Randomized Failover Intrusion Tolerant Systems (RFITS) Ranga Ramanujan Doug Long Architecture Technology Corporation Odyssey Research Associates DARPA.

Slides:



Advertisements
Similar presentations
Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
Advertisements

Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001Slide 1 Aegis Research Corporation Not for Public Release Survivability Validation Framework for Intrusion.
FIREWALLS Chapter 11.
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen et. al NDSS 2014 Presenter: Yue Li Part of slides adapted from R.
Randomized Failover Intrusion Tolerant Systems (RFITS) Ranga Ramanujan Noel Schmidt Architecture Technology Corporation Odyssey Research Associates DARPA.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Randomized Failover Intrusion- Tolerant Systems (RFITS) Ranga Ramanujan, Maher Kaddoura, John Wu, Clint Sanders, Doug Harper, David Baca Architecture Technology.
Firewalls and Intrusion Detection Systems
Zhang Fu, Marina Papatriantafilou, Philippas Tsigas Chalmers University of Technology, Sweden 1 ACM SAC 2010 ACM SAC 2011.
CS 268: Lecture 5 (Project Suggestions) Ion Stoica February 6, 2002.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
ChowSCOLD1 Secure Collective Defense Network (SCOLD) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
Chapter 1 Read (again) chapter 1.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Dissemination of Security Updates Jun Li Dissertation Proposal.
The Socket Handoff Defense to DoS Attacks Katia Sycara, PI Overview Key Benefits of Socket Handoff Discovery Features.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
IP Address Classes How large is the network part in an IP address? Today we use network masks to tell Originally, IP had address classes with fixed numbers.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1. SOS: Secure Overlay Service (+Mayday) A. D. Keromytis, V. Misra, D. Runbenstein Columbia University Presented by Yingfei Dong.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Chapter 4: Managing LAN Traffic
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Software-Defined Networks Jennifer Rexford Princeton University.
University of California, San Diego Computer Science and Engineering Concurrent Systems Architecture Group Agile Objects: Component-based Inherent Survivability.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Web Application Firewall (WAF) RSA ® Conference 2013.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
--Harish Reddy Vemula Distributed Denial of Service.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Randomized Failover Intrusion- Tolerant Systems (RFITS) Ranga Ramanujan, Maher Kaddoura, Carla Marceau, Clint Sanders, Doug Harper, David Baca Architecture.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
S E C U R E C O M P U T I N G Not For Public Release 1 Intrusion Tolerant Server Infrastructure Dick O’Brien OASIS PI Meeting July 25, 2001.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
An Introduction to Mobile IPv4
© 2002, Cisco Systems, Inc. All rights reserved..
1 Randomized Failover Intrusion Tolerant Systems (RFITS) Ranga Ramanujan Architecture Technology Corporation Odyssey Research Associates DARPA OASIS PI.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Lab A: Planning an Installation
Internet Indirection Infrastructure (i3)
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
CONTRA Camouflage of Network Traffic to Resist Attack (Intrusion Tolerance Using Masking, Redundancy and Dispersion) DARPA OASIS PI Meeting – Hilton Head.
Hubs Hubs are essentially physical-layer repeaters:
Firewalls Jiang Long Spring 2002.
Presentation transcript:

Randomized Failover Intrusion Tolerant Systems (RFITS) Ranga Ramanujan Doug Long Architecture Technology Corporation Odyssey Research Associates DARPA OASIS PI Meeting February 14, 2001

Project Background Research Objective –Develop and demonstrate design techniques for building survivable information systems Organic survivability mechanisms to resist DoS attacks Focus on real-time, high availability military systems RFITS Approach –Sustain system operation at an acceptable service level from the time a DoS attack starts to the time the attack is neutralized and the system is reconstituted –Tactics employed by RFITS survivability techniques include Dodging Elusiveness Obfuscation Information hiding Camouflage

Project Background (Cont’d) Project deliverables –RFITS Application Handbook Compilation of design patterns for building survivable systems. Each entry will include –Motivation –Applicability (Usage scenarios) –Attacks addressed –Design assumptions –Implementation issues –Prototype Software Two-pronged approach for deriving RFITS techniques –Analysis of candidate mission-critical systems –Bottom-up analysis of foundation services for high-availability systems

Accomplishments Completed analysis of two candidate systems –Location-Aware Wireless Network Services (LAWNS) –Satellite based information dissemination services Completed analysis of internal clock synchronization protocols Developed initial set of design patterns for survivable systems, including –Dynamic address reconfiguration –Randomized dispatcher –Callback –Survivable clock synchronization –Fail-stop processors

Dynamic Address Reconfiguration Applicability - Protects many-to-one and one- to-many client-server interactions against DDoS attacks Attacks addressed - spoofed packet floods * host resource depletion * network access link depletion Assumptions - Clients are “known” to server - Clients are trustworthy - Attack traffic generated by non-clients

Dynamic Address Reconfiguration (Cont’d) Service provided (Policy enforced) Choke off attack traffic as close as possible to the source Operation of mechanism - Destination S can only be reached indirectly via IP multicast address, say M1 - Router R configured to filter out all downstream traffic except multicast packets - Upon detecting a flooding attack, S switches to a new multicast address M2 and securely notifies clients; it also de-registers from M1 - Clients send packets to M2; spoofed traffic goes to M1and is filtered out at R5 and R6

Alternative Implementation Uses “eluding” tactic versus “dodging” Destination periodically switches to a new multicast address and notifies all clients via secure channels Incurs higher performance overhead but is provides better protection against sophisticated snoopers Stronger protection may require camouflaging techniques to counter traffic analysis

Some Implementation Issues Hiding source addresses of responses from S –Use “deflector” pattern Scaling to large number of clients –Recursively apply pattern Protection against snoopers close to client –Use “deflector” pattern Accommodating legacy TCP applications –Split connection using proxy pair Supporting multiple services behind single access link –Use reserved virtual pipes S III CCCCCC

Randomized Dispatcher Applicability - Enables survivable server groups that are resistant to host disabling attacks Attacks addressed - “single shot” host takedown, e.g., IP stack attack Assumptions - diversity of host implementations - legitimate clients are “known” - attacks do not originate at clients - server group availability services protected by “hardcore” techniques Servers are configured in a multicast group. Flows are continually switched between servers in the group (information hiding).

Composite Technique Service provided (Policy enforced) - Dynamic address reconfiguration and randomized dispatching in tandem deflect offending traffic from victim Operation of mechanism - Anomaly based detection of host attack triggers server group address reconfiguration - Address reconfiguration is propagated through “suspected” portions of the network - supports efficient localized recovery S I1I2I3 CCCCCC

Callback Applicability - Survivable dial-on-demand link set-up between IP subnets Attacks addressed - dial port flooding Operation - Upon detecting an attack, victim router calls back a “randomly” chosen detour router - Primary router tunnels all packets for victim through the detour router Assumptions - callback list on victim router is not known to attacker - security association exists between detour routers and primary router

Intrusion-Tolerant Clock Synchronization Fault-Tolerant external protocols offer partial protection. But can still be defeated by malicious attack on the communication infrastructure. Must protect individual nodes from malicious attack.

Two-Phase Clock Synchronization Protocol Multiple local clocks at each node. Network round synchronizes a representative clock from each node. Node round synchronizes local clocks. Limited responsiveness to adjustment protects node’s time value. Phase I Phase II

Benefits Strictly better than single-phase protocol: hardened node can temporarily resist complete attack. Compatible with network synchronization protocol: node’s participation or not in second phase is transparent to first phase. Innate responsiveness on the order of the node’s latency. Responsiveness can be adjusted upward to manage tradeoff with protection.

Intrusion-Tolerant Fail-Stop Processors Traditional Fail-Stop Processor magnifies attack Voting strategy does not guarantee fail-stop property Secret sharing techniques offer alternative approach P1P1 P2P2 P3P3 P4P4 C

Secret Sharing Share a secret among N trustees, such that –Any K trustees can reconstruct secret –No set of K-1 trustees can reconstruct secret Variants –Re-shareable secrets –Function sharing –Dynamic re-sharing

Fail-Stop Processor Split a function among N processors As long as K processors are available to compute the function, the processor is able to function If fewer than K processors are available, then shutdown Guarantees fail-stop property without attack magnification

Candidate Targets for Demonstrating RFITS Techniques Location-Aware Wireless Network Service (LAWNS) –geographically targeted unicast and multicast delivery of information to mobile users –range-restricted information dissemination –geographic routing services overlayed over IP routing –DoD applications include marine expeditionary forces, extended littoral battlefield, Future Combat System USCG Secure Information Dissemination System –enables information exchange between on-shore resources and mobile platforms (cutters and aircraft) over dial-up commercial satellite services –DoD applications include OTH intra battle group communication and submarine SATCOM services Agent-based logistics plan monitoring system Network services for split-base operations

Task Schedule