Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 The Good, The Bad and the Ugly: Network Performance in Malicious Environment Udi Ben-Porat ETH Zurich, Switzerland Anat Bremler-Barr IDC Herzliya, Israel.

Similar presentations


Presentation on theme: "1 The Good, The Bad and the Ugly: Network Performance in Malicious Environment Udi Ben-Porat ETH Zurich, Switzerland Anat Bremler-Barr IDC Herzliya, Israel."— Presentation transcript:

1 1 The Good, The Bad and the Ugly: Network Performance in Malicious Environment Udi Ben-Porat ETH Zurich, Switzerland Anat Bremler-Barr IDC Herzliya, Israel Hanoch Levy Tel-Aviv University, Israel First steps in Research CS – TAU – 1/2012 11/1/2012FirstStepsInResearch - H. Levy - CS TAU

2 2 T raditional Network Analysis / Design Expected Value Analysis  Average over a variety of cases  Traditional “performance people” Worst Case Analysis  Take the worst case scenario  Traditionally CS people BASIC ASSUMPTION:  USERS WANT THE BEST FOR THEM “The Good” “The Bad” 11/1/20122 FirstStepsInResearch - H. Levy - CS TAU

3 3 Today’s Networks Can we still assume: “ Users Want the Best for THEM”? Mostly yes… … BUT Not ALL! “The UGLY” MALICIOUS USERS: WANT TO HARM OTHERS’ PERFORMANCE 11/1/20123 FirstStepsInResearch - H. Levy - CS TAU

4 4 “Malicious” Network performance and Design “Expected” and “Worst” may not be enough Need to account for the malicious Need a “Malicious” performance methodology WE WANT to Combine “Performance” with “security” This talk:  How to evaluate effect on Performance  How to evaluate SYSTEM VULNERABILITY 11/1/20124 FirstStepsInResearch - H. Levy - CS TAU

5 5 Distributed Denial of Service ( DDoS ) Attacker adds more regular users Loading the server - degrades the performance Server Performance Server Attacker Normal DDoS S. DDoS 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

6 6 Sophisticated DDoS Normal DDoS S. DDoS Server Performance Server Attacker Attacker adds sophisticated malicious users Each user creates maximal damage (per attack budget) 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

7 7 Study Objective Propose a DDoS Vulnerability performance metric  Vulnerability Measure  To be used in addition to traditional system performance metrics Understand the vulnerability of various systems to attacks This Talk Examples Describe DDoS Vulnerability performance metric Demonstrate Metric impact  Hash Table: Very Common in networking  Performance (traditional) : OPEN equivalent CLOSED  Vulnerability analysis: OPEN << CLOSED!! 11/1/20127 FirstStepsInResearch - H. Levy - CS TAU

8 8 This Talk (cont) Demonstrate Vulnerability in a distributed environment  Attacking the CDF Scheduling by collaboration 11/1/20128 FirstStepsInResearch - H. Levy - CS TAU

9 9 Example 1: Data Structures (( Worst Case Exploit Denial of Service via Algorithmic Complexity Attacks, Scott A. Crosby and Dan S. Wallach, Usenix 2003 Attacker induces the worst-case behavior on real software. Average case: O(1) Worst case: O(n) 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

10 10 Example 1: Bro Performance under Hash Attack Bro intrusion detection system [Paxson ‘98]  High performance, open source IDS Hash used by the port scanning detector Attack: Carefully chosen source IPs and dest port numbers to achieve the worst case of the Hash Slides from the complexity attack paper presentation 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

11 11 Example 2: Attack on Admission Control Mechanism ( Traffic Pattern Exploit ) Reduction of Quality (RoQ) Attacks on Internet End- Systems, Mina Guirguis, Azer Bestavros, Ibrahim Matta and Yuting Zhang, INFOCOM 2005 Reduction of Quality attack - targets the adaptation mechanisms  prevent convergrnce to steady-state. 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

12 12 Example 2: cont’ A simple admission control sets its admission rate as a function of the utilization of its back-end system. Web-Server Admission Controller Admission Rejections Feedback Client 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

13 13 Example 2: cont’ Attacker sends a surge demand, from time to time, for a very short period and pushes the system into overload. Result: False rejection of traffic. Web-Server Admission Controller Rejections Overload Attacker Zombies Client 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

14 14 Example 3: Attack on TCP Retransmission ( Traffic Pattern Exploit ) Shrews: Low-Rate TCP-Targeted Denial of Service Attacks, A. Kuzmanovic and E.W.Knightly, Sigcomm 2003 Attacks exploit the timeout mechanism of TCP resulting in a complete denial of service. Shrew 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

15 15 Multiple Access Protocols ( Protocol Deviation Exploit ) Ethernet like protocol  Shared channel, a set of nodes send and receive frames over the same channel, only one node can transmit at a time  Each node runs a collision avoiding algorithm.  Attackers disobey collision avoidance  disturb the transmission over the channel 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

16 16 Our goal Proposing a Vulnerability measurement for all sophisticated DDoS attacks  Vulnerability Measurement  How easy it is to degrade your users performance Understanding the vulnerability of different systems to sophisticated attacks 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

17 17 Vulnerability Factor Definition Vulnerability= v means: A malicious user degrades the server performance v -times more than a regular user Performance Degradation Scales (st = Malicious Strategy) 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

18 18 Vulnerability Interpretation Vulnerability= v means: How many “innocent” users (operations) are denied service per one malicious user (operation) Performance Degradation Scales (st = Malicious Strategy) 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

19 19 Vulnerability Factor Definition Performance After adding (budget =c) After adding (budget=c) Normal DDoS S. DDoS 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

20 20 Demonstration of Vulnerability metric: Attack on Hash Tables Central component in networks Hash table is a data structure based on Hash function and an array of buckets. Operations: Insert, Search and Delete of elements according to their keys. key Insert (element) Buckets Hash(key) User Server 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

21 21 Hash Tables Bucket = one element Collision-> the array is repeatedly probed until an empty bucket is found Bucket = list of elements that were hashed to that bucket Open Hash Closed Hash 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

22 22 Performance Factors In Attack  While attack is on: Attacker’s operations are CPU intensive  CPU loaded Post Attack:  Loaded Table  insert/delete/search op’s suffer Vulnerability: OPEN vs. CLOSED Traditional Performance: OPEN = CLOSED* What about Vulnerability? OPEN = CLOSED ? ( * when the buckets array of closed hash is twice bigger) 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

23 23 Attacker strategy (InsStrategy) Strategy:  Insert k elements (cost=budget=k) where all elements hash into the same bucket ( )  Theorem: InsStrategy is Optimal For both performance factors Closed Hash: Cluster Open Hash: One long list of elements Attack Results 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

24 24 In Attack: Resource Consumption V = Analytic results: Open Hash: Closed Hash: In every malicious insertion, the server has to traverse all previous inserted elements (+ some existing elements) Open Hash Closed Hash V = 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

25 25 Post Attack: Operation Complexity Open Hash Closed Hash Open Hash: Vulnerability =1 No Post Attack degradation in Open Hash Closed Hash: 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

26 26 Why Open So Good, Closed So Bad Open Hash Access cost = approximately mean of chain E[C] Closed Hash Access cost = approximately residual life of chain E[C^2]/2E[C] Like in M/G/1 ! 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

27 27 Post Attack: account for queuing Requests for the server are queued up Vulnerability of the (post attack) Waiting Time? Hash Table Server 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

28 28 Queue Analysis (M/G/1) Waiting time is proportional to E[S^2] / E[s] S = service time (Random variable) Hash Table Server 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

29 29 Post Attack Waiting Time Open Hash: Stability Point Service times proportional to chain length E[S] = 1 E[S^2] > 1 Now is VULNERABLE !! OPEN 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

30 30 Post Attack Waiting Time Drastically more vulnerable No longer stable for Load>48% Stability Point Closed Hash: Closed Hash Service times proportional to chain 2 nd moment: E[S] ~ E[C^2] E[S^2] ~E[C^3] 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

31 31 Conclusions HASH:  Normal performance: Closed hash = Open Hash  Under attack Closed hash >> Open Hash Malicious Performance:  Need Performance evaluation to account for attacks  Can use the vulnerability metric 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU

32 32 Questions? 11/1/2012 FirstStepsInResearch - H. Levy - CS TAU


Download ppt "1 The Good, The Bad and the Ugly: Network Performance in Malicious Environment Udi Ben-Porat ETH Zurich, Switzerland Anat Bremler-Barr IDC Herzliya, Israel."

Similar presentations


Ads by Google