the data path (not transparent!!) –Our solution Add grace period during which the connections established via middlebox undergo sequence and acknowledgement numbers translation New connection requests are forwarded to the server (no SYN cookies) No state established for new connections during the removal phase
21
Experimental Setup IXIA Packet Generator IXP End-hosts Cisco Switch XORP for Traffic Interception Intel IXP Network Processor for attack mitigation policies IXIA for attack workload, iperf/httperf for legitimate traffic
22
End-to-end Throughput Middlebox bootstrapped Attack started Throughput drops Middlebox removed Attack stopped Middlebox introduced Removal Phase Attack Mitigation PhaseBootstrap Phase: Spoofed SYN dropped, spoofed data forwarded
23
Conclusion dFence DoS mitigation system –Transparent solution –In-network defense –Shared on-demand infrastructure –Stateful mitigation Can be viewed as providing group insurance service General platform to deploy other network security services such as malware filtering
24
Thank You !
25
Backup Slides
26
Flow Pinning Why Pinning ? –Ensure both directions of flow go through the same middlebox –Ensure that the same middlebox handles the flow even when there are route changes / failures Pin the flow to a home middlebox –Home middlebox = hash 1 (src IP, src port) EXOR hash 2 (dest IP, dest port) –Symmetric
27
Bootstrap Interval T b Too high Severe damage during bootstrap phase Too low Ongoing connections may get terminated Trace analysis shows that majority of connections has packet IATs of the order a few seconds
28
XORP BGP Policy policy-statement next-hop-selection { term 1 { to { network4: 10.0.0.0/24 } then { localpref: 300 } } … protocols { bgp { … import “next-hop-selection” export “next-hop-selection” }
29
Middlebox Attacks & Defenses Exhausting the connection state –Defense: Limit number of connections from any single host Middlebox only maintains state for un-spoofed well-behaved sources Adaptive traffic variation attack –ON/OFF attack pattern –Defense: Avoid rapid introduction & removal of middleboxes Randomize the removal phase time interval Werewolf attack –Behave legitimate at first, get established in middlebox state and then bombard with attack traffic –Defense: Periodic measurement of traffic sending rates & source prefix white-listing
30
End-to-end latency
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.