Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.

Slides:



Advertisements
Similar presentations
High Performance Research Network. Development Lab. / Supercomputing Center 1 Design of the Detection and Response System against DDoS attacks Yoonjoo.
Advertisements

An Adaptable Inter-Domain Infrastructure Against DoS Attacks Georgios Koutepas National Technical University of Athens, Greece SSGRR 2003w January 10,
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
1 Reading Log Files. 2 Segment Format
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
CS155: Computer and Network Security Programming Project 3 – Spring 2008 Craig Gentry, Naef Imam, Arnab Roy {cgentry, nimam, Thanks.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
Jaehoon (Paul) Jeong, Hyoungshick Kim, and Jung-Soo Park
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Distributed Denial of Service Attack and Prevention Andrew Barkley Quoc Thong Le Gia Matt Dingfield Yashodhan Gokhale.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Honeypot and Intrusion Detection System
Final Introduction ---- Web Security, DDoS, others
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
Ethics of Distributed DoS (Why TFN is Evil) March 2, 2000 Mintcho Petkov Dartmouth College.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Open-Eye Georgios Androulidakis National Technical University of Athens.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
1 Attacking DDoS at the Source Jelena Mirković, Gregory Prier, Peter Reiher University of California Los Angeles Presentation by: David Allen.
Denial of Service Attacks: Methods, Tools, and Defenses Prof. Mort Anvari Strayer University at Arlington.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
DoS/DDoS attack and defense
Distributed Denial of Service (DDoS)
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
DDoS Attacks on Financial Institutions Presentation
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Defending Against DDoS
Defending Against DDoS
DDoS Attack Detection under SDN Context
Firewalls Purpose of a Firewall Characteristic of a firewall
DDoS Attack and Its Defense
Presentation transcript:

Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday and Travis Reid Presented by: Jesus F. Morales

2 Overview Introduction: the problem Proposed solution The experiment Results Observations Conclusions

3 Introduction The problem Distributed Denial of Service (DDoS) attacks Hacker toolkits January 2001 DDoS attack against websites hosting Hotmail, MSN, Expedia and other large services Services inaccessible for 22 hours

4 Current state of response Relies on expert, manual labor by network administrators Response includes two main activities: “Input debugging” Find router’s physical interfaces used for the attack (statistics, network traffic probes) Mitigation of network traffic flow Packet filtering or rate limiting at the associated router Contact upstream organizations

5 Current state of response: drawbacks Requires immediate availability of highly skilled network administrators Time consuming Downtime & costs It does not scale What about attacks involving hundreds of networks? “Whack a mole” attacks

6 Proposed solution Intruder Detection and Isolation Protocol (IDIP) Protocol for reporting intrusion-related events and coordinating attack tracebacks and automated response actions Cooperative Intrusion Traceback and Response Architecture (CITRA) The architecture based on IDIP Authors have adapted CITRA and IDIP for DDoS attacks

7 CITRA: components and attack traceback and mitigation

8 Attack response Policy mechanisms for each CITRA component along the attack path determine the adequate response Block attacked service port on all requests from attacker’s address or network for a specified amount of time At CITRA-enabled hosts Kill offending process Disable offending user’s account Goal: use the narrowest network response Stop the attack Minimize impact on legitimate users Reports with responses taken is sent to the Discovery Coordinator (DC) Global view and system topology allows, hopefully, for the best community-wide response

9 Experiment: Autonomic response to DDoS The problem Sophisticated DDoS toolkits generate traffic that “blends in” with legitimate traffic Cannot be blocked by router packet filters without blocking legitimate traffic Traffic rate limiting may be more useful Experiment goals Prove that CITRA and IDIP can defend against DDoS attacks In particular, against a Stacheldraht v4 attack

10 Experiment: Stacheldraht toolkit and test application Stacheldraht toolkit Can generate ICMP, UDP and TCP floods and Smurf attacks Provides one or more master servers that control agents (flood sources) Can target floods at arbitrary machines and ports Test application Audio/video streaming RealNetworks’ RealSystem sever RealPlayer client

11 Experiment: topology and scenario

12 Experiment: settings Test data 8-minute 11-seconds continuous motion video Encoded at Kbps RealPlayet Best quality video setting (10 Mbps bandwidth) Data buffering: 5 seconds (the minimum) Transport protocol: UDP Attack Target is the RealSystem server UDP packets indistinguishable from control packets sent to the server from RealPlayer clients

13 Experiment: Stacheldraht flooding and autonomic rate limiting

14 Experiment results: Normal run

15 Experiment results: Flood run

16 Experimental results: Full recovery run

17 Experimental results: Degraded recovery run

18 Observations Degraded recovery probably due to detector’s slow response speed (366 MHz Pentium II) Independent experiment Results confirmed Full recovery obtained every time Higher performance detector CITRA’s response effective after 2 seconds vs. 10 – 12 seconds. Results are preliminary UDP allows traceback and mitigation request with one IP packet vs. TCP would require a three-way handshake first. May result in a slower propagation upstream

19 Conclusions DDoS attacks an increasing threat to the Internet Manual defense is inadequate CITRA prototype for DDoS with rate limiting function seems to be a promising automatic response