1 Defense Strategies for DDoS Attacks Steven M. Bellovin

Slides:



Advertisements
Similar presentations
On the Necessity of Handling DDoS Traffic in the Middle of the Network Peter Reiher UCLA Computer Communications Workshop October 22, 2008.
Advertisements

Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Firewalls and Intrusion Detection Systems
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
1 Controlling High Bandwidth Aggregates in the Network.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
July 2008IETF 72 - NSIS1 Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-01 Se Gi Hong & Henning Schulzrinne.
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
Examining IP Header Fields
DDoS Attack Prevention by Rate Limiting and Filtering d’Artagnan de Anda CS239 Network Security 26 Apr 04.
John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff
04/12/2001ecs289k, spring ecs298k Distributed Denial of Services lecture #5 Dr. S. Felix Wu Computer Science Department University of California,
Controlling High Bandwidth Aggregates in the Network Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker AT&T.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
ARP Spoofing Attacks Dr. Neminath Hubballi IIT Indore © Neminath Hubballi.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
10 Semester 1 JEOPARDY Frank Mann LayersPathsPathsSubnetsSubnetsClassesClassesReservedReserved
Distributed Denial of Service Attacks
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Today’s topic –Broadcast and multicast –Send/receive broadcast and multicast packets.
Packet-Marking Scheme for DDoS Attack Prevention
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
ACCESS CONTROL LIST.
Tracking Rejected Traffic.  When creating Cisco router access lists, one of the greatest downfalls of the log keyword is that it only records matches.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
DDoS Defense: Utilizing P2P architecture By Joshua Aslan Smith.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
1 Host versus Network Security Steven M. Bellovin
Protecting Multicast- Enabled Networks Matthew Davy Indiana University Matthew Davy Indiana University.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Computer Network Security Dr. X. OSI stack… again.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Network Security Mechanisms
Binary Lesson 4 Classful IP Addresses
Error and Control Messages in the Internet Protocol
Click to edit Master subtitle style
Defending Against DDoS
Who should be responsible for risks to basic Internet infrastructure?
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Binary Lesson 5 Classful IP Addresses
Defending Against DDoS
Preventing Denial of Service Attacks
ISMS Information Security Management System
Firewalls Routers, Switches, Hubs VPNs
DDoS Attack and Its Defense
Outline The spoofing problem Approaches to handle spoofing
Session 20 INST 346 Technologies, Infrastructure and Architecture
Outline The concept of perimeter defense and networks Firewalls.
Presentation transcript:

1 Defense Strategies for DDoS Attacks Steven M. Bellovin

2 A Real Network Security Issue Most “network security” problems are nothing of the sort. They’re host vulnerabilities; the network is just an access vehicle. –Without the net, could a local user exploit the hole? DDoS is the network’s problem.

3 Implications Host vendors can’t fix it. Firewalls can’t stop it. It’s a network problem; the response must come from the network.

4 Response Classes Packet authentication –Find out who is sending the packets “Flow” identification –If we can identify it, can we control it? –Can we withhold authorization?

5 Packet Identification: Filtering Block packets with forged source address. Identifies site (and maybe LAN) that stuff is coming from. Granularity of filter is an issue. Can anyone cope with knowing 1000 attacking sites?

6 Source Identification Schemes Have network elements -- routers, switches, etc. -- identify packets of interest. Packet-marking -- set bits in packet header Logging -- notify NOC Tracers -- send extra packets to destination, identifying path

7 Prevention Must rate-limit “evil” packets. –But no “evil” bit in the header... Could try to limit all packets, but the Internet isn’t built that way. Possibility: limit packets towards victim, from high-bandwidth predecessor. Apply algorithm recursively.

8 Router Pushback Use existing mechanisms to find ill- behaving traffic towards some destination. Identify previous router hops for such traffic; tell them to rate-limit packets to your for that destination. If they’re dropping packets, they tell their upstream neighbors. Note: pushback eventually shows traffic source.