USENIX Security Symposium, San Jose, USA, July 30, 2008 Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks Jerry Chou, Bill Lin.

Slides:



Advertisements
Similar presentations
Using Edge-To-Edge Feedback Control to Make Assured Service More Assured in DiffServ Networks K.R.R.Kumar, A.L.Ananda, Lillykutty Jacob Centre for Internet.
Advertisements

1 CNPA B Nasser S. Abouzakhar Queuing Disciplines Week 8 – Lecture 2 16 th November, 2009.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
FastPass: Availability Tokens to Defeat DoS Presented at CMU Systems Seminar by: Dan Wendlandt Work with: David Andersen & Adrian Perrig.
CS 268: Lecture 8 Router Support for Congestion Control Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Simulating Large Networks using Fluid Flow Model Yong Liu Joint work with Francesco LoPresti, Vishal Misra Don Towsley, Yu Gu.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Advanced Computer Networking Congestion Control for High Bandwidth-Delay Product Environments (XCP Algorithm) 1.
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
© 2007 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. The Taming of The Shrew: Mitigating.
Ion Stoica, Scott Shenker, and Hui Zhang SIGCOMM’98, Vancouver, August 1998 subsequently IEEE/ACM Transactions on Networking 11(1), 2003, pp Presented.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
XCP: Congestion Control for High Bandwidth-Delay Product Network Dina Katabi, Mark Handley and Charlie Rohrs Presented by Ao-Jan Su.
ACM SIGCOMM LSAD Workshop, Kyoto, Japan, August 27, 2007 Minimizing Collateral Damage by Proactive Surge Protection Jerry Chou, Bill Lin University of.
A Study of Multiple IP Link Failure Fang Yu
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
Adaptive Packet Marking for Maintaining End-to-End Throughput in a Differentiated-Services Internet Wu-Chang Feng, Dilip D.Kandlur, Member, IEEE, Debanjan.
Source-Adaptive Multilayered Multicast Algorithms for Real- Time Video Distribution Brett J. Vickers, Celio Albuquerque, and Tatsuya Suda IEEE/ACM Transactions.
Traffic Engineering With Traditional IP Routing Protocols
Controlling High- Bandwidth Flows at the Congested Router Ratul Mahajan, Sally Floyd, David Wetherall AT&T Center for Internet Research at ICSI (ACIRI)
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Analysis and Simulation of a Fair Queuing Algorithm
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
Jerry Chou and Bill Lin University of California, San Diego
1 Emulating AQM from End Hosts Presenters: Syed Zaidi Ivor Rodrigues.
Computer Networking Lecture 17 – Queue Management As usual: Thanks to Srini Seshan and Dave Anderson.
A Strategy for Implementing Smart Market Pricing Scheme on Diff-Serv Murat Yuksel and Shivkumar Kalyanaraman Rensselaer Polytechnic Institute, Troy, NY.
Rethinking Internet Traffic Management: From Multiple Decompositions to a Practical Protocol Jiayue He Princeton University Joint work with Martin Suchara,
Using Prices to Allocate Resources at Access Points Jimmy Shih, Randy Katz, Anthony Joseph One Administrative Domain Access Point A Access Point B Network.
Core Stateless Fair Queueing Stoica, Shanker and Zhang - SIGCOMM 98 Rigorous fair Queueing requires per flow state: too costly in high speed core routers.
Stealth Probing: Efficient Data- Plane Security for IP Routing Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Congestion Control for High Bandwidth-Delay Product Environments Dina Katabi Mark Handley Charlie Rohrs.
UCB Improvements in Core-Stateless Fair Queueing (CSFQ) Ling Huang U.C. Berkeley cml.me.berkeley.edu/~hlion.
Not All Microseconds are Equal: Fine-Grained Per-Flow Measurements with Reference Latency Interpolation Myungjin Lee †, Nick Duffield‡, Ramana Rao Kompella†
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Clouseau: A practical IP spoofing defense through route-based filtering Jelena Mirkovic, University of Delaware Nikola Jevtic,
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
ACN: CSFQ1 CSFQ Core-Stateless Fair Queueing Presented by Nagaraj Shirali Choong-Soo Lee ACN: CSFQ1.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Link Scheduling & Queuing COS 461: Computer Networks
Beyond Best-Effort Service Advanced Multimedia University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot November 2010 November.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 A TCP Friendly Traffic Marker for IP Differentiated Services Feroz Azeem, Shiv Kalyanaraman,
1 Can coarse circuit switching work & What to do when it doesn't? Jerry Chou Advisor: Bill Lin University of California, San Diego CNS Review, Jan. 14,
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
EMIST DDoS Experimental Methodology Alefiya Hussain January 31, 2006.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Towards a More Fair and Robust Internet Backbone Year 1 Status Report Rene Cruz, Tara Javidi, Bill Lin Center for Networked Systems University of California,
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Efficient Cache Structures of IP Routers to Provide Policy-Based Services Graduate School of Engineering Osaka City University
Research Unit in Networking - University of Liège A Distributed Algorithm for Weighted Max-Min Fairness in MPLS Networks Fabian Skivée
Performance Engineering E2EpiPEs and FastTCP Internet2 member meeting - Indianapolis World Telecom Geneva October 15, 2003
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
Explicit Allocation of Best-Effort Service Goal: Allocate different rates to different users during congestion Can charge different prices to different.
NC STATE UNIVERSITY / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Fengmin Gong Talk:
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Inferring Internet Denial-of-Service Activity Authors: David Moore, Geoffrey M. Voelker and Stefan Savage; University of California, San Diego Publish:
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
Topics discussed in this section:
The Taming of The Shrew: Mitigating Low-Rate TCP-targeted Attack
Queue Management Jennifer Rexford COS 461: Computer Networks
Congestion Control and Resource Allocation
COS 461: Computer Networks
Congestion Control and Resource Allocation
Presentation transcript:

USENIX Security Symposium, San Jose, USA, July 30, 2008 Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks Jerry Chou, Bill Lin University of California, San Diego Subhabrata Sen, Oliver Spatscheck AT&T Labs-Research

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 2 Outline Problem Approach Experimental Results Summary

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 3 Motivation Large-scale bandwidth-based DDoS attacks can quickly knock out substantial parts of a network before reactive defenses can respond All traffic that share common route links will suffer collateral damage even if it is not under direct attack Seattle SunnyvaleDenver Los Angeles Chicago New York Washington Atlanta Houston Kansas City Indianapolis

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 4 Motivation Potential for large-scale bandwidth-based DDoS attacks exist e.g. large botnets with more than 100,000 bots exist today that, when combined with the prevalence of high- speed Internet access, can give attackers multiple tens of Gb/s of attack capacity Moreover, core networks are oversubscribed (e.g. some core routers in Abilene have more than 30 Gb/s incoming traffic from access networks, but only 20 Gb/s of outgoing capacity to the core

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 5 Example Scenario Suppose under normal condition  Traffic between Seattle/NY + Sunnyvale/NY under 10 Gb/s New YorkSeattle 10G Seattle/NY: 3 Gb/s HoustonAtlanta Indianapolis Kansas City Sunnyvale Sunnyvale/NY: 3 Gb/s

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 6 Example Scenario Suppose sudden attack between Houston/Atlanta  Congested links suffer high rate of packet loss  Serious collateral damage on crossfire OD pairs New York Sunnyvale Seattle 10G Sunnyvale/NY: 3 Gb/s Seattle/NY: 3 Gb/s HoustonAtlanta Houston/Atlanta: Attack 10 Gb/s Indianapolis Kansas City

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 7 Impact on Collateral Damage OD pairs are classified into 3 types with respect to the attack traffic  Attacked: OD pairs with attack traffic  Crossfire: OD pairs sharing route links with attack traffic  Non-crossfire: OD pairs not sharing route links with attack traffic Collateral damage occurs on crossfire OD pairs Even a small percentage of attack flows can affect substantial parts of the network USEurope

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 8 Related Works Most existing DDoS defense solutions are reactive in nature However, large-scale bandwidth-based DDoS attacks can quickly knock out substantial parts of a network before reactive defenses can respond Therefore, we need a proactive defense mechanism that works immediately when an attack occurs

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 9 Related Works (cont’d) Router-based defenses like Random Early Drop (RED, RED-PD, etc) can prevent congestion by dropping packets early before congestion  But may drop normal traffic indiscriminately, causing responsive TCP flows to severely degrade Approximate fair dropping schemes aim to provide fair sharing between flows  But attackers can launch many seemingly legitimate TCP connections with spoofed IP addresses and port numbers Both aggregate-based and flow-based router defense mechanisms can be defeated

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 10 Previous Solutions (cont’d) Router-based defenses like Random Early Drop (RED, RED-PD, etc) can prevent congestion by dropping packets early before congestion  But may drop normal traffic indiscriminately, causing responsive TCP flows to severely degrade Approximate fair dropping schemes aim to provide fair sharing between flows  But attackers can launch many seemingly legitimate TCP connections with spoofed IP addresses and port numbers Both aggregate-based and flow-based router defense mechanisms can be defeated In general, defenses based on unauthenticated header information such as IP addresses and port numbers may not be reliable

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 11 Outline Problem Approach Experimental Results Summary

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 12 Our Solution Provide bandwidth isolation between OD pairs, independent of IP spoofing or number of TCP/UDP connections We call this method Proactive Surge Protection (PSP) as it aims to proactively limit the damage that can be caused by sudden demand surges, e.g. sudden bandwidth-based DDoS attacks

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 13 Traffic received in NY: Seattle: 3 Gb/s Sunnyvale: 3 Gb/s … Basic Idea: Bandwidth Isolation Meter and tag packets on ingress as HIGH or LOW priority  Based on historical traffic demands and network capacity Drop LOW packets under congestion inside network New York Sunnyvale Seattle 10G Seattle/NY: Limit: 3.5 Gb/s Actual: 3 Gb/s All admitted as High HoustonAtlanta Indianapolis Kansas City Sunnyvale/NY: Limit: 3.5 Gb/s Actual: 3 Gb/s All admitted as High Houston/Atlanta: Limit: 3 Gb/s Actual: 2 Gb/s All admitted as High Houston/Atlanta: Limit: 3 Gb/s Actual: 10 Gb/s High: 3 Gb/s Low: 7 Gb/s Proposed mechanism proactively drop attack traffic immediately when attacks occur

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 14 Traffic Data Collector Traffic Data Collector Bandwidth Allocator Bandwidth Allocator Preferential Dropping Preferential Dropping Differential Tagging Differential Tagging Architecture Traffic Measurement Bandwidth Allocation Matrix tagged packets forwarded packets dropped packets Data Plane Policy Plane Deployed at Network Routers Deployed at Network Perimeter arriving packets High priority Low priority Proposed mechanism readily available in modern routers

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 15 Allocation Algorithms Aggregate traffic at the core is very smooth and variations are predictable Compute a bandwidth allocation matrix for each hour based on historical traffic measurements  e.g. allocation at 3pm is computed by traffic measurements during 3-4pm in the past 2 months Source: Roughan’03 on a Tier-1 US Backbone

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 16 Allocation Algorithms To account for measurement inaccuracies and provide headroom for traffic burstiness, we fully allocate the entire network capacity as an utility max-min fair allocation problem  Mean-PSP: based on the mean of traffic demands  CDF-PSP: based on the Cumulative Distribution Function (CDF) of traffic demands Utility Max-min fair allocation  Iteratively allocate bandwidth in “water-filling” manner  Each iteration maximize the common utility of all flows  Remove the flows without residual capacity after each iteration

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 17 Utility Max-min Fair Bandwidth Allocation 5 A 5 5 B 5 C BW BCAB Links 1st round ACAC BW Utility(%) ABAB Utility(%) BW BCBC Utility(%) BW BCAB Links 2nd round Utility functions Network Allocation

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 18 Mean-PSP (Mean-based Max-min) Use mean traffic demand as the utility function Iteratively allocate bandwidth in “water- filling” manner BW BACBBCAB Links 1st round BW BACBBCAB Links 2nd round A B C Mean Demand A B C ABC BW Allocation B ij 10G A B C ABC

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 19 CDF-PSP (CDF-based Max-min) Explicitly capture the traffic variance by using a Cumulative Distribution Function (CDF) model as utility functions Maximize utility is equivalent to minimizing the drop probabilities for all flows in a max-min fair manner BW Utility(%) When allocated 3 unit bandwidth, drop probability is 20%

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 20 Outline Problem Approach Experimental Results Summary

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 21 Networks US Backbone  Large tier1 backbone network in US  ~700 nodes, ~2000 links (1.5Mb/s – 10Gb/s)  1-minute traffic traces: 07/01/07-09/03/07 Europe Backbone  Large tier1 backbone network in Europe  ~900 nodes, ~3000 links (1.5Mb/s – 10Gb/s)  1-minute traffic traces: 07/01/07-09/03/07

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 22 Evaluation Methodology NS2 Simulation Normal traffic: Based on actual traffic demands over 24 hour period for each backbone Attack traffic:  US Backbone: highly distributed attack scenario Based on commercial anomaly detection systems From 40% ingress routers to 25% egress routers  Europe Backbone: targeted attack scenario Created by synthetic attack flow generator From 40% ingress routes to only 2% egress routers

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 23 Packet Loss Rate Comparison USEurope Both PSP schemes greatly reduced packet loss rates Peak hours have higher packet loss rates

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 24 Relative Loss Rate Comparison USEurope PSP reduced packet loss rates by more than 75%

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 25 Behavior Under Scaled Attacks Packet drop rate under attack demand scaled by factor up to 3x Under PSP, the loss remains small throughout the range ! USEurope

USENIX Security Symposium, San Jose, USA, July 30, 2008 – Slide 26 Summary of Contributions Proactive solution for protecting networks that provides a first line of defense when sudden DDoS attacks occur Very effective in protecting network traffic from collateral damage Not dependent on unauthenticated header information, thus robust to IP spoofing Readily deployable using existing router mechanisms

USENIX Security Symposium, San Jose, USA, July 30, 2008 Questions?