Presentation is loading. Please wait.

Presentation is loading. Please wait.

An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.

Similar presentations


Presentation on theme: "An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial."— Presentation transcript:

1 An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial Engineering Seok Bong Jeong

2 2 통신시스템인터넷보안연구실 I. Introduction II. Placement of Distributed Detection Systems Objectives for DDS placement DS placement problem III. Numerical Results IV. Conclusions Contents

3 3 통신시스템인터넷보안연구실 I. Introduction (1) ▣ The Internet infrastructure is highly vulnerable to distributed attacks (DDoS attacks and flash crowds) ▣ DDoS attacks ◈ DDoS attacks do not rely on particular network protocols or system weaknesses. ◈ DDoS attacks simply exploit the huge resource asymmetry between the Internet and the victim. ▣ Flash crowds ◈ FCs occur when a large number of users try to access the same server simultaneously. ◈ FCs overload the network links, routers, and server itself. attacker Agents (daemon or zombies) Masters (handlers) victim DDoS Attacks

4 4 통신시스템인터넷보안연구실 I. Introduction (2) ▣ Several approaches to defend against distributed attacks ◈ EMERALD, GrIDS, JAM, JiNao, AAFID ▣ Challenging tasks to design an effective and deployable DDS ◈ A variety of algorithmic and engineering design issues ◈ What is the minimum number of DSs required? ◈ Optimal placement of DSs ▣ Objectives of this paper ◈ We focus on the placement problem of DSs across large scale networks for distributed intrusion detection approaches. ◈ Minimize the overall number of DSs ◈ Limiting possible nodes that can be participate in an attack

5 5 통신시스템인터넷보안연구실 II. Objectives for DDS placement ▣ Assumption ◈ All attack traffic passing through sensor nodes that perform DS are detected ◈ Routing is performed by the shortest path between two nodes ◈ DSs are placed in nodes 3, 4, and 7 ▣ Possible Attack nodes to node i, A(i) ◈ A(1) = {node 2} ◈ A(5) = {node 0, node 6, node 8, node 9} ◈ Node 1 is more robust than node 5

6 6 통신시스템인터넷보안연구실 II. Objectives for DDS placement ▣ DDS placement issues ◈ It is impossible to implement DSs in all nodes in a network ◈ Most distributed attacks (e.g. DDoS attack) become critical threats when a great number of nodes (e.g. servers or hosts) participate in an attack ◈ Thus, if we place DDSs across the network in a well distributed manner, the impact of attacks can be sufficiently localized and minimized and can thus be ignored. ▣ Key Objectives of placing DSs ◈ Minimize the total number of the DSs ◈ Minimize the number of nodes that could send the attack packets to any other nodes that are separated by more than the given number of hops without passing through sensors ◈ Find the optimal placement of the DSs

7 7 통신시스템인터넷보안연구실 III. DS placement problem (DSPP) – (1) ▣ Notations ◈ G = (V, E) : an undirected graph representing Internet topology –Each node in V can be interpreted as a router or an autonomous system ◈ T : a subset of nodes where intrusion detection is performed ◈ : the coverage ratio. ◈ : be the localization factor ◈ : the number of nodes that are more than hops apart from node and can send attack packets to node without passing through DSs. – :every attack can be localized to within a small set of candidate nodes with a distance of less than r hops from node –. :all attack packets destined to node i are detected because all traffic destined to node i must pass through at least one DS ◈ (DSPP1)

8 8 통신시스템인터넷보안연구실 III. DS placement problem (DSPP) – (2) ▣ Notations ◈ : be the decision variable, which is 1 if node i performs DS and 0 otherwise ◈ : be the subset of, which is composed of the edges that connect the nodes that perform DS. ◈ : the distance between node i and j ◈ : if the distance between node i and j is more than r, and 0 elsewhere in G` ▣ DSPP2 where

9 9 통신시스템인터넷보안연구실 III. DS placement problem (DSPP) – (3) ▣ Set packing problem ◈ is a packing with respect to if for all. ◈ Each packing is composed of nodes that are not DS nodes ◈ The maximum value of for all nodes in a packing should be less than r ◈ is the decision variable, which is 1 if the index j of is included in the set packing F, and 0 otherwise ◈ Let be the coefficient, which is 1 if the node i is included in, and 0 otherwise. ▣ (DSPP3)

10 10 통신시스템인터넷보안연구실 III. DS placement problem (DSPP) – (4)

11 11 통신시스템인터넷보안연구실 V. Numerical Results (1)

12 12 통신시스템인터넷보안연구실 V. Numerical Results (2) (a) (b) (c)

13 13 통신시스템인터넷보안연구실 Conclusions ▣ We have presented a DSs placement approach in order to detect distributed attacks. ▣ Perfect detection is difficult to achieve in the Internet environment while maintaining sparse coverage. However, this is mitigated by the fact that attack traffic that can escape the DS can be localized within r hops. ▣ Our scheme reduces the total number of DSs while localizing attack candidate sources


Download ppt "An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial."

Similar presentations


Ads by Google