IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.

Slides:



Advertisements
Similar presentations
COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips.
Advertisements

Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
IP Traceback in Cloud Computing Through Deterministic Flow Marking Mouiad Abid Hani Presentation figures are from references given on slide 21. By Presented.
Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson University of Washington- Seattle, WA Presented by Mohammad Hajjat- Purdue University Slides.
Copyright© Telecom-ISAC Japan. All Rights Reserved. 1 Traceback Research & Experiments Against Source Address Attacks APRICOT2010 Japan Data Communications.
Defending against Large-Scale Distributed Denial-of-Service Attacks Department of Electrical and Computer Engineering Advanced Research in Information.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
© 2008 Andreas Haeberlen, MPI-SWS 1 Pretty Good Packet Authentication Andreas Haeberlen MPI-SWS / Rice University Rodrigo Rodrigues MPI-SWS Peter Druschel.
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Introduction to IP Traceback 交通大學 電信系 李程輝 教授. 2 Outline  Introduction  Ingress Filtering  Packet Marking  Packet Digesting  Summary.
Oct 19, 2004CS573: Network Protocols and Standards1 IP: Datagram and Addressing Network Protocols and Standards Autumn
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 1 Agenda Last time: finished brief overview.
Hash-Based IP Traceback Alex C. Snoeren, Craig Partidge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer.
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
Internet Protocol (IP)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Pi : A Path Identification Mechanism to Defend against DDos Attacks.
Tracking and Tracing Cyber-Attacks
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Traceback Pat Burke Yanos Saravanos. Agenda Introduction Problem Definition Traceback Methods  Packet Marking  Hash-based Conclusion References.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Large-Scale IP Traceback in High-Speed Internet : Practical Techniques and Theoretical Foundation Jun (Jim) Xu Networking & Telecommunications Group College.
Traceback Pat Burke Yanos Saravanos. Agenda Introduction Problem Definition Benchmarks and Metrics Traceback Methods  Packet Marking  Hash-based Conclusion.
1 Network Layer Lecture 15 Imran Ahmed University of Management & Technology.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Packet-Marking Scheme for DDoS Attack Prevention
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring Presented by: Dedicated Instructor: Hiteshkumar Thakker.
By Rod Lykins.  Brief DDoS Introduction  Packet Marking Overview  Other DDoS Defense Mechanisms.
CSE715 Presentation Project Fall 2004 by Michael Alexandrou and Rusty Coleman.
Routing and Routing Protocols PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
Efficient AS DoS Traceback (Autonomous System) Mohammed Alenezi, Martin J Reed Computer Applications Technology (ICCAT), 2013 張業正
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
Spoofing Prevention Method Srikanth T.S.S. Sri Lakshmi Ramya S.
Introduction to IP Traceback 交通大學 電信系 李程輝 教授 2004/3/26.
Network Support For IP Traceback Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson University of Washington- Seattle, WA Slides originally byTeng.
Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 11 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Network Address Translation
“Practical Network Support for IP Traceback”
Pi: A Path Identification Mechanism to Defend Against DDoS Attacks
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
Defending Against DDoS
Filtering Spoofed Packets
Internet Protocol (IP)
Defending Against DDoS
Tracing Cyber Attacks Areej Al-Bataineh
Network Support For IP Traceback
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
Detect and Prevent Rogue Traffic in Mobile Ad Hoc Networks
DDoS Attack and Its Defense
Chapter 15 - IP: Software To Create A Virtual Network
Presentation transcript:

IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣

Introduction IP traceback problem –The problem of identifying the source of the offending packets –Source : zombie ; reflector ; spoofed address … Solution –Rely on the routers (PPM ; ICMP) Only for DOS –Centralized management (log of packet infor.) Large overhead, complex, not scalable

Deterministic Packet Marking Each packet is marked when it enters the network Only mark Incoming packets Mark : address information of this interface 16 bit ID + 1 bit Flag

PPM

PPM VS DPM Router are treated as atomic units –IP address of a router  IP address of one of its interfaces –Packet traveling in different direction considered different Mark spoofing –Use coding technique (but not 100%)  Spoofed mark will be overwritten

PPM VS DPM (2) PPM (full path) ; DPM (address of the ingress router) –In datagram packet network Every packet is individually routed Full path traceback is as good as address of an ingress point –ISP use different IP address public addresses for interfaces to customers and other networks private addressing plans within their own networks

Coding of a mark Flag =0  address bits 0~15 Flag =1  address bits 16~31 Randomly setting flag value How many packet are enough ? –n : the number of received packets –The probability of successfully generate the ingress IP address is greater than –2 packets  75% ; 4 packets  93.75% 6 packets  98.43% ; 10 packets  99.9% 6 packets  98.43% ; 10 packets  99.9%

Pseudo code

Pros Simple to implement Introduces no bandwidth Practically no processing overhead suitable for a variety of attacks [not just (D)DoS] Backward compatible with equipment which does not implement it does not have inherent security flaws Do not reveal internet topology No mark spoofing Scalable

Future work The fragmentation/reassembly problem –Only less than 0.5% packet –Solve : –Solve : The ID field for all fragments has to be assigned the same address bits Attacker change IP frequently during attack – –Solve : making the destination rely only on the marks & the hash value of the ingress router Analyze the coding technique IPv6 implementation

Tracing Multiple Attackers with Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE PACRIM’03, August 2003

The problem with the basic DPM(1) two hosts with the same Source Address at tack the victim ex : The ingress addresses corresponding to these two attackers are A0 and A1 The victim will receive A0[0], A0[1], A1[0], A1[1] A0[0].A0[1], A0[0].A1[1], A1[0].A0[1], A1[0].A1[1] Rate of false positive=50%

The problem with the basic DPM (2) Change source address

Schematics Pad Ideal hash

Reconstruction 個 area 個 area each area has k segments Each segment has bits area

Analysis N : the number of ingress router When false positive rate = 0 When – –The expected number of different values the segment will take is

Analysis (2) – –The expected number of permutations that result in a given digest for a given area – –The number of false positives for a given area

Analysis (3) –The total number of total false positive –The max number of N

Analysis (4) –The expected number of datagram

Analysis (5)

Conclusion capable of tracing thousands of simultaneous attackers during DDoS attack (just DDoS) The traceback process can be performed post-mortem, which allows for tracing the attacks that may not have been noticed initially Solve the two problem Need more marked packets