The Crossfire Attack MIN SUK KANG, SOO BUM LEE, VIRGIL D. GLIGOR ECE DEPARTMENT AND CYLAB CARNEGIE MELLON UNIVERSITY 2013 IEEE Symposium on Security and.

Slides:



Advertisements
Similar presentations
Phillipa Gill, Yashar Ganijali Dept. of CS University of Toronto Bernard Wong Dept. of CS Cornell University David Lie Dept. of Electrical and Computer.
Advertisements

Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Firewalls and Intrusion Detection Systems
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
University of Massachusetts at Amherst 1 Flooding Attacks by Exploiting Persistent Forwarding Loops Jianhong Xia, Lixin Gao and Teng Fei University of.
DDoS Defense by Offense Presented by: Matthew C.H. Ma Damon Chan.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Web server security Dr Jim Briggs WEBP security1.
Link Flooding DDoS Attack
Networking with Windows Vista.. Vista’s New Tools and Features The Network and Sharing Center Network Discovery Network Map Network Diagnostics.
COEN 252: Computer Forensics Router Investigation.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 Performance Evaluation of Ring- based Peer-to-Peer Virtual Private Network (RING-P2P-VPN) Hiroyuki Ohsaki Graduate School of Information Sci. & Tech.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Introduction to Honeypot, Botnet, and Security Measurement
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
The Security Aspect of Social Engineering Justin Steele.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
6/1/991 Internetworking connectionless and connection-oriented networks Malathi Veeraraghavan Mark Karol Polytechnic UniversityBell Laboratories
Ethics of Distributed DoS (Why TFN is Evil) March 2, 2000 Mintcho Petkov Dartmouth College.
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Thomas Ristenpart,Eran Tromer, Horav Shahcham and Stefan Savage
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
DoS attacks on transit network - David Harmelin ( ) Denial of Service attacks on transit networks David Harmelin DANTE.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
CINBAD CERN/HP ProCurve Joint Project on Networking 26 May 2009 Ryszard Erazm Jurga - CERN Milosz Marian Hulboj - CERN.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Design and implementation of SIP-aware DDoS attack detection system By: Arif Iqbal.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Open-Eye Georgios Androulidakis National Technical University of Athens.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
An Application of VoIP and MPLS Advisor: Dr. Kevin Ryan
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University DATA CLASSIFICATION FOR CLASSIFIER.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
DoS/DDoS attack and defense
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
6/1/991 Internetworking connectionless and connection-oriented networks Malathi Veeraraghavan Mark Karol Polytechnic UniversityBell Labs.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Lab 2: TCP IP Attacks ( Indirect)
Firewalls Purpose of a Firewall Characteristic of a firewall
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Types of topology. Bus topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly.
Presentation transcript:

The Crossfire Attack MIN SUK KANG, SOO BUM LEE, VIRGIL D. GLIGOR ECE DEPARTMENT AND CYLAB CARNEGIE MELLON UNIVERSITY 2013 IEEE Symposium on Security and Privacy

Outline INTRODUCTION THE CROSSFIRE ATTACK ATTACK PERSISTENCE AND COST EXPERIMENT SETUP AND RESULTS RELATED WORK CONCLUSION 2

Outline INTRODUCTION THE CROSSFIRE ATTACK ATTACK PERSISTENCE AND COST EXPERIMENT SETUP AND RESULTS RELATED WORK CONCLUSION 3

INTRODUCTION – Old DDoS  Typical attack:  floods server with HTTP, UDP, SYN, ICMP…… packets  Persistence:  Maximum: 2.5 days  Average: 1.5days  Adversary’s Challenge:  DDoS Attacks are either Persistent or Scalable to N Servers  N traffic to 1 server => high-intensity traffic triggers network detection  Detection not triggered => low-intensity traffic is insufficient for N srevers 4

INTRODUCTION – Crossfire Attack  Link flooding by botnets cannot be easily countered  Spoofed IP addresses.  Can flood links without using unwanted traffic.  Launch an attack with low-intensity traffic flows that cross a targeted link at roughly the same time and flood it. 5

 A link-flooding attack that degrades/cuts off network connections of scalable N-server area persistently.  Scalable N-Server areas  N = small(e.g., servers), medium(e.g., all servers in a US state), large(e.g., the West Coast of the US)  Persistent:  Attack traffic is indistinguishable from legitimate  Low-rate, changing sets of flows  Attack is “ moving target ” for same N-server area  Changing target links before triggering alarms INTRODUCTION – Crossfire Attack 6

INTRODUCTION – Definitions 7

 Attack flows => Indistinguishable from legitimate INTRODUCTION – 1 link crossfire 8

 Attack flows => Alarms not triggered INTRODUCTION – 1 link crossfire link-failure detection latency, Interior Gateway Protocol(IGP) routers (OSPF) Default waiting time: 40sec, Failure detection: 217 sec Exterior Gateway Protocol(EGP) routers(BGP) Default waiting time: 180sec, Failure detection : 1,076 sec 9

Outline INTRODUCTION THE CROSSFIRE ATTACK ATTACK PERSISTENCE AND COST EXPERIMENT SETUP AND RESULTS RELATED WORK CONCLUSION 10

THE CROSSFIRE ATTACK 11

 Public servers :  To construct an attack topology centered at target area  Decoy servers:  To create attack flow THE CROSSFIRE ATTACK 12

ATTACK - Step 1 : Link Map Construction ( 72% ) (1) Traceroute ( B->S ) (2) Link-Persistence 13

ATTACK - Step 2 : Attack setup (1) Flow-Density Computation (2) Target-Link Selection DR: Degradation Ratio 14

ATTACK - Step 3 : Bot Coordination (1) Attack-Flow Assignment (2) Target-Link Flooding 15

Outline INTRODUCTION THE CROSSFIRE ATTACK ATTACK PERSISTENCE AND COST EXPERIMENT SETUP AND RESULTS RELATED WORK CONCLUSION 16

ATTACK PERSISTENCE AND COST  Data-Plane-Only Attack : Indefinite Duration  Link failure detection  Traffic engineering  Proactive Attack Techniques : Rolling Attack  Maintaining the same target links  Changes bot and decoy servers  Maintaining the same target area  Changes target links 17

 Attack bots available from Pay-per Install (PPI) markets [2011] ATTACK PERSISTENCE AND COST In experiments : 49% in US or UK, 37% in Europe, 14% rest of the world 10 target links : can be as low as 107,200 bots. Cost approximately $9K 18

Outline INTRODUCTION THE CROSSFIRE ATTACK ATTACK PERSISTENCE AND COST EXPERIMENT SETUP AND RESULTS RELATED WORK CONCLUSION 19

EXPERIMENT SETUP AND RESULTS  Bots:  1,072 traceroute nodes 620 PlanetLab nodes, 452 LG(Looking Glass) servers 20

EXPERIMENT SETUP AND RESULTS  Decoy servers:  552 institutions (i.e., universities and colleges ) on both the East Coast (10 states) and West Coast (7 states) of the US  2737 public web servers within Univ1 in Pennsylvania  7411 public web servers within Univ2 in Massachusetts 21

EXPERIMENT SETUP AND RESULTS  Target Areas: 22

EXPERIMENT SETUP AND RESULTS 23

EXPERIMENT SETUP AND RESULTS  Link map  Run a traceroute six times to diagnose link persistence 24

EXPERIMENT SETUP AND RESULTS 25

EXPERIMENT SETUP AND RESULTS  Average rate when flooding 10 Target Links against Pennsylvania 26

Outline INTRODUCTION THE CROSSFIRE ATTACK ATTACK PERSISTENCE AND COST EXPERIMENT SETUP AND RESULTS RELATED WORK CONCLUSION 27

The Coremelt Attack 28

“Spamhaus” Attack 29

RELATED WORK 30

Outline INTRODUCTION THE CROSSFIRE ATTACK ATTACK PERSISTENCE AND COST EXPERIMENT SETUP AND RESULTS CONCLUSION 31

CONCLUSION  Attack Characteristics  Undetectability at the Target Area.  Indistinguishability of Flows in Routers  Persistence  Flexibility  New DDoS Attack: The Crossfire Attack  Scalable & Persistent  Internet-scale experiment  Feasibility of the attack  High impact with low cost 32

Q&A 33