1 NSF DRAFT PROPOSAL Protecting Networks with COPS: Making Networks More Robust by Checking, Observing, and Protecting Services Randy H. Katz, Scott Shenker,

Slides:



Advertisements
Similar presentations
New Directions in Enterprise Network Management Aditya Akella University of Wisconsin, Madison MSR Networking Summit June 2006.
Advertisements

Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Next Generation Network Architectures Summary John.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Design Deployment and Use of the DETER Testbed Terry Benzel, Robert Braden, Dongho Kim, Clifford Informatino Sciences Institute
Dynamic Routing Scalable Infrastructure Workshop, AfNOG2008.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
1 Quality of Service vs. Any Service at All 10th IEEE/IFIP Conference on Network Operations and Management Systems (NOMS 2006) Vancouver, BC, Canada April.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
High speed links, distributed services, can’t modify routers  Lack of visibility But, need for more visibility and control  Increased number and complexity.
15-441: Computer Networking Lecture 26: Networking Future.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
The End of Internet Architecture Author: Timothy Roscoe Presented by Gross, Zhaosheng Zhu.
1 Protecting Networks with COPS: Making Networks More Robust by Checking, Observing, and Protecting Services Randy H. Katz, Scott Shenker, Ion Stoica Computer.
1 Quality of Service vs. Any Service at All IWQoS 2005 Passau Germany Randy H. Katz Computer Science Division Electrical Engineering and Computer Science.
1 A Policy-aware Switching Layer for Data Centers Dilip Joseph Arsalan Tavakoli Ion Stoica University of California at Berkeley.
1 SAHARA and OASIS Overviews NTT MCL Visit November 6, 2003 Randy H. Katz Computer Science Division Electrical Engineering and Computer Science Department.
Class 3: SDN Stack Theophilus Benson. Outline Background – Routing in ISP – Cloud Computing SDN application stack revisited Evolution of SDN – The end.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Firewall Slides by John Rouda
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Firewalls and the Campus Grid: an Overview Bruce Beckles University of Cambridge Computing Service.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Norman SecureSurf Protect your users when surfing the Internet.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Chapter 1: Hierarchical Network Design
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
Software-Defined Networks Jennifer Rexford Princeton University.
1 Enterprise Networks under Stress. 2 = 60% growth/year Vern Paxson, ICIR, “Measuring Adversaries”
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
RON: Resilient Overlay Networks David Andersen, Hari Balakrishnan, Frans Kaashoek, Robert Morris MIT Laboratory for Computer Science
RON: Resilient Overlay Networks David Andersen, Hari Balakrishnan, Frans Kaashoek, Robert Morris MIT Laboratory for Computer Science
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Addressing Issues David Conrad Internet Software Consortium.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Progress Report Armando Fox with George Candea, James Cutler, Ben Ling, Andy Huang.
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
Role Of Network IDS in Network Perimeter Defense.
Scrapping the Internet Presented by Dhaval Joshi.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Network Devices and Firewalls Lesson 14. It applies to our class…
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
Network Processing Systems Design
CompTIA Security+ Study Guide (SY0-401)
Multi Node Label Routing – A layer 2.5 routing protocol
Whirlwind Tour Of Lectures So Far
ETHANE: TAKING CONTROL OF THE ENTERPRISE
Chapter 4: Routing Concepts
The NPD Group - Enterprise DC Agenda
CompTIA Security+ Study Guide (SY0-401)
The Stanford Clean Slate Program
Software Defined Networking (SDN)
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
IS4680 Security Auditing for Compliance
Presentation transcript:

1 NSF DRAFT PROPOSAL Protecting Networks with COPS: Making Networks More Robust by Checking, Observing, and Protecting Services Randy H. Katz, Scott Shenker, Ion Stoica Computer Science Division Electrical Engineering and Computer Science Department University of California, Berkeley Berkeley, CA

2 Session Goals and Objectives We need your thoughtful feedback! Present basic concepts and general work plan of our Draft NSF Proposal Will distribute the draft to you; NSF 21 January! –Treat as “Berkeley Confidential” and “For Your Eyes Only”—do not distribute the draft to your colleagues without asking us first! –These slides are ok to share Please read draft over next two days: special proposal feedback session W AM –If leaving early, please us with comments AS SOON AS POSSIBLE

3 Observations and Motivations Internet reasonably robust to point problems like link and router failures (“fail stop”) Successfully operates under a wide range of loading conditions and over diverse technologies During 9/11/01, Internet worked reasonable well, under heavy traffic conditions and with some major facilities failures in Lower Manhattan

4 Observations and Motivations But … –Single misconfigured border router able to bring the Internet to its knees (1997) –Worm outbreaks (e.g., Code Red, Nimda, Slammer) cause wide- spread havoc, generating BGP session resets mostly affecting the lower levels of the AS hierarchy –Campus IS&T tells us latest worms & file sharing apps cause traffic surges rendering campus network unmanageable due to control plane starvation (Spring/Summer 2004) –Berkeley EECS network loses ability to mount file systems and render other network services under suspected DNS DoS attack (December 2004) –No way to distinguished between “semantically” malformed traffic and that which is syntactically correct –Extremely hard to understand why network services fail, poor tools for post mortem analysis

5 Why and How Networks Fail Existing work focuses on loss of reachability due to routing anomalies & dynamics (e.g., convergence) Recent work investigates effect on wide-area routing infrastructure of surges caused by worm-induced and DoS traffic –BGP session resets a bigger problem for edge networks than peered ISPs –“Background radiation”: random port scans/malformed traffic rapidly becoming the dominant traffic reaching end networks! Left unaddressed: effect of surges on critical network services, e.g., DNS, DHCP, FS mounts, network storage services, web services, etc.

6 Why and How Networks Fail (continued) Complex phenomenology of failure Recent Berkeley experience suggests that traffic surges also render enterprise networks unusable Indirect effects of DoS traffic on network infrastructure: role of unexpected traffic patterns –Cisco Express Forwarding: random IP addresses flood route cache forcing all traffic to go through router slow path—high CPU utilization yields inability to manage router table updates –Route Summarization: powerful misconfigured peer overwhelms weaker peer with too many router table entries –SNMP DoS attack: overwhelm SNMP ports on routers –DNS attack: response-response loops in DNS queries generate traffic overload

7 Network Trends Tightly managed enterprises –“Lock down” network with highly restricted access rules from the outside –Strong policies about the kind of machines that can be connected within the network –We are not focused on such networks Open enterprises –Require a degree of access from outside the enterprise –Universities, Research Laboratories, Grid computing communities, … –“Virtual Corporations” collaborating on products and services –Balancing need for protection with openness is an essential motivation for our proposal

8 Technology Trends PNEs (aka Middleboxes) –Love them or hate them, they are proliferating »NATs, firewalls, server load balancers, IDS, … –New generation emerging that will be more programmable »E.g., Bivio Networks –New “Data Center in a Box” architectures: processing, storage, networking in blade centers –Issue: »Aggressively use these for deep packet inspection and actions including rewriting packet actions OR »Explore approaches which do not radically disturb protocol layering

9 COPS Checking Observing Protecting Services

10 Conceptual Architecture Component 1: “Check” Checkable Protocols: “Fix” Internet with new protocols that maintain invariants and techniques for checking/enforcing them –This is hard, but we have some experience: »Listen & Whisper: well-formed BGP behavior »Traffic Rate Control: Self-Verifiable Core Stateless Fair Queuing (SV-CSFQ) »Other examples in the proposal –Existing work requires changes to protocol end points or routers on the path »Way forward for new protocols, but difficult to retrofit checkability to existing protocols »Leveraged Building Blocks: Observable protocol behavior Cryptographic techniques Statistical methods

11 Conceptual Architecture Component 2: “Protect” Protect Crucial Services –Pragmatic Goal: minimize & mitigate effects of attacks & traffic surges –Distinguish between good, bad, ugly (suspicious) traffic »Bad evolves much faster than good, and is harder characterize »Good determined by long-standing patterns and operator-tunable policies –Filter the bad, slow the suspicious, maintain resources for the good (e.g., control traffic) »Sufficient to reduce false positives »Some suspicious-looking good traffic may be slowed down, but won’t be blocked

12 Conceptual Architecture Component 3: “Observe” Observation (and Action) Points –Points within the network where control is exercised »Traffic classified »Resource allocation enforced –Extend Internet Architecture »Routers + End Hosts + Inspection-and-Action Boxes (aka iBoxes) »iBoxes prototyped on commercial PNEs »Placed at Internet and Server edges of enterprise net Single administrative environment Not a core network technology »Transparently cascaded with existing routers to extend their functionality Place to retrofit checkability with already deployed services and routers

13 iBox iBox Placement and Functionality Boundary Router Network Services iBox Internal Router “Open” Enterprise Network External Traffic Internal Traffic Packet Label Packet Label Action: Mark packets Detect load and trigger action: Slow traffic with “external” labels

14 Check How far can you go with Whisper-like techniques? Can checkability be applied in protocol domains other than congestion control and routing? How can we exploit iBoxes to incremently deploy checkable protocols? How far can you go with locally observable invariants? How to check for global properties?

15 Network Crash Recorder Record and save network activity just before a crash for later analysis Many issues: –Just how do you detect a crash? »Fail stop variety are easy (e.g., router crash) »What about cascaded failures induced by certain kinds of traffic patterns? –How do you correlate logged activity from multiple observation points across the network? »Focusing on enterprise networks makes this more tractable than the full-scale Internet »Some experience in terms of of tools for DHT debugging (talk tomorrow) –Great challenge application for iBoxes!

16 Constructive Approach Network reliability benchmarks to better understand how networks fail plus signature of impending failure –Network Crash Recorder based on cooperating iBoxes to snapshot recent network state preceding a network service failure Architectural elements for raising the semantic level of the Internet –Design of checkable protocols »Building blocks for enabling invariant checking –Design of iBoxes »Observation and action operations to implement protection of network services

17 Observe and Protect iBoxes implemented on commercial PNEs –Don’t: route or implement (full) protocol stacks –Do: protect routers and shield network services »Classify packets »Extract flows »Redirect traffic »Log, count, collect stats »Filter/shape traffic

18 Observe and Protect Other NEs do some of these things (e.g., Packeteer), but … –iBoxes are fully programmable by us »Essential element of our agenda is understanding how to structure the programming environment for PNEs to ease implementation of iBox functionality –Don’t require 100% successful classification: degree of freedom in distinguishing between good vs. bad vs. ugly –Learning algorithms: potentially discover new good traffic over time –Directly support newly designed checkable protocols –Focus on protecting network services, not performance per se »Problems we are interested in cannot be solved simply by managing bandwidth better »Integrate iBoxes with rest of the COPS approach

19 Expected Contributions Design, implementation, assessment of checkable protocols COPS framework: Check-Observe-Protect to simultaneously enable open enterprises while also protecting their critical network resources Evaluation-Design-Prototyping Methodology If successful, Internet protocols evolve to become increasingly more checkable plus iBox functionality migrates into future generations of routers

20 What We are Not Doing Building new PNE hardware –Though classification boosting algorithms may be of interest to hardware designers Making the wide-area network more reliability –Though checkable protocol technology may help General problem of containing worms and other malware –Though detecting traffic surges and protecting network services against them may help