Distributed Denial-of-Service Attack Detection (and Mitigation?) Mukesh Agarwal, Aditya Akella, Ashwin Bharambe.

Slides:



Advertisements
Similar presentations
IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
Advertisements

Florin Dinu T. S. Eugene Ng Rice University Inferring a Network Congestion Map with Traffic Overhead 0 zero.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Data Streaming Algorithms for Accurate and Efficient Measurement of Traffic and Flow Matrices Qi Zhao*, Abhishek Kumar*, Jia Wang + and Jun (Jim) Xu* *College.
A Fast and Compact Method for Unveiling Significant Patterns in High-Speed Networks Tian Bu 1, Jin Cao 1, Aiyou Chen 1, Patrick P. C. Lee 2 Bell Labs,
Efficient Constraint Monitoring Using Adaptive Thresholds Srinivas Kashyap, IBM T. J. Watson Research Center Jeyashankar Ramamirtham, Netcore Solutions.
Detecting DDoS Attacks on ISP Networks Ashwin Bharambe Carnegie Mellon University Joint work with: Aditya Akella, Mike Reiter and Srinivasan Seshan.
MULTOPS A data-structure for bandwidth attack detection Thomer M. Gil Vrije Universiteit, Amsterdam, Netherlands MIT, Cambridge, MA, USA
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
XCP: Congestion Control for High Bandwidth-Delay Product Network Dina Katabi, Mark Handley and Charlie Rohrs Presented by Ao-Jan Su.
Streaming Algorithms for Robust, Real- Time Detection of DDoS Attacks S. Ganguly, M. Garofalakis, R. Rastogi, K. Sabnani Krishan Sabnani Bell Labs Research.
Network Protocols Designed for Optimizability Jennifer Rexford Princeton University
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 17/04/2007.
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Impact of BGP Dynamics on Intra-Domain Traffic Patterns in the Sprint IP Backbone Sharad Agarwal, Chen-Nee Chuah, Supratik Bhattacharyya, Christophe Diot.
Measurement and Monitoring Nick Feamster Georgia Tech.
User-level Internet Path Diagnosis R. Mahajan, N. Spring, D. Wetherall and T. Anderson.
ANOMALY DETECTION AND CHARACTERIZATION: LEARNING AND EXPERIANCE YAN CHEN – MATT MODAFF – AARON BEACH.
On Multi-Path Routing Aditya Akella 03/25/02. What is Multi-Path Routing?  Dynamically route traffic Multiple paths to a destination Path taken dependant.
Hash-Based IP Traceback Alex C. Snoeren, Craig Partidge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Not All Microseconds are Equal: Fine-Grained Per-Flow Measurements with Reference Latency Interpolation Myungjin Lee †, Nick Duffield‡, Ramana Rao Kompella†
NET-REPLAY: A NEW NETWORK PRIMITIVE Ashok Anand Aditya Akella University of Wisconsin, Madison.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
CRIO: Scaling IP Routing with the Core Router-Integrated Overlay Xinyang (Joy) Zhang Paul Francis Jia Wang Kaoru Yoshida.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
{vp, sra, Security in Differentiated Services Networks Venkatesh Prabhakar Srinivas R.
Pi : A Path Identification Mechanism to Defend against DDos Attacks.
Measuring ISP Toplogies with Rocketfuel Neil Spring, Ratul Mahajan, and David Wetherall Presented By: David Deschenes March 25, 2003.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Lecture 15. IGP and MPLS D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2015.
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic Minho Sung Networking & Telecommunications Group College.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Distributed Denial of Service Attacks
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Open-Eye Georgios Androulidakis National Technical University of Athens.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
Efficient Cache Structures of IP Routers to Provide Policy-Based Services Graduate School of Engineering Osaka City University
SafeGuard: Safe Forwarding during Route Changes Ang Li†, Xiaowei Yang†, and David Wetherall‡ †Duke University ‡UW/Intel Research.
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing Ying Zhang Z. Morley Mao Jia Wang Presented in NDSS07 Prepared by : Hale Ismet.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
CS440 Computer Networks 1 Link State Routing and OSPF Neil Tang 10/31/2008.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Multi-protocol Label Switching
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Continuous Monitoring of Distributed Data Streams over a Time-based Sliding Window MADALGO – Center for Massive Data Algorithmics, a Center of the Danish.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs in Parallel Machines Dr. Xiao Qin Auburn University
SketchVisor: Robust Network Measurement for Software Packet Processing
Multi Node Label Routing – A layer 2.5 routing protocol
Data Streaming in Computer Networking
Routing: Distance Vector Algorithm
ECE 544 Protocol Design Project 2016
DDoS Attack Detection under SDN Context
Network Core and QoS.
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Network Core and QoS.
Presentation transcript:

Distributed Denial-of-Service Attack Detection (and Mitigation?) Mukesh Agarwal, Aditya Akella, Ashwin Bharambe

Motivation  Known solutions for DoS detection help end-node victims  Detection of attack and the source(s)  Plenty of past work (Traceback-foo)  The ISP perspective  Backbone under attack?  Network carrying a LOT of “useless” attack traffic?  Not well explored

Would ISPs Bother? Probably, yes…  ISPs care if their infrastructure is under attack  Attacks against outside nodes but traversing the ISP may/may not be interesting  Selling point!  Depends on the volume of the attack  ISP could be a good network citizen by helping downstream ISPs if necessary

Problem Statement 1.How can an ISP detect if its network as a whole is carrying a significant amount of potentially useless/ harmful traffic? 2.Once detected, what steps should the ISP take? In this talk, we will mostly discuss question (1).

Why is this challenging?  What traffic patterns are interesting for detection?  How quick is the detection?  What is the router overhead?  Local views of multiple routers  single global view of the network?  What should the response to detection be?  Where to put the detection functionality?  All routers? only edge routers? a few routers in each POP?

Interesting Traffic Patterns  To identify something interesting, need to know what normal is…  High-level idea  Routers keep “profiles” of the traffic they see  If at some point, traffic violates the local, normal profile  worth noticing!  Can an attacker by-pass detection?  Attacker can match profiles at some routers, but…  Hard to match profiles at many routers and still do significant damage to the ISP

Detection of Anomalies  What profiles to keep at a router?  Router must care for attack traffic only if it takes a substantial portion of link capacity  If not, either the traffic is not harmful enough, or it will be caught “elsewhere”  Keep track of destinations traffic to whom takes  fraction of link capacity (popular destinations)

Attacks vs. Flash Crowds  If a usually unpopular dst becomes popular  possible attack  What about popular dsts like cnn.com?  Need a finer-grained profile of traffic to such destinations  “Finger-print” the dest-bound traffic  Typical number of sources, source-subnets, flows, distribution of flow lengths, other flow characteristics  Again, hard for an attacker to match finger-prints at many routers

Profiling -- Overview 1.Track popular destinations 2.For each popular destination keep  #unique source IPs  #unique flows (src, sport pairs)  Approximate flow-length distribution  For thresholds      …  k  compute number of flows carrying more than  i fraction of total bytes to destination  We use k=3  Very approximate, but intuitively sufficient

Profiling Algorithm -- Components  Tracking highly common queries in a stream of data  Ice-berg queries  Sample-and-hold [SIGCOMM02]  Counting the number of (or other statistics of) unique items in a stream of data [Alon et al. 96]  Frequency moments  F k =  m i k  kth frequency moment  Want F 0 for now  May add more later…

Sample-and-hold  Sample-and-hold pretty good at identifying popular destinations  With moderate over-sampling, can ensure high accuracy  sampling prob = f  capacity 

Computing F 0  Pretty cool trick [FM85, AMS96]  If the stream has about n unique items, hash each unique item, randomly, to a d-bit string, S, where d > log(n)  Let R = max i {r i =#least-significant 0’s in S i }  2 R is approximately F 0 !!!

Putting everything together  When things go “out-of-profile” routers get suspicious  There is a margin for error  So, have to “check with” others  Helps the routers reinforce suspicion  Reduces false-positives

Signaling  Out-of-band  ICMP messages with TTL=255  Anti-entropy exchanges periodically  Piggyback on OSPF updates  In-band  For efficiency  Mark packets with suspicion  The reverse direction may still have to use the out-of-band mechanism

Mitigation and Response  After receiving a threshold number of suspicions, each router must act  Locally rate-limit the traffic to the destination  To what rate?  If attack traffic is causing packet drops, could drop marked packets preferentially  If not, forward suspicion to downstream ISP which could preferentially drop if needed

Where to Put Functionality?  Typical path through an ISP: …-- --  Profiling were done only at the edge routers  just two points of Identification  Not enough for consensus  Must profile at a reasonable number of backbone routers too  Just profiling at backbone routers not enough either  Typical transit paths go over ~2 backbone routers (hot-potato routing)  For effective detection, must profile at most routers in the network

Current Status  Profiling schemes implemented in NS-2  Wrote popular DDoS tools (tfn2k, trinoo) in NS-2  Use Rocketfuel maps [SIGCOMM02] to build ISP topologies  Chose Ebone for our experiments  Set link capacities off the top of our heads  Backbone traffic traces used to represent background traffic in NS-2 [NLANR]

Current Status  Can make profiles for traffic  Overhead? Computation and memory?  Memory requirement small ~ 100k (ns-2 simulations)  In SRAM  Computation small  Sample-and-hold  1 hash table look-up + 1 write + 1 coin-flip per packet  Not expensive since tables in SRAM  F 0  4 byte-operations per sampled packet

Initial Results  Compared the profiles generated using traces collected at different times at the same router  Profiles generated very highly stable (> 90% match)  Small number of packets enough to get stable profiles (~1million or 15s)  Memory used to construct profiles is small on average (~100K)  At a router, attack traffic can be identified fairly quickly (< 500,000 total packets traversing the router)  Initial results -- need more rigorous testing  Have to test the consensus protocol  Time taken to converge, false-positives and negatives

Questions, Comments, Suggestions?