Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.

Slides:



Advertisements
Similar presentations
Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Advertisements

Using Edge-To-Edge Feedback Control to Make Assured Service More Assured in DiffServ Networks K.R.R.Kumar, A.L.Ananda, Lillykutty Jacob Centre for Internet.
CIS 459/659 – Introduction to Network Security – Spring 2005 – Class 13 – 4/5/05 1 D-WARD 1  Goal: detect attacks, reduce the attack traffic, recognize.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
The War Between Mice and Elephants By Liang Guo & Ibrahim Matta In Proceedings of ICNP'2001: The 9th IEEE International Conference on Network Protocols,
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann and Christos Papadopoulos presented by Nahur Fonseca NRG, June, 22.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Diffusion Mechanisms for Active Queue Management Department of Electrical and Computer Engineering University of Delaware May 19th / 2004 Rafael Nunez.
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
Traffic Sensitive Active Queue Management - Mark Claypool, Robert Kinicki, Abhishek Kumar Dept. of Computer Science Worcester Polytechnic Institute Presenter.
Defending Against Low-rate TCP Attack: Dynamic Detection and Protection Haibin Sun John C.S.Lui CSE Dept. CUHK David K.Y.Yau CS Dept. Purdue U.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
FTDCS 2003 Network Tomography based Unresponsive Flow Detection and Control Authors Ahsan Habib, Bharat Bhragava Presenter Mohamed.
The War Between Mice and Elephants By Liang Guo (Graduate Student) Ibrahim Matta (Professor) Boston University ICNP’2001 Presented By Preeti Phadnis.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Diffusion Mechanisms for Active Queue Management Department of Electrical and Computer Engineering University of Delaware May 19th / 2004 Rafael Nunez.
Lecture 15 Denial of Service Attacks
Design and Implementation of SIP-aware DDoS Attack Detection System.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
Denial of Service A Brief Overview. Denial of Service Significance of DoS in Internet Security Low-Rate DoS Attacks – Timing and detection – Defense High-Rate,
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Vulnerabilities and Safeguards in Networks with QoS Support Dr. Sonia Fahmy CS Dept., Purdue University.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 2. Network Monitoring Metrics.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
MonNet – a project for network and traffic monitoring Detection of malicious Traffic on Backbone Links via Packet Header Analysis Wolfgang John and Tomas.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
A.SATHEESH Department of Software Engineering Periyar Maniammai University Tamil Nadu.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Distributed Denial of Service Attacks
Bandwidth Distributed Denial of Service: Attacks and Defenses.
EMIST DDoS Experimental Methodology Alefiya Hussain January 31, 2006.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Reviewed by Dave Lim.
Open-Eye Georgios Androulidakis National Technical University of Athens.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Packet-Marking Scheme for DDoS Attack Prevention
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
1 Attacking DDoS at the Source Jelena Mirković, Gregory Prier, Peter Reiher University of California Los Angeles Presentation by: David Allen.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd and Kevin Fall IEEE-ACAM Transactions on Networking, 馬儀蔓.
DoS/DDoS attack and defense
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Early Detection of DDoS Attacks against SDN Controllers
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
Presented by Yu-Shun Wang Advisor: Frank, Yeong-Sung Lin Near Optimal Defense Strategies to Minimize Attackers’ Success Probabilities for networks of Honeypots.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Malicious Packet Dropping: How It Might Impact the TCP Performance
DDoS Attack Detection under SDN Context
Presentation transcript:

Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security Lab. Department of Computer Science and Information Engineering National Chiao Tung University WADIS‘03

2 Outline  Introduction to DDoS attacks.  Current DDoS defense strategies  Review of D-WARD  Proposed DDoS defense scheme  Evaluation  Conclusions and future work

3 DDoS attacks  What is a Denial-of-Service (DoS) attack  Degrade the service quality or completely disable the target service by overloading critical resources of the target system or by exploiting software bugs.  What is a Distributed DoS (DDoS) attack  The objective is the same with DoS attacks but is accomplished by a of compromised hosts distributed over the Internet.

4 Mechanisms against DDoS attacks (1)  Victim-end  Most existing Intrusion detection systems and DoS/DDoS tolerant system design fall in this category.  Used to protect a set of hosts from being attacked.  Advantages and disadvantages  DDoS attacks are easily detected due to the aggregate of huge traffic volume.  From a network’s perspective, protecting is consider ineffective. Attack flows can still incur congestion along the attack path.

5 Mechanisms against DDoS attacks (2)  Infrastructure-based  DDoS defense lines are constructed towards attack sources to reduce network congestion.  Attack packets are filtered out by Internet core routers.  Advantages and disadvantages  The effectiveness of filtering is improved.  An Internet-wide authentication framework is required.  Internet core routers must be upgrade to filter out attack packets in high speeds

6 Mechanisms against DDoS attacks (3)  Source-end  DDoS defense mechanism are used to prevent monitored hosts from participating in DDoS attacks.  Attack packets are dropped at sources. It allows preventing attack traffic from entering the Internet.  Advantages and disadvantages  The effectiveness of packet filter is the best.  It is very hard to identify DDoS attack flows at sources since the traffic is not so aggregate.  It require the support of all edge routers. In summary, source-end DDoS defense strategy is the most effective and with moderate deployment cost.

7 D-WARD: A Source-End DDoS defense scheme  J. Mickovic et al. “Attacking DDoS at the Source,” IEEE ICNP’02  Ideas behind D-WARD: DDoS attack flows can be identified by comparing flow statistics against normal flow models. Signals of DDoS attacks:  High Packet loss rate:  The level of network congestion (or say packet loss rate) reflects on the ratio of number of packets sent to and received from the peer.  High packet sending rate: This may also indicate a DDoS attack  A large number of connections to the peer

8 D-WARD: Architecture

9 D-WARD: Observation Component  Gather per flow statistics  Flow: The aggregate traffic between monitored IP addresses and a foreign IP address.  Observation interval: A basic time frame for one observation  The number of packet and bytes sent to and received from the peer  The number of active connections  Legitimate flow model  TCP flows:  P sent /P rcv < TCP rto (set to 3)  ICMP flows:  P sent /P rcv < ICMP rto (set to 1.1)  UDP flows:  n conn < MAX conn (set to 100)  p conn > MIN pkts (set to 1)  B sent < UDP rate (set to 10MBps)

10 Motivations  Using a global threshold of P sent /P rcv for TCP flows would result in high false positive and high false negative. In the following context, this ratio is denoted as O/I  High false positive  flows with O/I greater than 3 in its normal operation would be classified as attack flows  High false negative  low-rate attacks will not be detected. Consider a flow with O/I =1, then O/I only reaches 2 when the packet loss rate is 50%. In one word, using a single O/I threshold for different flows is problematic.

11 Basic Idea  Ideas behind the proposed scheme  Focus: detecting DDoS attacks based on TCP  96% of current attacks are based on TCP. Only 2% use UDP and 2% use ICMP  The level of “congestion” should be determined according previous behavior of the each monitored flow.  Two more DDoS characteristics are utilized for detecting attacks  Distribution: the number of hosts sending packets to the destination in each observation period  Continuity: reflect to the observation that a DDoS attack always lasts for an extended period of time.

12 Observations on normal traffics (1)  Observation: Average O/I of different flows rage from 3.68 to 0.5  Flows with highest ratio:  Contains one ftp data connection. The flow last for 227 second. Total packet (68158 packet send out, packet send in) The average O/I is Standard deviation=0.16. Packet loss rate is 0%.  Standard deviation of the monitored flow are low (usually smaller 1). It indicates that the O/I value of flows tend to be stable in their normal operation.

13 Observations on normal traffics (2)  Number of sources in each flow  In each observation interval, most of flows have only one source host sending packets to the peer.

14 Proposed DDoS detection scheme  There are two phases in our scheme.  Learning phase: Define legitimate flow model  Detection phase: Detect malicious flows and apply rate limit  Learning phase contains two steps.  Step 1: determine the following thresholds  T f : the maximum allowed O/I.  N f : the mini-threshold of O/I.  c: a parameter used to quantify the level of distribution.  Steps 2: derive other configuration parameters  α: a value indicating the possibility that the flow is malicious. It is generated according to the level of congestion and the level of distribution  α f : the maximum allowed value ofα  t f : the maximum allowed number of the times that αcan continually breaches α f

15 Flow Classification  Four types of traffic flows: Normal, Suspicious, Attack, and Transient.

16 Generation of α  Generating α in an observation interval  S f : : the number of source in the flow.  n f : : the O/I of the current interval.  λ: a magic number used to restrict α between 0 and 1. λ is a number between 0 and 1.  Characteristics of α  It is between 0 and 1  It increases with n f. If n f approaches T f, α approaches to 1  α increases with the number of sources in the flow. Level of congestion The impact of distribution

17 Rate limiting and recovery  Rate-Limiting  rl: imposed rate limit  rate: realized sending rate  Mini-rate: The lowest limited rate which can be imposed on network flows.  Recovery  If the attack flow show compliance with normal flow model for consecutive penalty observation periods, it is classified as transient, the recovery process begins.  Max-rate: Once the rate limit reaches Max-rate, it is classified as normal

18 Thresholds  Configuring thresholds and other parameters:  Observation period = 1 second  T f : The maximum of the observed O/I * 2  N f : the average O/I  c: the maximum number of sources in a flow in the monitored network.  α f : the averageαin the learning process.  t f : the maximum consecutive number of time that αexceeds α f  λ= 0.5  Parameters learned from a monitored flow  Sending rate 10 pkts to the destination host per second. Maximum O/I is 1.25, Average O/I is 1.25  T f : = 2.5, n f = 1.04  c = 3  α f = 0.18  t f = 3

19 Experiments  Types of Experiment  Resource consumption  TCP SYN flooding  link flooding  Attack scenarios  Constant rate attack  Pulsing rate attack  Increasing rate attack  Gradual pulsing attack

20 Topology

21 TCP SYN Flooding Attack

22 SYN flooding: Constant Rate and Pulsing Rate

23 SYN flooding Increasing Rate and Gradual Increasing Rate

24 Link Overloading

25 Bandwidth flooding Constant Rate and Pulsing Rate constant pulsing

26 Bandwidth flooding Increasing Rate and Gradual Increasing Rate increasinggradual increasing

27 Conclusion  The O/I used to define the level of network congestion must be determined according to the previous behavior of the flow.  The number of source in the flow and the number of observation intervals that the signal of DDoS attacks lasts should be taken into consideration.  Evaluation results show that the performance of proposed system is better than D-WARD, in terms of false positive and false negative.

28 Future work  More experiments on estimating the effectiveness of the proposed scheme are required  A mechanism that can deal with new flows which are not in the flow profile database  A space-effective mechanism that helps to reduce the storage requirement for storing the profiles of flows.  Schemes which can detect DDoS attacks based on one-way flows such as ICMP and UDP.