1 Carla Brodley, Sonia Fahmy, Cristina Nita-Rotaru, Catherine Rosenberg Current Students: Roman Chertov, Yu-Chun Mao, Kevin Robbins Undergraduate Student:

Slides:



Advertisements
Similar presentations
Performance Testing - Kanwalpreet Singh.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
The Challenges of Repeatable Experiment Archiving – Lessons from DETER Stephen Schwab SPARTA, Inc. d.b.a. Cobham Analytic Solutions May 25, 2010.
Design Deployment and Use of the DETER Testbed Terry Benzel, Robert Braden, Dongho Kim, Clifford Informatino Sciences Institute
FLAME: A Flow-level Anomaly Modeling Engine
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
15-441: Computer Networking Lecture 26: Networking Future.
1 Experiments and Tools for DDoS Attacks Roman Chertov, Sonia Fahmy, Rupak Sanjel, Ness Shroff Center for Education and Research in Information Assurance.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
Dynamics of Hot-Potato Routing in IP Networks Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
Low-Rate TCP Denial of Service Defense Johnny Tsao Petros Efstathopoulos Tutor: Guang Yang UCLA 2003.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Department Of Computer Engineering
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
1 Sonia Fahmy, Roman Chertov, Ness B. Shroff, and a group of M.S. students Center for Education and Research in Information Assurance and Security (CERIAS)
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Honeypot and Intrusion Detection System
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Web Application Firewall (WAF) RSA ® Conference 2013.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Current Practice for Network Analysis in CSTNet Chunjing Han CSTNET, CNIC
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1.4 Open source implement. Open source implement Open vs. Closed Software Architecture in Linux Systems Linux Kernel Clients and Daemon Servers Interface.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Distributed Denial of Service Attacks
EMIST DDoS Experimental Methodology Alefiya Hussain January 31, 2006.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Open-Eye Georgios Androulidakis National Technical University of Athens.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Network design Topic 6 Testing and documentation.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
FirewallPK Security tool for centralized Access Control List Management th RoEduNet International Conference - Networking in Education and Research.
1.4 Open source implement. Open source implement Open vs. Closed Software Architecture in Linux Systems Linux Kernel Clients and Daemon Servers Interface.
Managing Web Server Performance with AutoTune Agents by Y. Diao, J. L. Hellerstein, S. Parekh, J. P. Bigus Presented by Changha Lee.
DoS/DDoS attack and defense
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
Security System for KOREN/APII-Testbed
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Maintaining and Updating Windows Server 2008 Lesson 8.
Fermilab Scientific Computing Division Fermi National Accelerator Laboratory, Batavia, Illinois, USA. Off-the-Shelf Hardware and Software DAQ Performance.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Securing the Network Perimeter with ISA 2004
Pong: Diagnosing Spatio-Temporal Internet Congestion Properties
File Transfer Issues with TCP Acceleration with FileCatalyst
Presentation transcript:

1 Carla Brodley, Sonia Fahmy, Cristina Nita-Rotaru, Catherine Rosenberg Current Students: Roman Chertov, Yu-Chun Mao, Kevin Robbins Undergraduate Student: Christopher Kanich June 9 th, 2004 DDoS Experiments with Third Party Security Mechanisms

2 Year 1 Objectives  Understand the testing requirements of different types of detection and defense mechanisms:  We focus on network-based third party mechanisms  Design, integrate, and deploy a methodology for performing realistic and reproducible DDoS experiments:  Tools to configure traffic and attacks  Tools for automation of experiments, measurements, and effective visualization of results  Integration of multiple software components built by others  Gain insight into the phenomenology of attacks including their first-order and their second-order effects, and impact on detection mechanisms

3 Year 1 Accomplishments  Designed and implemented experimental tools (to be demoed):  Automated measurement tools, and routing/security mechanism log processing tools, and graph plotting tools  Automated configuration of interactive and replayed background traffic, routing, attacks, and measurements  Scriptable event system to control and synchronize events at multiple nodes  Installed and configured the following software:  Quagga/Zebra, WebStone, ManHunt, Sentivist  Performed experiments and obtained preliminary results  Generated requirements for DETER to easily support the testing of third party products

4 Why Third Party Products? 1. No Insider Information: we do not control or understand the internals of mechanisms, therefore we cannot customize tests. 2. Vendor Neutrality: we have no incentive to design experiments for either success/failure. 3. Requirements for DETER: third party tools were not designed for DETER; therefore, we can uncover setup and implementation challenges for DETER. 4. User Perspective: understanding the effectiveness of popular tools to defend against attacks will benefit many user communities.  Selected mechanisms: Symantec ManHunt v3.0 and Network Flight Recorder (NFR) Sentivist.

5 Why ManHunt and Sentivist?  Provide DDoS detection and response  Use coordinated distributed detection sensors  We only test the single sensor configuration now  Available in a software-only form that runs on RedHat Linux.  In contrast, many commercial solutions are available only as hardware boxes (e.g., Mazu Networks Enforcer), and some require Microsoft Windows XP, which makes remotely experimenting with them difficult on the current DETER testbed.  Obtained both ManHunt and Sentivist at no cost.  Mechanisms serve as proof-of-concept for:  Experimental methodology and tools.  Identifying DETER testbed requirements for testing third-party commercial mechanisms.

6 Symantec ManHunt Claims  ``Use protocol anomaly detection and traffic monitoring to detect DDoS attacks, including zero- day attacks.’’  ``Provide session termination, traceback capabilities using “FlowChaser,” QoS filters, and handoff responses across domains for DDoS protection.’’  ``Provide the ability to coordinate distributed detection sensors.’’  ``Detection at up to 2 gigabits per second traffic.’’  ``Identifies unknown attacks via analysis engine.’’ Currently, we only focus on ManHunt detection capabilities

7 Attacks Studied  Tools like Stracheldraht, TFN, Trinoo only should be sanitized first to ensure that they will not attempt to contact daemons outside the testbed  We experiment with a few recently published attacks:  Tunable randomization of Src and Dst [A. Hussain, J. Heidemann, and C. Papadopoulos. A framework for classifying denial of service attacks. SIGCOMM 2003]  UDP constant/square wave flooding [A. Kuzmanovic and E. W. Knightly. Low-rate targeted denial of service attacks. SIGCOMM 2003]  RST reflection (response to unsolicited ACKs)  ICMP echo request reflection  ICMP echo flooding  SYN flooding with variable rates

8 Experimental Goals 1. Identify challenges associated with testing third party products on DETER 2. Identify impact of different attack parameters on application-level and network-level metrics 3. Identify impact of the selection of traffic to train an anomaly detection mechanism on false alarms  How? Our experiments vary:  The mix of attacks  Attack parameters, e.g., on and off periods  Background traffic during the training and testing phases  Security mechanisms: ManHunt, and Sentivist Our current victim is an Apache web server and a subset of its clients

9 Experimental Setup  Topology: generated by GT-ITM [Calvert/Zegura, 1996] and adapted to DETER by observing:  Limit of 4 on router degree  Cannot employ power law (cd -  ), small world topologies  Delays and bandwidths consume nodes  Quagga/Zebra [ introduces BGP routers that generate dynamic routing traffic  WebStone [ creates interactive WWW traffic with 40 clients at 5 sites  File sizes: 500 B, 5 kB, 50 kB, 500 kB, 5 MB with decreasing request frequency  Replayed NZIX traffic from 2 hosts mapped to all hosts [

10 Topology

11 Square Wave Experiment  Varies: Square wave attack burst length l  Number/location of attacker(s), attack period T, and rate R were also varied, but results not reported here  Objectives:  Understand attack effectiveness  Identify attack effects on routing  Identify attack effects on application-level and network-level metrics at multiple nodes  Identify when a mechanism starts identifying attacks T-l ll Time Rate R

12 Impact on Throughput

13 Impact on Routing 2004/06/05 14:24:26 BGP: [Error] bgp_read_packet error: Connection reset by peer 2004/06/05 14:24:43 BGP: sending KEEPALIVE 2004/06/05 14:24:43 BGP: KEEPALIVE rcvd 2004/06/05 14:25:43 BGP: sending KEEPALIVE 2004/06/05 14:25:43 BGP: KEEPALIVE rcvd 2004/06/05 14:25:50 BGP: rcvd UPDATE w/ attr: nexthop /06/05 14:25:50 BGP: rcvd UPDATE about /24 -- withdrawn 2004/06/05 14:26:29 BGP: rcvd UPDATE w/ attr: nexthop /06/05 14:26:29 BGP: rcvd /24

14 Aggregate Packet Statistics

15 Agg. Application-level Metrics

16 Demo  RST reflection and tuned square wave attack (60 ms—200 ms)  Objectives:  Illustrate ease of experimental setup with our tool on DETER  Identify attack effects on application-level and network-level metrics at multiple nodes  Identify attack effects on ManHunt  Experiment timeline (in seconds):  0 quagga/zebra router setup  220 host setup  223/224 start WebStone and replay  274 RST reflection begins  474 RST reflection ends  524 square wave begins  674 square wave ends  900 end of demo

17 Lessons Learned  Insights into sensitivity to emulation environment  Some effects we observe may not be observed on actual routers and vice versa (architecture and buffer sizes)  Emulab and DETER results significantly differ for the same test scenario (CPU speed)  Limit on the degree of router nodes, delays, bandwidths  Difficulties in testing third party products  Products (hardware or software) connect to hubs, switches, or routers  Layer 2/layer 3 emulation and automatic discovery/allocation can simplify DETER use for testing third party mechanisms  Due to licenses, we need to control machine selection in DETER  Windows XP is required to test some products, e.g., Sentivist administration interface  Difficult to evaluate performance when mechanism is a black box  e.g., cannot mark attack traffic and must solely rely on knowledge of attack

18 Plans for Years 2 and 3  Formulate a testing methodology for DETER:  Design increasingly high fidelity experiments and better tools to be made available to the DETER/EMIST teams  Identify simulation/emulation artifacts  Understand the impact of scale, including topology, and statistical properties of traffic  Gain better insight into the phenomenology of attacks/defenses including their second-order effects, and how each is affected by experimental parameters  Develop a taxonomy of testable claims that security mechanisms make, and map each class of claims into realistic experiments and metrics to validate such claims

19 Summary  Identified challenges when testing third party mechanisms, providing feedback on requirements to DETER testbed design team  Understood the design of high fidelity experiments (e.g., topology, dynamic routing, interactive traffic)  Contributed to the collection of EMIST/DETER tools: experimental setup, attack mix, and measurement tools  Proved the power of the DETER testbed by presenting a subset of representative experiments