Characterizing and Defending Against DDoS Attacks Christos Papadopoulos..and many others.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Distributed Denial of Service Attacks (DDoS) Christos Papadopoulos.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
1 Reading Log Files. 2 Segment Format
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
The Latest In Denial Of Service Attacks: “Smurfing” Description and Information to Minimize Effects Craig A. Huegen Cisco Systems, Inc. NANOG 11 Interprovider.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Network Attacks Mark Shtern.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG 12 Interprovider.
Firewalls and Intrusion Detection Systems
Computer Security and Penetration Testing
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann and Christos Papadopoulos presented by Nahur Fonseca NRG, June, 22.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
10/21/20031 Framework For Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Kavita Chada & Viji Avali CSCE 790.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
DDos Distributed Denial of Service Attacks by Mark Schuchter.
Lecture 15 Denial of Service Attacks
Chapter 9 Phase 3: Denial-of-Service Attacks. Fig 9.1 Denial-of-Service attack categories.
Denial of Service attacks. Types of DoS attacks Bandwidth consumption attackers have more bandwidth than victim, e.g T3 (45Mpbs) attacks T1 (1.544 Mbps).
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Denial of Service Serguei A. Mokhov SOEN321 - Fall 2004.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Module 1: Reviewing the Suite of TCP/IP Protocols.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
1 Network Packet Generator Midway presentation Supervisor: Mony Orbach Presenting: Eugeney Ryzhyk, Igor Brevdo.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
Mahindra-British Telecom Ltd. Exploiting Layer 2 By Balwant Rathore.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Reviewed by Dave Lim.
Denial of Service Attacks
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
CSE715 Presentation Project Fall 2004 by Michael Alexandrou and Rusty Coleman.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
1 Distributed Denial of Service Attacks. Potential Damage of DDoS Attacks l The Problem: Massive distributed DoS attacks have the potential to severely.
DoS/DDoS attack and defense
Hands-On Ethical Hacking and Network Defense
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. SANS ‘98 Conference -
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Distributed Denial of Service Attacks
Network Security: DoS Attacks, Smurf Attack, & Worms
Distributed Denial of Service Attacks
Distributed Denial of Service Attacks
Presentation transcript:

Characterizing and Defending Against DDoS Attacks Christos Papadopoulos..and many others

How Do Computers Find Each Other? Internet Computer1Computer 2

What Are the Different Kinds of Addresses? •Have domain name (e.g., –Global, human readable name •DNS translates name to IP address (e.g ) –Global, understood by all networks • Finally, we need local net address –e.g., Ethernet ( c-19-dc-45) –Local, works only on a particular network

Domain Naming System (DNS) Local DNS server What’s the IP address for Computer 1 It is DNS address manually configured into OS

Finding Ether Address: Address Resolution (ARP) Ethernet Broadcast: who knows the Ethernet address for ? Ethernet Broadcast: I do, it is c-19-dc-45

Sending a Packet Through the Internet R R R R R HH H H H R R H R Routers send packet to next closest point H: Hosts R: Routers The Internet routes packets based on their destination!

Smurf Attack attacker target broadcast echo request source address is spoofed to be target’s address many echo replies are received by the target, since most machines on the amplifier network respond to the broadcast amplifier network

TCP SYN Flooding - A more powerful attack - client (port = 33623/tcp) server (port = 23/tcp) SYN SYN - ACK ACK [session proceeds] [ACK set for remainder of session] target (port = 23/tcp) SPOOFED SYN SYN - ACK FINAL ACK NEVER SENT nonexistent host

So, What Is DDoS? Distributed Denial of Service  New, more pernicious type of attack  Many hosts “gang” up to attack another host  Network resource attack:  Bandwidth  State

Why Should We Care?  Successfully used to attack prominent sites in the Internet by those with a primitive understanding of internet protocols  It is relatively easy to do, but hard to detect and stop  It is only going to get worse unless we develop adequate protection mechanisms

Anatomy of an Attack  Compromise a large set of machines  Install attack tools  Instruct all attack machines to initiate attack against a victim Process highly automated

Phase 1: Compromise A (stolen) account is used as repository for attack tools. A scan is performed to identify potential victims. A script is used to compromise the victims.

Phase 2: Install Attack Tools An automated installation script is then run on the “ owned ” systems to download and install the attack tool(s) from the repository. Optionally, a “ root kit ” is installed on the compromised systems.

Phase 3: Launch attack Launch a coordinated DDoS from different sites against a single victim. Network pipes of attackers can be small, but aggregated bw is far larger than victim’s pipe. Victim’s ISP may not notice elevated traffic. DDoS attacks are harder to track than a DoS.

Some Known DDoS attack tools  Trin00  Tribal Flood Network (TFN)  Tribal Flood Network 2000 (TFN2K)  Stacheldraht

 Combines features of trin00 and TFN.  Adds encryption between the attacker and masters and automated update of agents.  Communication between attacker and masters take place on tcp port  Daemons receive commands from masters through ICMP echo replies  ICMP, UDP, SYN flood and SMURF attack. Stacheldraht

#./ client [*] stacheldraht [*] (c) in 1999 by... trying to connect... connection established enter the passphrase : sicken entering interactive session. ****************************** welcome to stacheldraht ****************************** type.help if you are lame stacheldraht( status: a!1 d!0)>

stacheldraht(status: a!1 d!0)>.help available commands in this version are: mtimer.mudp.micmp.msyn.msort.mping.madd.mlist.msadd.msrem.distro.help.setusize.setisize.mdie.sprange.mstop.killall.showdead.showalive stacheldraht(status: a!1 d!0)>

Some Commands distro user server Instructs the agent to install and run a new copy of itself using the Berkeley "rcp" command, on the system "server", using the account "user" (e.g., "rcp ttymon").madd ip1[:ip2[:ipN]] Add IP addresses to list of attack victims..madd ip1[:ip2[:ipN]] Add IP addresses to list of attack victims..mdie Sends die request to all agents.

COSSACK: Coordinated Suppression of Simultaneous Attacks Computer Networks Division ISI

People  Co-PIs: Christos Papadopoulos, Bob Lindell (USC/ISI)  Affiliations: Ramesh Govindan (USC/ISI)  Staff: John Mehringer (ISI)  Students: Alefiya Hussain (USC)  DARPA synergies:  DWARD - Peter Reiher, Jelena Mirkovic (UCLA)  SAMAN - John Heidemann (USC/ISI)

Cossack Overview  Distributed set of watchdogs at network perimeter  Local IDS  Group communication  Topology information (when available)  Fully distributed approach  Peer-to-peer rather than master-slave  Attack-driven dynamic grouping of watchdogs  Attack correlation via coordination with other watchdogs  Independent, selective deployment of countermeasures

Cossack: A Simplified View WW W target watchdog attacker watchdog

Attacks Begin WW W target watchdog attacker

Watchdogs Communicate Using YOID WW W target watchdog attacker YOID

Attacks Detected WW W target watchdog attacker YOID

Watchdogs Install Filters and Eliminate Attack WW W target watchdog attacker

Detecting Source Spoofed Attacks WW W target watchdog attacker YOID

Cossack Watchdog Architecture Yoid Multicast Interface Distributed Blackboard Snort Interface Rate Monitor Other IDS (D-WARD) Router Control Pulsing Detector Cisco Interface Linux IPTables Router Interface Event Monitor YOID Multicast group

Cossack Plugin Operation Packet Flow Statistics Packet Averages Grouped by Destination Address Yoid Multicast Interface Distributed Blackboard Snort Interface Rate Monitor Other IDS (D-WARD) Router Control Pulsing Detector Cisco Interface Linux IPTables Router Interface Event Monitor Request more stats

Cossack Plugin Operation Packet Flow Statistics Packet Averages Grouped by Destination Address Yoid Multicast Interface Distributed Blackboard Snort Interface Rate Monitor Other IDS (D-WARD) Router Control Pulsing Detector Cisco Interface Linux IPTables Router Interface Event Monitor Request for more stats Packet Averages Grouped by Source Address

Cossack Network Inspector Tool to determine detection thresholds for watchdogs •Interfaces with the Cossack Snort Plugin •Collects aggregate level network traffic statistics –Traffic filters created using snort rules

Cossack Performance •Response time: 5 – 30 seconds •Insensitive to attack type

Attack Capture and Analysis Goal: Capture some attacks, analyze and learn from them •Packet-level capture facilities in several sites: –Los Nettos –USC –CAIDA –[Telcordia, Sprint] •Spectral analysis

LA-MAE VerioCogent Genuity Los Nettos Trace Machine 140Mbps,38kpps JPL Caltech TRWUSC Centergate Tracing Infrastructure Internet Los Nettos Customers

•Captured and classified about 120 attacks over several months Attack ClassCountPPSKbps Single-source Multi-source Reflected Unclassified Captured Attacks

Spectral Attack Analysis Multi-source attack (145 sources) Localization of power in low frequencies in NCS Single-source attack Strong higher frequencies and linear Normalized Cumulative Spectrum (NCS) F(60%)

Spectral Analysis Goal: identify single vs. multi-source attacks Single-source: F(60%) mean 268Hz ( Hz) Multi-source: F(60%) mean 172Hz ( Hz) Able to robustly categorize unclassified attacks

Conclusions  Cossack is a fully distributed approach against DDoS attacks  Software is operational and currently undergoing Red Team testing  We continue to capture attacks, analyze and learn from them  Spectral analysis work very promising