Detecting SYN Flooding Attacks Haining Wang, Dandle Zhang, Kang G. Shin Presented By Hareesh Pattipati.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

TCP/IP Christopher Zacky. lolwut Decimal Numbers.
TCP Flooding. TCP handshake C S SYN C SYN S, ACK C ACK S Listening Store data Wait Connected.
Analysis of a DOS attack on TCP
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Programming with TCP – I
Slide Set 13: TCP. In this set.... TCP Connection Termination TCP State Transition Diagram Flow Control How does TCP control its sliding window ?
1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A note on the use.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
TCP & UDP - Protocol Details Yen-Cheng Chen
1 Reading Log Files. 2 Segment Format
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
1 CS 4396 Computer Networks Lab Transmission Control Protocol (TCP) Part I.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
Provides a reliable unicast end-to-end byte stream over an unreliable internetwork.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Chapter 7 – Transport Layer Protocols
TCP segment structure source port # dest port # 32 bits application data (variable length) sequence number acknowledgement number rcvr window size ptr.
1 The TCP Protocol Connection-oriented, point-to-point protocol: –Connection establishment and teardown phases –‘Phone-like’ circuit abstraction (application-layer.
Firewalls and Intrusion Detection Systems
TCP© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science Department.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 UDP, TCP (Part I) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute
Outline Definition Point-to-point network denial of service
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Statistical based IDS background introduction. Statistical IDS background Why do we do this project Attack introduction IDS architecture Data description.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
CSCE 515: Computer Network Programming TCP Details Wenyuan Xu Department of Computer Science and Engineering.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 UDP, TCP (Part I) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 UDP, TCP (Part I) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute
1 ELEN 602 Lecture 15 More on IP TCP. 2 byte stream Send buffer segments Receive buffer byte stream Application ACKs Transmitter Receiver TCP Streams.
Gursharan Singh Tatla Transport Layer 16-May
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
FIREWALL Mạng máy tính nâng cao-V1.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Protecting Web Servers from Content Request Floods Srikanth Kandula ▪ Shantanu Sinha ▪ Dina Katabi ▪ Matthias Jacob CSAIL –MIT.
Transport Layer: TCP and UDP
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
Transmission Control Protocol TCP. Transport layer function.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Beginning Network Security Monitor and control flow into and out of the LAN Ingress Egress Only let in the good guys Only let out the corp. business.
 network appliances to filter network traffic  filter on header (largely based on layers 3-5) Internet Intranet.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Connection Establishment and Termination. Tcpdump tcpdump is a common packet analyzer that runs under the command line. It allows the user to intercept.
© Jörg Liebeherr (modified by Malathi Veeraraghavan) 1 Overview Formats, Data Transfer, etc. Connection Management.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Two Transport Protocols Available Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Provides unreliable transfer Requires minimal – Overhead.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
Advanced Computer Networks
Review of TCP/IP.
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
COMP2322 Lab 6 TCP Steven Lee Mar 29, 2017.
5. End-to-end protocols (part 1)
TCP Protocol Slides originally from Williamson at Calgary
TCP.
TCP Review Carey Williamson Department of Computer Science
TCP - Part I Karim El Defrawy
CSCI-1680 Transport Layer I
TCP State Machine (TCP/IP Illustrated vol. 1) W. Richard Stevens
The IP, TCP, UDP protocols
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
TCP Overview Connection-oriented Byte-stream Full duplex
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Statistical based IDS background introduction
Transport Layer 9/22/2019.
Presentation transcript:

Detecting SYN Flooding Attacks Haining Wang, Dandle Zhang, Kang G. Shin Presented By Hareesh Pattipati

Outline Introduction Related Issues Attack Detection Performance Evaluation Future Work Conclusion

Introduction Attacks on popular sites Most of them are DoS using TCP SYN Flooding exploits TCP 3-way hand- shake Syn Cache, Syn cookies, SynDefender, Syn Proxying and SynKill Installed on firewall or victim server

Introduction (cont) Specialized firewalls become worthless with packets per sec. FDS – Flooding Detection System Installed on leaf routers (First-mile or Last-mile routers) FDS uses key feature of TCP SYN-FIN pairs behavior.

ClientServer Socket, Connect (blocks) (active open) SYN_SENT socket,bind,listen (passive open) accept( blocks) SYN_RCVD ESTABLISHED Connect returns ESTABLISHED accept returns read (blocks) write read (blocks) read returns write read (blocks) read returns Close (active close) FIN_WAIT_1 CLOSE_WAIT (passive close) read returns 0 FIN_WAIT_2 Close LAST_ACK TIME_WAIT CLOSED SYN j, mss =1460 SYN K, ack j+1, mss =1024 ack K+1 Data (request) Data (reply) + ack of request ack of reply FIN M ack M+1 FIN M ack M+1

Introduction (cont) TCP packet classification is done at leaf router SYN (beginning) FIN (END) for each TCP connection No means to distinguish active FIN and passive FIN RST violates the SYN-FIN pairs Three new variables introduced to count SYN,FIN, and RST

Related Issues Packet Classification Placement of Detection Mechanism Discrepancy between SYN’s and FIN’s

Packet classification Packet Classification is done at the leaf router First two steps confirm that it is a TCP packet Code Bits in IP packet equals the sum of the length of IP header and offset of code BIT’s in TCP

Placement of Detection Mechanism FDS is installed at the first-mile and last mile router First-mile is more likely to catch flooding detection due to proximity to sources. Last-mile quickly detects the flooding but cant provide hint about flooding sources FDS is not installed at core due to a) it is close to neither flooding sources not the victim b) packets of the same flow could traverse different paths

Discrepancy btw SYN’s and FIN’s Single RST packet can terminate a TCP session Passive RST transmitted in response to close the port Active RST transmitted in response to abort a TCP connection and associated with a SYN Normal behavior of TCP:(SYN,FIN), (SYN/ACK,FIN) and (SYN,RST active ) FDS cannot differentiate between active and passive RST

Discrepancy btw SYN’s and FIN’s Normal Conditions : 1) SYN and RST have a strong correlation 2) Difference between SYNs and FINs is equal to RSTs Threshold is set at 75%, i.e., 3 out of 4 RSTs are active

Attack Detection Data Sampling and Detection Mechanism SYN and FIN packets collected over time t 0 Sampling time of FIN(RST) t d later than SYN Recent study : TCP Connections sec t d set to 10 sec and t 0 is set to 20 sec The CUSUM algorithm {∆ n,n=0,1,..} Number of SYNs-FINs. {∆ n } is Normalized by average number of F of FINs(RSTs)

Attack Detection X n = ∆ n / F. Xn denoted as C and ranges between 0 and 1. - {y n } large value indicates of an attack.

Performance Evaluation

SYN Flooding Detection UNC 2000 used a normal traffic UNC_in inbound as Last-mile monitoring UNC_out outbound as First-mile monitoring Flooded traffic is mixed and FDS is simulated at the leaf router

Future Work SYN-FIN detection paralyzed is the attacker sends SYNs and FINs

Conclusion SYN flooding detection installed at leaf router FDS is stateless and low computation overhead In-sensitive to the site Does not under mine the end-to-end TCP performance.