A DoS-limiting Network Architecture CSCE 715: Fall’06 Presentation by: Amit Jain Shantnu Chaturvedi.

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

Loose Source Routing as a Mechanism for Traffic Policies Katerina Argyraki and David R. Cheriton Presented by Thuan Huynh, Robert Patro, and Shomir Wilson.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
2005 Stanford Computer Systems Lab Flow Cookies Bandwidth Amplification as Flooding Defense Martin Casado, Pei Cao Niels Provos.
A DoS-Limiting Network Architecture Presented by Karl Deng Sagar Vemuri.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168) Limited Transmit (RFC 3042)
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Computer Networks Transport Layer. Topics F Introduction  F Connection Issues F TCP.
This is not an impossible architecture – Incremental Deployment Compatible Unlike any previous papers, this paper addresses a lot of issues connected.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
A DoS Limiting Network Architecture An Overview by - Amit Mondal.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Gursharan Singh Tatla Transport Layer 16-May
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Presenter: Chen Chih-Ming 96/12/27. Outline  Background  Problem Definition  State of Art  Portcullis Architecture  Designs  Potential Attacks 
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
Computer Networks with Internet Technology William Stallings
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks Paper by: Bryan Parno et al. (CMU) Presented by: Ionut Trestian Gergely Biczók.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani.
Packet-Marking Scheme for DDoS Attack Prevention
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
Deadline-based Resource Management for Information- Centric Networks Somaya Arianfar, Pasi Sarolahti, Jörg Ott Aalto University, Department of Communications.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
DoS/DDoS attack and defense
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Spoofing Prevention Method Srikanth T.S.S. Sri Lakshmi Ramya S.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
First generation firewalls packets filtering ريماز ابراهيم محمد علي دعاء عادل محمد عسجد سامي عبدالكريم.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Chapter 11 User Datagram Protocol
Instructor Materials Chapter 6: Quality of Service
Internet Networking recitation #9
A DoS-limiting Network Architecture
Transport Layer Unit 5.
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
Net 323 D: Networks Protocols
Congestion Control Reasons:
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

A DoS-limiting Network Architecture CSCE 715: Fall’06 Presentation by: Amit Jain Shantnu Chaturvedi

DoS (Denial of Service) Attacks

 Goal: To prevent legitimate users from using some service Usually accomplished by exhausting some resources (ie, bandwidth, CPU, memory) Intrinsic problem of Internet: any hosts can send packets to any other hosts without first acquiring permission  Effects 2001 study shows 4000 attacks a week Can bring down DNS root servers Lost of business estimation are in the billions Online extortion

Possible Defenses  Ingress Filtering - Source address filtering To prevent spoofing IP address Need widespread deployment Ineffective with more sophisticated attack, ie DDoS  Traceback Locate the source of the disrupting packets Does not prevent DoS since an attacker can still use a short TTL  Pushback Signal upstream nodes to rate limit misbehaving nodes How do you distinguish good from bad traffic?

Possible Defenses SIFF (Stateless Internet Flow Filter) Privileges & Unprivileged packet Routers Mark every packet Backward compatibility Marking space in the IP header. Routers mark every packet.

SIFF Packet Identifier Design  Flags field (3-bits). SF: Packet is non-legacy CU: Capability reply present or not  Capability: Marks modified by routers  Capability-Reply: recipients to signal to sender a capability

 Capabilities Senders obtain authorization from the receiver before sending the traffic  Anomaly detection Automated classification of “bad” flows Traffic flow and type information used Possible Defenses

Problems with current approaches  Each solution addresses an aspect of problem and not the overall issue.  Do not provide a complete solution, either Lack scalability Require substantial change in hardware

Goal  Provide a “comprehensive” solution to DoS  Receiver should also be able to control traffic directed towards it  Two legitimate nodes should be able to effectively communicate even during attacks  Bounded computation and memory  Incrementally deployable  Focus on lower-layer attacks (bandwidth, router memory)

TVA  Traffic Validation Architecture  Packet Capabilities  Cut to the heart of DoS problems  Destination control received packets  Counters a broader set of attacks  Automated validation of senders

Practical use of TVA  Can operate at Gigabit speed on inexpensive hardware  Incremental deployment.  Backward Compatibility.  Mix of spectrum of solutions.  Fine-Grained access control.

Traffic Validation Architecture 1.Packets with Capabilities. 2.Bootstrapping Issues. 3.Destination Policies. 4.Unforgeable Capabilities. 5.Fine-Grained Capabilities. 6.Bounded Router State. 7.Efficient Capabilities. 8.Balancing Authorized Traffic. 9.Short, Slow and Asymmetric Flows.

1.Packets with Capabilities  Capability information present in each packets used by routers to provide preferential service.  Capabilities: Granted by destination. Unforgeable. Routers can trust packet capabilities without host authentication. Must be byte & time limited for destination cutoff. Add little overhead in computation and bandwidth.

2.Bootstrapping Issues  To avoid the attacks on request messages itself  Tags each request with a 16 bit value derived from the incoming hardware interface  Tags are used to queue the requests.  Connection request packets do not contain capabilities and are rate limited (5%) at all network locations.  Fair queuing of requests combined with path identifiers helps counter attacks from legitimate users.

3.Destination Policies  Client has only outgoing request. It accepts requests only if it relates to the previous request made by it.  Server grants the requests with initial number of bytes (N) and timeout (T).  Weak authentication of source address, so misbehaving senders are quickly contained by server.  Destination determines how to authorize request depending on role of destination in the network.

4.Unforgeable Capabilities  Should not be forgeable or usable if stolen.  Each Router generates own pre-capability and attaches it to the forwarded packet.  Each router changes it’s secret at twice the rate of timestamp rollover.  The destination receives a set of pre-capabilities that correspond to a specific network path with fixed source and destination addresses.  Once authorized, the destination sends a list of capabilities to the sender.

5.Fine Grained Capabilities  Routers perform the pre-capability hash check and capability hash check  Check if their local time > original time stamp + T  Check if N bytes have already been used for this connection  To tackle this problem, limit the data flow rate (N) as well as the period of validity (T) by returning these values to the sender.  Router State is used to count the bytes sent so far.

6.Bounded Router State  The router state could be exhausted as it would be counting the number of bytes sent  Router state is only maintained for flows that send faster than N/T  When new packets arrive, a new state is created and a byte counter is initialized along with a time-to-live field that is decremented.

6.Bounded Router State  Consider the router creates a capability valid for t + T, then it allows data till the ttl field is decremented to zero, after which the router state is reclaimed

7.Efficient Capabilities  Capabilities should be efficient (Less overhead) as well as secure (long key length).  Long capabilities (64-bits) are used for security and then cached at routers for efficiency.  When a router receives a packet with a valid capability, it caches the capability relevant information and the flow nonce.  Subsequent packets then carry the flow nonce only and omit the list of capabilities.  Routers check the packets without capabilities using source & destination IP address and compare the cached nonce with the packet nonce.  Legacy packets are demoted by changing a bit in the capability header

8.Balancing Authorized Traffic  Authorized flows between attacker and colluder may be malicious.  Simply give each capability a reasonable share of the network bandwidth.  Users get decreasing share of network bandwidth as the network becomes busier.  A fair queuing policy is used where the queues are limited by a bounded policy. Queue only the flows that send faster then N/T.  The low rate flows are limited by FIFO service with drops depending on timing of arrivals.

9.Short, Slow and Asymmetric Flows  TVA experiences reduced efficiency only when the flows near the host are short; this can be countered by increasing the bandwidth  Effects on aggregate efficiency are small given that most bytes belong to long flows.  No overheads in exchanging handshakes.  All TCP connections between a pair of hosts are using a single capability. So, short flows are less likely.

The TVA protocol – Design Elements  Three Elements in protocol: Packets with capability information. Hosts as senders & destinations. Routers processing capability.

The TVA protocol Packets with capability information: IP packet header extended with capability header. Request packets:- Carry blank list of capabilities. Contain path identifiers filled by routers. Share an identifying pre-capability header. Regular packets:- Packets that carry flow nonce and list of valid capabilities. Packets that carry only the nonce. Renewal packets: A regular packet, used to establish new capabilities. Demoted packets: A packet that does not pass the capability test, treated as legacy packet

The TVA protocol Packets with capability information: Type field bits used to identify the type and format Type and capability. Return information. Demoted packet.

The TVA protocol Packets with capability information:

The TVA protocol Hosts as senders & destinations:  Sender sends request as part of TCP SYN.  If destination chooses to authorize, it sends response with TCP SYN/ACK.  To refuse transfer, destination sends empty capability list with TCP RST.

The TVA protocol Routers processing capability:  Processing of packets by capability information.  Sharing capacity of outgoing link between three classes of traffic: Request packets. Regular packets. Legacy traffic.

The TVA protocol Routers processing capability:  Request packets – processed after router adds path identifier and pre-capabilities.  Regular packets – forwarded after checking authorization information, updating cached information (Nonce and capability).  The packet is demoted to be a legacy packet if neither its capability nor it’s nonce is valid.

Simulation Results  Use of ns (network simulator) to simulate TVA, SIFF, pushback and legacy internet.  TVA is changed to rate limit the capability requests to 1% of link capacity.  Fixed length transfers between destination and legitimate users and destination under various attacks. Measure average fraction of completed transfers. Measure average time of transfers that complete.  Change in attack intensity – Vary number of attackers.  Timeouts of TCP SYN’s is fixed at 1 sec with up to 8 transmissions being performed.  TCP aborts connection if retransmission timeout > 64 sec for regular packet or packet transmitted > 10 times.

Simulation Results  Based on Dumb bell topology.

Simulation Results - Legacy packet floods  TVA: Legacy packets have lower priority than request traffic. So, average completion time remains small with attack intensity.  SIFF: Equal priority to legacy and request packets. When intensity of traffic exceeds the bottleneck bandwidth, it suffers losses.  Pushback: Performs well until large number of attackers distribute traffic on all links and attacks are harder to identify.  Legacy internet: Here the legitimate and attack traffic are treated alike and the probability of completed transfers approaches 0 as the number of attackers increase.

Simulation Results - Legacy packet floods

Simulation Results - Request packet floods  TVA: Request packets are rate limited and don’t reduce capacity for authorized packets. Packets separately queued.  SIFF: Both request and authorized packets are low priority. Results same as for legacy packets.  Pushback: Results same as for legacy packets.  Legacy internet: Results same as for legacy packets.

Simulation Results - Request packet floods

Simulation Results - Authorized packet floods  TVA: Destinations use fine grained capability to allocate bandwidth to senders. So, bandwidth between colluder and destination is rate limited.  SIFF: Request packets are dropped against authorized packets. So, request completion rate drops sharply when attack reaches bottleneck bandwidth.  Pushback: Treat request and authorized traffic as regular traffic. Results same as for legacy packets.  Legacy internet: Treat request and authorized traffic as regular traffic. Results same as for legacy packets.

Simulation Results - Authorized packet floods

Simulation Results – Imprecise authorization  TVA: Implements capabilities that expire after timeout and can be revoked by destination after finding misbehaving destinations.  SIFF: The expiration of a capability depends on changing the router secret, leaving the destination powerless in case of a misbehaving sender.

Simulation Results – Imprecise authorization

Implementation  TVA prototype using Linux netfilter on commodity hardware.  Legacy applications run without modification.  Router capability as kernel module, using: AES = first hash function. SHA-1 = second hash function.  Kernel packet generator to generate different types of packets.  Recording of the average number of instruction cycles for the router to process each type of packet.  Testing of Linux router forwarding speed for capability packets.  Implementation handles 100Mbps interface with off-the-shelf hardware.

Implementation Processing overhead for different packet types

Security Analysis  Security based on inability of attacker to gain capabilities for routers along path to destination.  Hashing scheme uses a sufficiently small key that changes every 128 sec. Breaking the key is practically impossible.  Attacker may observe pre-capabilities in requests by routers.  Stolen capabilities belonging to sender cannot be reused as this is included in the hashed value.  Masquerade as a receiver.  Attacker and colluder spoof the authorized traffic as sent by different sender S. This is thwarted by the fact that the per-destination queuing is used. Per-source queuing is not used as the sources cannot be trusted.

Deployment  Needs routers and hosts to be upgraded.  Incremental deployment.  Routers up gradation: At trust boundaries. At locations of congestion. Placement of inline processing box next to legacy router. No inter-router arrangements and alteration of routing. Deployment working back from destination for better attack localization.  Host up gradation: Occurring with proxies at edges of customer networks in form of NAT boxes. Not needed to upgrade individual hosts separately.

Conclusion  TVA limits DoS despite a large number of attackers.  Architecture is based on capabilities that enable destinations to authorize senders, in combination with routers to send authorized traffic.  Complete design to handle packet capabilities, initial request exchanges, destination policies, computation state requirements and router states.  With the TVA architecture; Legacy, Request and other authorized packets have little or limited impact on the performance of the legitimate users.  Practical design that runs at Gigabit speeds on commodity PC’s.  Design with easy transition and deployment on legacy network.

Thank you !!!!