Resisting Denial-of-Service Attacks Using Overlay Networks Ju Wang Advisor: Andrew A. Chien Department of Computer Science and Engineering, University.

Slides:



Advertisements
Similar presentations
Software-defined networking: Change is hard Ratul Mahajan with Chi-Yao Hong, Rohan Gandhi, Xin Jin, Harry Liu, Vijay Gill, Srikanth Kandula, Mohan Nanduri,
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
October 31st, 2003ACM SSRS'03 Tolerating Denial-of-Service Attacks Using Overlay Networks – Impact of Topology Ju Wang 1, Linyuan Lu 2 and Andrew A. Chien.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 A Preamble into Aligning Systems Engineering and Information Security Risk Dr. Craig.
Secure Real Time Embedded Systems Sherif Khattab and Daniel Mossé University of Pittsburgh Computer Science Department.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
The Phoenix Recovery System: Rebuilding from the ashes of an Internet catastrophe Flavio Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, and.
1 GENI: Global Environment for Network Innovations Jennifer Rexford Princeton University
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Enhanced Secure Dynamic DNS Update with Indirect Route David Wilkinson, C. Edward Chow, Yu Cai 06/11/2004 University of Colorado at Colorado Springs IEEE.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Norman SecureSurf Protect your users when surfing the Internet.
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
1. SOS: Secure Overlay Service (+Mayday) A. D. Keromytis, V. Misra, D. Runbenstein Columbia University Presented by Yingfei Dong.
TRUST, Autumn 2010 Conference, November 10-11, 2010 Simulation of Network Attacks on SCADA Systems Rohan Chabukswar, Bruno Sinopoli, Gabor Karsai, Annarita.
Dynamic Network Emulation Security Analysis for Application Layer Protocols.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Stamping out worms and other Internet pests Miguel Castro Microsoft Research.
University of California, San Diego Computer Science and Engineering Concurrent Systems Architecture Group Agile Objects: Component-based Inherent Survivability.
COLUMBIA UNIVERSITY Department of Electrical Engineering The Fu Foundation School of Engineering and Applied Science IN THE CITY OF NEW YORK Networking.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
An Analysis of Location-Hiding Using Overlay Networks Ju Wang and Andrew A. Chien Department of Computer Science and Engineering, University of California.
(CISCO) Self-Defending Networks Ben Sangster. Agenda (CISCO) Self-Defending Network Concept Why do we need SDN’s? Foundation of the CSDN? Endpoint Protection.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
SOS: Secure Overlay Services A.Keromytis, V. Misra, and D. Rubenstein Presented by Tsirbas Rafail.
Stamping out worms and other Internet pests Miguel Castro Microsoft Research.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
University of California, San Diego Computer Science and Engineering Concurrent Systems Architecture Group Agile Objects: Component-based Inherent Survivability.
Random Graph Generator University of CS 8910 – Final Research Project Presentation Professor: Dr. Zhu Presented: December 8, 2010 By: Hanh Tran.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Resilient Overlay Networks Robert Morris Frans Kaashoek and Hari Balakrishnan MIT LCS
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Research Direction Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan 2010/10/211NTUIM OPLAB.
Grid Defense Against Malicious Cascading Failure Paulo Shakarian, Hansheng Lei Dept. Electrical Engineering and Computer Science, Network Science Center,
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
DoS/DDoS attack and defense
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
SOS: An Architecture For Mitigating DDoS Attacks Authors: Angelos D. Keromytis, Vishal Misra, Dan Rubenstein. Published: ACM SIGCOMM 2002 Presenter: Jerome.
RobuSTore: Performance Isolation for Distributed Storage and Parallel Disk Arrays Justin Burke, Huaxia Xia, and Andrew A. Chien Department of Computer.
TRUST Self-Organizing Systems Emin G ü n Sirer, Cornell University.
2016/3/13 1 Peer-to-peer system-based active worm attacks: Modeling, analysis and defense Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan Computer Communications.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
MicroGrid Update & A Synthetic Grid Resource Generator Xin Liu, Yang-suk Kee, Andrew Chien Department of Computer Science and Engineering Center for Networked.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Network Processing Systems Design
A Viewpoint-based Approach for Interaction Graph Analysis
MadeCR: Correlation-based Malware Detection for Cognitive Radio
Threats to computers Andrew Cormack UKERNA.
Determined Human Adversaries: Mitigations
An Original Model of Infrastructure System Resilience
Determined Human Adversaries: Mitigations
Presentation transcript:

Resisting Denial-of-Service Attacks Using Overlay Networks Ju Wang Advisor: Andrew A. Chien Department of Computer Science and Engineering, University of California San Diego Denial-of-Service Attacks Summary and Status Denial-of-Service (DoS) is a critical security problem –Attack important websites (yahoo, Amazon, etc) –Economic impact and political repercussions –DoS attacks are on the rise Attackers prevent legitimate users from receiving service –Application level: large work load to overload applications –Infrastructure level: direct attack on the application physical infrastructure (e.g. traffic flood) Internet Internet Application Service Infrastructure Legitimate User Attacker Overlay (proxy) networks protect applications from infrastructure level DoS attacks –Location Hiding: mediate communication between users and applications without disclosing applications’ IP addresses –DoS Resilience: maintain proxy network connectivity to tolerate massive proxy node failure due to DoS attacks, keeping applications accessible to users Overlay (Proxy) Network Approach Application Legitimate User Proxy Network Attacker where? Location-Hiding –Can proxy networks achieve location-hiding? If so, under what circumstances? (feasibility) –How long will it take attackers to reveal application location? (metrics for goodness) –How do properties of defense & proxy networks affect location-hiding? (parametric) Resource recovery Proxy network reconfiguration Proxy network topology DoS Resilience and Performance –How well can proxy networks resist DoS attacks? –What is the performance impact of proxy networks? Problems Generic Framework for Location-Hiding Resource Pool Application Proxy Network User Attacker Proxy Network Layered View User Edge Proxy Proxy Resource Pool (IP Network) Host Proxy Network Application Attacker Overlay Proxy Network Top View Attack Model Proxies: software components run on hosts Proxies adjacent: iff their IP addresses are mutually known Proxy Network Topology: adjacency structure Only edge proxies publish their IP addresses Users access applications via edge proxies Goal: reveal application location (IP address) Compromise hosts and reveal (expose) location of adjacent proxies Penetrate proxy network based on exposed location information Consider correlated host vulnerabilities Defense Model Goal: recover compromised hosts, invalidate information attackers acquired Resource recovery –Recover compromised hosts –Reactive recovery: detection-triggered –Proactive reset: periodic reload/security patch Proxy network reconfiguration –Invalidate information attackers acquired –E.g. proxy migration Compromised Exposed Intact Proxy state transition Infrastructure level DoS Attack System state change as a stochastic process Rate of host compromises True-positiveness and speed of reactive recoveries Rate of proactive resets Rate of proxy migrations Correlation among host vulnerabilities Topology of proxy networks Analytical Model Compromised Intact Host state transition Impact of attack Impact of defense Feasibility of Location-Hiding No reconfiguration Log scale Linear scale Without reconfiguration, proxy networks cannot hide location With sufficient proxy migration, location-hiding is feasible Without correlated host vulnerabilities, the time to penetrate a proxy network grows exponentially with its depth Interleave proxies on diversified hosts Correlated host vulnerability has qualitative impact; with high correlation, time to penetrate a proxy network grows sub-linearly with its depth Exploit limited host diversity (below) to effectively contain this impact (behaves similarly to the uncorrelated case) Impact of Topology on Location-Hiding Robust (favorable) Vulnerable (unfavorable) Overlay Topologies Good or robust topologies: hard to penetrate and defenders can easily defeat attackers Bad or vulnerable topologies: attackers can quickly propagate and remain inside the proxy network      ,, ,, ,,,, ,, bad good Theorem of Robustness Average degree  1 of G is smaller than the ratio of speed between defenders and attackers:  (  +  )/  >  1,  is speed of attack,  and  are speed of defense - Even if many nodes are initially compromised, attackers’ impact can be quickly removed in O(logN) steps - Low average degrees are favorable Theorem of Vulnerability Neighborhood expansion property  of G is larger than the ratio of speed between defenders and attackers:  >  /  - Even if only one node is initially exposed, attackers’ impact quickly propagate, and will linger forever (applies to all sub-graphs) - Large clusters (tightly connected sub-graphs) are unfavorable hard to beat attackers inside the cluster This work is supported in part by the National Science Foundation under awards NSF EIA Grads and NSF Cooperative Agreement ANI (OptIPuter), NSF CCR (VGrADS), NSF NGS , and NSF Research Infrastructure Grant EIA Support from Hewlett-Packard, BigBangwidth, Microsoft, and Intel is also gratefully acknowledged. Location-Hiding: finished analytical and simulation study –Proxy networks are a feasible approach for location- hiding to resist host compromise penetration attacks –Proxy network depth and reconfiguration rate are keys to location-hiding; existing schemes (e.g. SOS, i3) employing static structures cannot hide location because attackers gain information monotonically –Two theorems to characterize robust and vulnerable topologies for location-hiding; find popular overlays (e.g. Chord) not favorable DoS Resilience & Performance: –Simulation testbed: MicroGrid Internet emulator –A prototype proxy network implementation –A real app: apache, a real DoS attack tool “Trinoo” –Study performance impact and how distribution and intensity/magnitude of DoS attack affect user observed delay and service disruption Neighborhood expansion In both figures, is host compromise rate, µ r is proxy migration rate Domain corresponds to host diversity