1. SOS: Secure Overlay Service (+Mayday) A. D. Keromytis, V. Misra, D. Runbenstein Columbia University Presented by Yingfei Dong.

Slides:



Advertisements
Similar presentations
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
Advertisements

Quiz 1 Posted on DEN 8 multiple-choice questions
October 31st, 2003ACM SSRS'03 Tolerating Denial-of-Service Attacks Using Overlay Networks – Impact of Topology Ju Wang 1, Linyuan Lu 2 and Andrew A. Chien.
CIS 459/659 – Introduction to Network Security – Spring 2005 – Class 13 – 4/5/05 1 D-WARD 1  Goal: detect attacks, reduce the attack traffic, recognize.
Phalanx: Withstanding Multimillion-Node Botnets Colin Dixon Arvind Krishnamurthy Tom Anderson University of Washington NSDI 2008.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Firewalls and Intrusion Detection Systems
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
15-441: Computer Networking Lecture 26: Networking Future.
1 SOS: Secure Overlay Services Angelos Keromytis, Dept. of Computer Science Vishal Misra, Dept. of Computer Science Dan Rubenstein, Dept. of Electrical.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Towards a More Functional and Secure Network Infrastructure Dan Adkins, Karthik Lakshminarayanan, Adrian Perrig (CMU), and Ion Stoica.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
3/30/2005 Auburn University Information Assurance Lab 1 Simulating Secure Overlay Services.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Sample Research Defenses Packetscore Pushback Traceback SOS Proof-of-work systems Human behavior modeling SENSS.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
FIREWALL Mạng máy tính nâng cao-V1.
Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
Resisting Denial-of-Service Attacks Using Overlay Networks Ju Wang Advisor: Andrew A. Chien Department of Computer Science and Engineering, University.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
SOS: Secure Overlay Services A.Keromytis, V. Misra, and D. Rubenstein Presented by Tsirbas Rafail.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Resilient Overlay Networks Robert Morris Frans Kaashoek and Hari Balakrishnan MIT LCS
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Hiral Chhaya CDA 6133.
DoS/DDoS attack and defense
1 Firewalls Chapter 5 Copyright Prentice-Hall 2003.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
SOS: An Architecture For Mitigating DDoS Attacks Authors: Angelos D. Keromytis, Vishal Misra, Dan Rubenstein. Published: ACM SIGCOMM 2002 Presenter: Jerome.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
K. Salah1 Security Protocols in the Internet IPSec.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
CONNECTING TO THE INTERNET
Defending Against DDoS
Introduction to Networking
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
* Essential Network Security Book Slides.
Advanced Computer Networks
Presentation transcript:

1. SOS: Secure Overlay Service (+Mayday) A. D. Keromytis, V. Misra, D. Runbenstein Columbia University Presented by Yingfei Dong

2 Motivations  Goal: Proactively Prevent DOS attacks to allow legitimate users to communicate with a critical target  DOS attacks try to stop the communication  The target is difficult to replicate –e.g., high security or dynamic contents  Legitimate users are mobile ( IP addresses are not fixed )  Motivation Applications: Emergency Response Teams (ERTs)  Phone Networks are easy to be crashed  FBI/Police/Fire dept contacts with a center database Bank users / stock brokers access their accounts On-line transactions  Application Requirements –Protect private communications on top of public networks –Authenticated Mobile Users

3 Denial Of Service (DOS) Attacks  DOS  Select a target to degrade its performance  Generate “high volume” traffic to the target –Use up network resources bandwidth, buffers *Packet flooding: for a 10Mbps-link, byte packets –Overload CPU with security-checking or kernel resources *Security Handshaking *TCP SYN flooding: holding all TCP control blocks *Force to a server fork many processes  SOS is not for general DOS attacks  Not for global traffic analysis  A number of authenticated users to communicate with a selected target on a public network

4 Related Work ParticipationGlobal Routers changesLocal filters at end-systems or routers Detect/Prevent Spoofing Router-based filtering, Ingress filtering IP traceback Identify/shutdown ongoing attacks IP pushback Rate-limiting Pattern matching and filtering Proactively Prevent attacks IPsec (in each step)SOS Less implementation costs More Secure

5 Players in SOS  Target  Node / Server protected by SOS from DOS  Fixed IP address, non-duplicable  Legitimate User  Authenticated Users communicate with the target  Mobile IP address  Attacker  Try to stop users to communicate with the target  Limited Capability: not draging down core routers

6 Basic Idea  Why DOS is effective? many-to-one  Solution: hiding paths to the target through a large- scale distributed filter  Difficult to do because –The Internet is an open architecture and will keep open –IP spoofing is easy and Ingress filters are not broadly deployed, …  Idea: Forwarding secure packets on a virtual overlay network on top of the Internet –Secure packets are forwarded between overlay nodes –Using a larger number of overlay nodes –Overlay network adapts to attacks quickly  Attackers must attack many nodes to be successful !

7 SOS Functionalities  Goals  Allow legitimate users to communicate with target  Prevent packets from illegitimate attackers to reach the target  Ideal Solution  No changes required in intermediate routers  No high-cost security checking near/at the target  Assumptions  Attackers have a limited number of resources  Attackers cannot drag down core routers –Does NOT solve the general DoS problem

8 Method 1: Source-Address Filtering  Routers near the target do simple filtering based on source IP addresses  Only packets from legitimate nodes can reach the target  Packets from other sources are dropped  Fast Light-weight authenticator  Routers are difficult to hack  Problems  Attackers obtain an account on a legitimate node  Attackers spoof packets with a legitimate src IP  Legitimate users are mobile and don’t have fixed IPs

9 Method 2: Filters + Proxy Servers  Idea:  A proxy server between a legitimate user and the target  The proxy only forwards authenticated packets  Only packets from the proxy can reach the target  Problems  Once attackers know the IP of a proxy, x.x.x.x they can spoof packets with x.x.x.x and reach the target  Attackers directly attack on the proxy to drag it down

10 Method 3: Filters + Secret Proxy Servers  Hiding the identity (IP address) of a proxy to prevent IP spoofing or attacks aiming at a proxy  Secret Servlet is a hidden proxy is chosen by the target  A filter only allows packets whose source address matches n  N s, a set of nodes selected  Only the target, secret servelets, and other few trusted nodes know the IP address of secret servlets  Attacker is not sure which node is a proxy for the target

11 Method 4: Filter + Secret Proxy + Overlay Routing + SOAP  Question: How to forward packets to a Secret Servlet without knowing its IP address?  Virtual Overlay Network  Each node is an end host  Only some nodes how to reach a proxy (Servlet)  Indirect Assumption: large number of nodes  attackers couldn’t monitor all overlay nodes  Service Overlay Access Points (SOAP’s)  Everyone knows a set of SOAP’s  An SOAP is an entry node to the overlay network  Receive and verify traffic via IPSec/TLS  A large number of SOAPs as a distributed firewall User  SOAP  across overlay  Secret Servlet  Target

12 Overlay Routing: SOAP  Servlet  Target  A Path from a SOAP to a Servlet must be hard to find  Random Walk: O(N/N s ) time, N is total # of overlay nodes, Ns is the # of Servlet  Chord: O( log N )  A path must be resilient to attacks, fast recovery

13 Dynamic Hash Table (DHT)  Examples: Chord, CAN, PASTRY, Tapestry, …  Chord  A distributed protocol with N homogenous overlay nodes  Each node has a node identifier  Each object has an object key  Distribute all object keys to N nodes: the object with key T is mapped to node B, if H(T) = B, where object T is managed by node B  Chord Property: To find key T from any node to B is O(logN) steps

14 A Beacon Connects a SOAP and a Servlet  An object key in SOS is the IP address of a target  Beacon B for IP address T is an overly node with an identifier B = H(T)  Secret Servlet S finds Beacon B by B = H(T), and tells it to forward packets with DST T from B to S  SOAP A also finds Beacon B by B = H(T), and forwards secure packets with DST T to B  Multiple hash functions produce different Beacons, i.e., different paths to the target.

15 Routing Summary  Target T randomly selects Secret Servlet S  Secret Servlet S informs Beacon B to forward packets with DST T to S  SOAP A forwards authenticated packets with DST T to B  Overlay nodes are known to the public but their roles are secret  Communications between overlay nodes are secure/authenticated  Packets are authenticated by SOAP before the overlay

16 Against the DoS attacks  Redundancy in SOS  Every overlay node can be SOAP, Beacon or Servlet  A target can select multiple Servlets  Multiple beacons can be used by using different hashes  Many SOAP’s User  SOAP  Beacon  Servlet  Target  Attacks on an overlay node Chord self-heals by removing the node from Chord  Attacks on all SOAP’s, otherwise an alternative SOAP exists  Attacks on all Beacons: remove the nodes and change hash functions  Attacks on all Servlets The target can real-time change the set of Servlets  Target is protected by filters

17 Static Attack Analysis  N nodes in the overlay  For a given target T  S is the number of Servlets  B is the number of Beacons  A is the number of SOAPs  Static Attacks: attackers randomly shutdown M out of N nodes  P static = P(N, M, S, B, A) = P{stop communications with T}  P(n,b,c) = P{set of b nodes chosen randomly from set of n nodes, and set of b nodes contains set of c nodes}

18 Successfully Attack all Servlets or all Beacons or all SOAPs Number of nodes attacked P static = P(N, M, S, B, A)= 1 – (1-P(N,M,S))(1-P(N,M,B))(1-P(N,M,A)) Prob Of Attack Success

19 Dynamic Attacks  Attack/Repair Battle  The Overlay removes attacked nodes, taking time T R  Attackers shifts attacking traffic from removed nodes to active nodes, taking time T A  Assume T R and T A are exponential distributed R.V., modeled as a birth-death process  Attacking rate  Repairing rate   Attack Load Ratio  = / 

20 Centralized Attacks and Centralized Recovery M/M/1/K 1000 nodes, 10 SOAP, 10 Beacons, 10 Servlets If repairing is faster then attacking, SOS can survive under large scale attacks

21 Centralized Attacks and Distributed, M/M/K/K

22 Distributed Attacks and Centralized Recovery M/M/1//K

23 Distributed Attacks and Distributed Recovery, M/M///K

24 Conclusions  SOS protects a target from DOS  Only legitimate traffic will reach the target  Approach  Ingress Filtering  Hidden Proxies  Self-healing overlay networks to defeat attacks  Preliminary Analysis  Static Attacks  Dynamic Attacks

25 Mayday  Goal: protect critical servers  Components  A Server: centralized resource  A Filter Ring: around the server to protect it –Edge routers of a domain  An Overlay network –An Overlay node can be *an ingress point of the overlay network (SOAP) *an egress point from the overlay network to the filter ring (Servlet) *a forwarding node of the overlay network  A Client is authenticated by an overlay node but not trusted

26 Mayday Architecture

27 Generalizing the Idea of SOS  Packet Authenticators at a filter (mostly in IP header)  Egress Sources IP Address (SOS)  Server Destination Port: 1 to 65,536, large search space  Server Destination Address: 1 out of N reserved IP addresses, (like VPN shield)  Application-defined: ok with firewall, not core routers  Overlay routing schemes  Proximity Routing: proxies close to client, filter is known  Singly-Indirect Routing: egress address is known  Double-Indirect Routing (SOS)  Random Walk  Mix Routing: each node only know next step

28 Summary  SOS provides formal analysis  Mayday discusses potential practical solutions  Discussion of Advanced attacking approaches  Questions:  Long Delay in overlay routing  Trust of overlay nodes  Repair Speed v.s. Attacking Rate