Formal Models of Availability Carl A. Gunter University of Pennsylvania (Soon to be the University of Illinois)

Slides:



Advertisements
Similar presentations
CS144 Review Session 4 April 25, 2008 Ben Nham
Advertisements

CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
2: Transport Layer 31 Transport Layer 3. 2: Transport Layer 32 TCP Flow Control receiver: explicitly informs sender of (dynamically changing) amount of.
TCP Flooding. TCP handshake C S SYN C SYN S, ACK C ACK S Listening Store data Wait Connected.
1 Transport Protocols & TCP CSE 3213 Fall April 2015.
1 Formal Modeling and Analysis of DoS Using Probabilistic Rewrite Theories Gul Agha Michael Greenwald Carl Gunter Sanjeev Khanna Jose Meseguer Koushik.
Transport Layer – TCP (Part2) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
UNIT 07 Process – to – Process Delivery: UDP,TCP and SCTP
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Research Overview Carl A. Gunter University of Pennsylvania.
1 Experiment And Analysis of Dynamic TCP Acknowledgement Daeseob Lim Sam Lai Wing-Ho Gordon Wong.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Ch 23 Ameera Almasoud Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
The Shared Channel Model for DoS Carl A. Gunter With Sanjeev Khanna, Kaijun Tan, and Santosh Venkatesh.
All rights reserved © 2006, Alcatel Accelerating TCP Traffic on Broadband Access Networks  Ing-Jyh Tsang 
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
L3A: A Protocol for Layer Three Accounting Alwyn Goodloe, Matthew Jacobs, Gaurav Shah University of Pennsylvania Carl A. Gunter University of Illinois.
Go-Back-N ARQ  packets transmitted continuously (when available) without waiting for ACK, up to N outstanding, unACK’ed packets  a logically different.
Introduction to Sockstress A TCP Socket Stress Testing Framework Presented at the SEC-T Security Conference Presented by: Jack C. Louis –Senior Security.
26-TCP Dr. John P. Abraham Professor UTPA. TCP  Transmission control protocol, another transport layer protocol.  Reliable delivery  Tcp must compensate.
Chapter 12 Transmission Control Protocol (TCP)
TCP/IP Vulnerabilities
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Mitigating DoS Attack Through Selective Bin Verification Micah Sherr a, Michael Greenwald b, Carl A. Gunter c, Sanjeev Khanna a, and Santosh S. Venkatesh.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Copyright © Lopamudra Roychoudhuri
A Cost-Based Framework for Analysis of Denial of Service in Networks Author: Catherine Meadows Presenter: Ajay Mahimkar.
81 Sidevõrgud IRT 0020 loeng okt Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
1 SIGCOMM ’ 03 Low-Rate TCP-Targeted Denial of Service Attacks A. Kuzmanovic and E. W. Knightly Rice University Reviewed by Haoyu Song 9/25/2003.
Computer Networks23-1 PART 5 Transport Layer. Computer Networks23-2 Position of Transport Layer Responsible for the delivery of a message from one process.
TCP Security Vulnerabilities Phil Cayton CSE
New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Stanford University Ari Juels, RSA Laboratories Alex Halderman, Princeton University.
DoS/DDoS attack and defense
Security for Broadcast Network
Breno de MedeirosFlorida State University Fall 2005 The IP, TCP, UDP protocols A quick refresher.
ECE 4110 – Internetwork Programming
Networks, Part 2 March 7, Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data.
TCP Traffic Characteristics—Deep buffer Switch
1 Validation of Security Protocols Joint work with Gul Agha, Michael Greenwald, Carl Gunter, Sanjeev Khanna, Darko Marinov, Jose Meseguer, Prasanna Thati,
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Peer-to-Peer Networks 13 Internet – The Underlay Network
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Network Protocols: Design and Analysis Polly Huang EE NTU
Using Rhythmic Nonces for Puzzle-Based DoS Resistance Ellick M. Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, and Daniel Rebolledo University of.
The Transport Layer (TCP)
Reddy Mainampati Udit Parikh Alex Kardomateas
Domain 4 – Communication and Network Security
Outline Basics of network security Definitions Sample attacks
Process-to-Process Delivery, TCP and UDP protocols
PART 5 Transport Layer Computer Networks.
Transport Layer Our goals:
The IP, TCP, UDP protocols
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Gul Agha Michael Greenwald Carl Gunter Sanjeev Khanna
Gul Agha Michael Greenwald Carl Gunter Sanjeev Khanna
Outline Basics of network security Definitions Sample attacks
Transport Layer 9/22/2019.
TCP Connection Management
Lecture 6, Computer Networks (198:552)
Presentation transcript:

Formal Models of Availability Carl A. Gunter University of Pennsylvania (Soon to be the University of Illinois)

State of the Art in Formal Analysis of Security Excellent progress on the formal analysis of integrity and confidentiality. Algebraic techniques catch bugs quickly and can be automated. Many successful case studies with practical protocols. Complexity-theoretic techniques provide more complete proofs. Techniques are being derived to unify these. Modest progress on the formal study of availability. Limited formal models. Too conservative. Not realistic. Insufficient nomenclature. No automation. Few case studies or experimental validations. Fragile linkage to implementations.

Toward Formal Analysis of DoS Shared Channel Model Case study: DoS protection for authenticated broadcast. Asymmetry Paradigm Case study: TCP. Composition and testing of DoS-resistent protocols. Case study: Layer three accounting (L3A). Unified algebraic model. Formalization of authentication protocols. Probabilistic term rewriting. C Gunter, S Khanna, K Tan, S Venkatesh M Delap, M Greenwald, C Gunter, S Khanna, Y Xu A Goodloe, C Gunter, MO Stehr C Gunter, M Sherr, S Venkatesh M Greenwald, C Gunter, S Khanna, J Meseguer, K Sen, P Thati

Broadcast Authentication Attacker Internet television, shared spectrum radio, digital satellite, etc.

Challenge of Broadcast Authentication Inefficient to use public key signatures for each packet. Insecure to use a common distributed key. Inefficient, impractical, or impossible to use unicast tunnels. Many proposals have been made to address these problems. Delayed key release. Amortize costs of public key checks over multiple packets.

Challenge of DoS for Broadcast Attacks in broadcast case are more likely to be informed attacks in which sequence numbers and other aspects of protocol state are known. TCP is very vulnerable to informed attacks. Authentication based on Public Key Checks (PKCs) are vulnerable to signature flooding. Attacks on Forward Error Correction (FEC) lead to higher overheads.

Security Models for DoS Common form of analysis: show that the victim can defend against an attack that occupies his whole channel. Effective, but too conservative. Dolev-Yao: assume that the adversary controls the channel and can use the legitimate sender at will. Seems to give away the game. Attacks based on limited modification. Not a common case. “Tit for tat”: work commitment by initiator. Needs extension. Wanted: a more realistic model of attack and countermeasures to exploit it.

Shared Channel Model Adversary can replay and insert packets. Legitimate sender sends packets with a maximum and minimum bandwidth. Legitimate sender experiences loss, but not deliberate modification. Model is a four-tuple (W 0, W 1, A, p). W 0, W 1 min and max sender b/w A attacker max b/w p loss rate of sender

Shared Channel Model Example

Signature Flooding Attack factor R = A / W 1. Proportionate attack R = 1. Disproportionate attack R > 1. Stock PC can handle about 8000 PKC/sec. 10Mbps link sends about 900 pkt/sec, 100Mbps link sends about 9000 pkt/sec (assuming large packets). Processor is overwhelmed by too many signature checks. Adversary can devote full b/w to bad signatures at no cost. Budget: no more that 5% of processor on PKCs.

Broadcast Authentication Streams Data Stream Hash/Parity Stream Signature Stream

Interleaving of Transmission Groups Signature DataHash Parity

Selective Sequential Verification The signature stream is vulnerable to signature flooding: the adversary can devote his entire channel to fake signature packets. Countermeasure: Valid sender sends multiple copies of the signature packet. receiver checks each incoming signature packet with some probability (say, 25% or 1%).

Attack Profile R S requires low b/w channel with high processing cost at R A loads this channel with bad packets S A

Selective Verification RA S

R R makes channels lossy S adds redundancy A gets reduced channel Tradeoff: bandwidth vs. processing S A

How to Choose Parameters Parameters: Attack factor R Sender bandwidth W (packets/sec) Packet loss rate p Signature check budget K (per second) Theorem: A client receives a valid signature with confidence at least 99% if the number of signature copies is 5W(R+1) / (1-p)K.

Intuition Suppose we have 100 valid signature packets hidden in a large set of packets with invalid signatures. If we check each packet in the large set with probability 5%, the probability that we do not find a valid signature packet is at most (1-(5 / 100)) 100 = (1-(1 / 20)) 20*5 ≈ 1 / e 5 <.01

In More Detail Suppose the client checks each signature packet with probability π. The probability that a signature packet is successfully received and verified by the client is (1-p) π. Let N be the number of signature packets. The probability that none of the N signature packets is successfully received and verified by the client is (1-(1-p) π) N. Roughly speaking, we set π = K / RW N = 5 / (1-p) π.

Sample Numbers 10Mbps with 20% loss and 2 second latency 1584 data packets 11 hash packets, 11 parity packets 20 signature packets, verification probability 25% 100Mbps with 40% loss and 1 second latency 8208 data packets 57 hash packets, 66 parity packets 200 signature packets, verification probability 2.5%

Selective Verification is Very Effective

Authentication Loss

Throughputs Under Severe Attacks 8% sig o/h3% sig o/h8% sig o/h Little effect!

The Asymmetry Paradigm Attackers leverage a feature that inflicts a great cost on the server at little expense to the client Defenders leverage asymmetric goals: Attacker: acquire all of a resource. Client: acquire a single unit of resource. Inflate the cost of a resource that the attacker consumes at a greater rate, so that it becomes a bottleneck for the attacker before being able to deny service. Jujitsu: a martial art that forces attacker to use his size and weight against himself.

Is the Asymmetry Paradigm generally applicable? Applicable: Are there typically resources consumed by the attacker more quickly than by the clients? Effective: Does an application of the asymmetry paradigm remove the threat of DoS? Composition: Can the paradigm be applied without changing the existing protocol?

TCP/IP: A case study Common Round Trip: already have example for one-way protocol Susceptible to DoS attacks: SYN flood and others Existing solutions as benchmark: Increase size of SYN cache, random drop, SYN cookies

TCP/IP: A case study Connection initiation SYN, SYN+ACK, ACK 3-way handshake Agree on source, dest, source port, dest port, source seq. #, dest seq. # SYN SSN=123 SP, DP SP,DP, SSN SP SP,DP, SSN, DSN SYN,ACK=124 SSN=456 SP, DP SP,DP, SSN, DSN ? ?? ACK=457 SSN=124 SP, DP SP,DP, SSN, DSN

TCP’s Memory Requirements TCB Control Block: SSN, RxMT, Acked Packet buffers: Outgoing unacked data Incoming, unread + out-of-order data Until ESTABLISHED, only need: portno, ISN, ACK SYN Cache of size B

Example: TCP SYN Cache Parameters: Network capacity is r A = 300K SYNs/sec ( 100Mbps Fast Ethernet) B = 10,000 Slots free at rate of B/t A SYN cache occupancy: On timeout: t A = 100 seconds ( seconds) On success: RTT = 10ms (< milliseconds)

SYN-flood defense: selective processing If attacker arrives at rate <= f B/t A then (1-f)B slots reserved for legit clients B

SYN-flood defense: selective processing If attacker arrives at rate <= f B/t A then (1-f)B slots reserved for legit clients Process SYNs w/ probability p <= f B/(t A r A ) B p

SYN-flood defense: selective processing If attacker arrives at rate <= f B/t A then (1-f)B slots reserved for legit clients Process SYNs w/ probability p <= f B/(t A r A ) Increase connection rate by 1/p B p X 1/p Limited by net capacity.

SYN-flood defense: selective processing If attacker arrives at rate <= f B/t A then (1-f)B slots reserved for legit clients Process SYNs w/ probability p <= f B/(t A r A ) Increase rate by 1/p Attacker rate of p r A cannot fill more than f B slots B p p r A X 1/p rArA

SYN-flood defense: selective processing Process SYNs w/ probability p <= f B/(t A r A ) Examples: If p = /6, then attacker can never occupy more than half of SYN cache, but clients rxmt 6000 SYNs/connection If increase size to 30B, and p =.005 then same.5 limit, but client only rxmts 200 SYNs/connection. For 500KB file, this is only 2% overhead. Without selective processing (p = 1) need B’ = 6 X 10 7 (= 6000B) to achieve the same level of defense. B p p r A X 1/p rArA

Experimental validation: Successful connections vs. attack rate Attack rate in SYNs/sec received at server Graph shows successful connections per 450 threads Defenseless kernel: >6 SYNs/sec shuts out client Aggregate connections Attack rate Model predicts cliff

Conclusion Progress is possible on formal analysis of availability. New models are more realistic and point to new countermeasures. Key concepts: Shared Channel Model Selective Processing Countermeasures Asymmetry Paradigm