IP Spoofing. What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)

Slides:



Advertisements
Similar presentations
Network support for DoS Protection Stefan Savage Dept of Computer Science and Engineering UC San Diego.
Advertisements

06-Sep-2006Copyright (C) 2006 Internet Initiative Japan Inc.1 Prevent DoS using IP source address spoofing MATSUZAKI ‘maz’ Yoshinobu.
Loose Source Routing as a Mechanism for Traffic Policies Katerina Argyraki and David R. Cheriton Presented by Thuan Huynh, Robert Patro, and Shomir Wilson.
IUT– Network Security Course 1 Network Security Firewalls.
A Survey of Secure Wireless Ad Hoc Routing
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Firewall Configuration Strategies
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Accurate Real-Time Identification of IP Prefix Hijacking Z. Morley Mao Xin Hu 2007 IEEE Symposium on and Privacy Oakland, California 2007 IEEE Symposium.
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
1 Hop-Count Filtering: An Effective Defense Against Spoofed DDos Traffic Cheng Jin CS Department Caltech Pasadena Haining Wang CS Department College of.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Routing of Outgoing Packets with MP-TCP draft-handley-mptcp-routing-00 Mark Handley Costin Raiciu Marcelo Bagnulo.
PALMTREE M. Engin TozalKamil Sarac The University of Texas at Dallas.
Computer Networks Layering and Routing Dina Katabi
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
– Chapter 4 – Secure Routing
A LIGHT-WEIGHT DISTRIBUTED SCHEME FOR DETECTING IP PREFIX HIJACKS IN REAL TIME Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang and Paul Francis. Cornell University,
Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.
Seminar Presentation IP Spoofing Attack, detection and effective method of prevention. Md. Sajan Sana Ansari Id: /8/20151.
Clouseau: A practical IP spoofing defense through route-based filtering Jelena Mirkovic, University of Delaware Nikola Jevtic,
IIT Indore © Neminath Hubballi
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Routing and Routing Protocols Routing Protocols Overview.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Simple Multihoming Experiment draft-huitema-multi6-experiment-00.txt Christian Huitema, Microsoft David Kessens, Nokia.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
Lecture 17 Page 1 CS 236, Spring 2008 Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to a Single Service.
Spoofing Prevention Method Srikanth T.S.S. Sri Lakshmi Ramya S.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
K. Salah1 Security Protocols in the Internet IPSec.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Encryption and Network Security
Chapter 18 IP Security  IP Security (IPSec)
Ingress Filtering, Site Multihoming, and Source Address Selection
Routing and Routing Protocols: Routing Static
Defending Against DDoS
Filtering Spoofed Packets
CCNA 2 v3.1 Module 6 Routing and Routing Protocols
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
Routing and Routing Protocols: Routing Static
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
Chapter 8 Network Perimeter Security
IIT Indore © Neminath Hubballi
DDoS Attack and Its Defense
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Networking and Network Protocols (Part2)
IP Forwarding Relates to Lab 3.
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

IP Spoofing

What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)

Why Attackers Spoof? Hide their identity – Put a blame on someone else Confuse the defense – In DDoS, make traffic appear to come from many sources Acquire identity of a legitimate host – Leverage some trust relationship (e.g., bypass a firewall) – Hijack a TCP connection – Perform DNS hijacking

Ingress Filtering RFC 2827, BCP 38 – Collect a list of your prefixes P – Filter out outgoing traffic whose source IP is not from P – Filter out incoming traffic whose source IP is from P Sounds simple? – It took routers long time to put this kind of filtering on the fast path – Implementation may be tricky (multihoming) – It helps others, not you – It does not completely eliminate spoofing

Implementing Ingress Filtering ACL: Manually collect a list of your prefixes – Works for edge networks but not for ISPs there are way fewer ISPs (~ 6 K) than edge networks (~ 33 K) so implementing something at ISPs is faster – If a network is multihomed and does not update its new ISP with its prefixes it may lose traffic Strict reverse path forwarding – If my next hop to P is A then only A can send me traffic from P (however lots of routes are asymmetrical between ISPs)

Implementing Ingress Filtering Feasible reverse path forwarding – Remember all advertised next hops for P, one of them is a valid previous hop – Works correctly but lets some spoofed packets through Loose reverse path forwarding – Only drop packets if their source IP is not routable – Only 1/3 of the IPv4 space is routable so randomly spoofed packets would be dropped 2/3 of the time

Ingress Filtering w Multihoming Multihoming: having 2 or more upstream ISPs – For backup (but use only some) – For good performance (use the fastest one at the moment) or load balancing (use them equally) – Changing providers (temporary multihoming) A network may announce its prefixes only to one ISP (for incoming traffic) but use both for outgoing traffic or vice versa – This will lead to ingress filter drops at the ISP which is used only for outgoing traffic (ACL, strict RPF)

Ways Around Ingress Filtering? Announce P to both ISPs but send traffic only to ISP1 ISP1 ISP2 M2 and M3 can spoof S M1 can spoof S (subnet spoofing)

How Many Networks Can Spoof Spoofer project measures this – – Download an application, which will try to send spoofed traffic to a few hosts at CAIDA – A small percentage of hosts/nets/ASes (~10%)

Good Coverage

Who Can Spoof?

How Many Networks Can Spoof From

Spoofing Increases Over Time From

Filtering At Large Granularity From

Filtering Near Sources From

Small Networks More Spoofable From

Commercial Networks More Spoofable From

Other Spoofing Defenses Cryptographically sign your packets so that everyone can check they come from you – Crypto overhead – Must share keys with checkers – Needs wide coverage Build tables at ISPs, which tie some feature from the packet with the source prefix – Previous hop – Hop count – Packet mark

SPM, Passport Source puts some cryptographically secure information in each packet’s header – Routers and/or destination check it – No one else can spoof it – Requires key exchange between parties Mark could be unique to source only, or to source-destination pair or to source- destination-route tuple A. Bremler-Barr, H. Levy Spoofing Prevention Method In INFOCOM 2005

Route-based Filtering (RBF) Remember the previous hop that forwards traffic to you – The paper does not specify how to learn this information K. Park and H.Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets. In Proc. of ACM SIGCOMM, 2001.

Inter-domain Packet Filtering (IDPF) Remember all the possible previous hops that advertised a prefix to you – Any of them is feasible previous hop for that prefix – Feasible reverse path forwarding Z. Duan, X. Yuan, and J. Chandrashekar Controlling IP Spoofing through Inter-Domain Packet Filters, In IEEE Transactions on Dependable and Secure Computing, 2008

Stack PI (PiIP) Routers mark packets with unique identifier – At the destination this mark can be used to identify path traversed by traffic and for filtering – At the ISP this mark can be associated with source prefix and used to filter spoofed traffic A. Yaar, A. Perrig, D. Song StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense In IEEEE Journal on Selected Areas in Communications, 2006

Hop-count Filtering (HCF) Routers infer from packets the hop count between source and destination – Only a few choices for TTL start – Associate this hop count with source IP – Use it to detect/filter spoofed packets C. Yin, H. Wang, K. Shin Hop-count Filtering: An Effective Defense Against Spoofed DDoS Traffic, In ACM CCS 2003

Filter Table

Which Technique is Best? On the same topology Under sparse deployment Where should we deploy filters? J. Mirkovic, E. Kissel Comparative Evaluation of Spoofing Defenses In IEEE Transactions on Dependable and Secure Computing 2011

Can a filter F filter packet P P(s,d,p) – packet from source s to destination d spoofing address p Will it be filtered by F? – Filter F (s,d,p) = hit F (s,d)*diff F (s,p) Depends on whether F is on major paths Depends on the spoofing detection technique (incoming table diversity)

How To Choose Filters? Calculate how many (s,d,p) combinations can each filter out Choose so to maximize number of newly added combinations This is almost the same as if choosing by connectivity or AS size

How To Choose Filters? Calculate how many (s,d,p) combinations can each filter out Choose so to maximize number of newly added combinations This is almost the same as if choosing by connectivity or AS size

Performance Measures How many victims are protected from spoofing? TP How many victims are protected from reflector attacks? RAP How many sources cannot spoof? AI All measures between 0 and 1, with 1 being the best

Ingress Filtering

HCF

RBF, PiIP is similar

IDPF

SPM, Passport

Summary Route-based techniques work the best. The rest just don’t work in sparse deployment. Should be deployed at major ISPs. Open question “How to infer filter tables when routes change?”