Presentation is loading. Please wait.

Presentation is loading. Please wait.

05/2007ORNL Presentation Distributed Denial of Service Games by Chinar Dingankar, Student Dr. R. R. Brooks, Associate Professor Holcombe Department of.

Similar presentations


Presentation on theme: "05/2007ORNL Presentation Distributed Denial of Service Games by Chinar Dingankar, Student Dr. R. R. Brooks, Associate Professor Holcombe Department of."— Presentation transcript:

1 05/2007ORNL Presentation Distributed Denial of Service Games by Chinar Dingankar, Student Dr. R. R. Brooks, Associate Professor Holcombe Department of Electrical and Computer Engineering Clemson University Clemson, SC 29634-0915 Tel. 864-656-0920 Fax. 864-656-1347 email: rrb@acm.org

2 05/2007ORNL Presentation Introduction Combinatorial game theory to analyze the dynamics of DDoS attacks on an enterprise A game is played on a capacitated graph (computer network) –Nodes have limited CPU capacities –Links/Edges have bandwidth constraints A distributed application runs on the computer network Our approach gives two important results – –It quantifies the resources an attacker needs to disable a distributed application –If the attacker does not have enough zombies required  provide near optimal strategies for reconfiguration of the distributed application in response to attempted DDoS attacks

3 05/2007ORNL Presentation Physical Environment A simple two player game to be played on a computer network The “physical” graph (computer network) is represented by a directed graph structure (EG) with N nodes –EG = [EV,EE] –EV→ vertices with known CPU bandwidth –EE→ is a set of directed edges or links with known communication bandwidth –Local bandwidth on each node - Infinite 45 16 35 24 16 4 2 3 2 3 3 2 3 Connectivity matrix (EE)= Note (6,6) =0 EV = [2, 3, 4, 2, 1, 3]

4 05/2007ORNL Presentation Players Two players in the game – –Blue – A set of distributed programs running on physically connected computers BG = [BV,BE] BV→ is a set of nodes representing distributed programs with known CPU load BE→ is a set of edges or links representing the communications bandwidth needed between two programs Local bandwidth on each node - Infinite Represented by the color BLUE –Red – Red is an attacker that places zombie processes on physical graph nodes. Zombies send network traffic over the physical edges Number of zombies and where to place them Represented by the color RED

5 05/2007ORNL Presentation Set of feasible Blue configurations  set of mappings of BV onto EV that satisfy two classes of constraints: –Nodal Capacity Constraint: –Edge Capacity Constraint: Two Blue nodes on same Physical node – Infinite Arc capacity Maxflow for each pair of source and sink on the network Set of feasible configurations  BC = {BC 1, BC 2... BC L } Nodal capacity of Physical node >= Nodal capacity of Physical node >= Nodal capacity of Blue Nodal capacity of Blue Feasible Blue Configurations Maxflow between two Physical nodes >= Arc capacity of two Blue nodes Arc capacity of two Blue nodes 45 16 35 24 16 4 2 3 2 3 3 2 3 AB 2 AB 2 45 16 35 24 16 4 2 3 2 3 3 2 3 A B 2 Infinite B/W AB 2

6 05/2007ORNL Presentation RED disrupts Blue Red disrupts a Blue configuration by placing zombies so as to - –Attack node capacities - Red places zombies nodes hosting one or more Blue processes. The node capacity attack is rather trivial and not very interesting Difficult for Red to compromise the servers used by Blue –Flood arcs – Red places zombies on nodes that do not host Blue processes. Zombies produce network traffic that consumes communications bandwidth on edges in EE A Blue configuration is disabled  required arc capacity of any Blue edge (s-t) becomes greater than the available maxflow from s-t on the physical graph Our analysis focuses on flooding attacks

7 05/2007ORNL Presentation To determine the set of zombies needed by Red, we: –Calculate the mincut for each element of BE –Blue slack capacity at the mincut (BS) –Expected number of blue packets dropped –Volume of red traffic so that  no. of blue packets dropped > BS –Red traffic (RT), Zombie Placement: If the Maxflow to a node in the mincut of an element of BE is > RT then that node is a candidate for zombie placement. –We need minimum number of zombies  so look for zombie nodes that can disable more than one element of BC. –We get a smallest set of zombies needed to disable all elements of BC Zombie Traffic and Zombie Placement        BS 1 C RT λ packets is the Blue traffic λ packets is the Blue traffic C is the capacity of the physical arc physical arc

8 05/2007ORNL Presentation Game If the attacker does not have enough zombies to disable all blue configurations  Blue has a chance to recover from the DDoS attack by reconfiguring. A simple board game. Rules for the game: –Blue starts the game. –Each player is allowed one move at a time. –Blue can take one possible configuration out of the available BC’s for one move. –Blue cannot have redundancy i.e. multiple Blue copies. –Once Red places a zombie on a node it cannot move that zombie until its next turn –Blue reconfigures by migrating a single process from a physical node to another. –Blue and Red have perfect knowledge of each other’s configurations. Aim of each player –Red tries to force Blue into a position where it cannot recover by transitioning to another element of BC. –Blue tries to find a “loopy” game where it can always return to a previous configuration.

9 05/2007ORNL Presentation An Example Game Blue ConfigurationReconfigure 12, 3, 4 21, 5, 6 31, 7 41,10 52, 8, 9 62, 9 73, 10 85 95, 6 104, 7 Zombie Move ZombiesDisrupt Blue Configurations A3, 51, 2, 7 B1, 63, 4, 5 C3, 42, 6, 9 D1, 58, 9, 10

10 05/2007ORNL Presentation 5 2 16 29 NA – Zombie at A 6 is chosen NA – Zombie at C NA – Zombie at A A C [1, 2, 7] [2, 6, 9] RED WINS THE GAME !!!! An Example Game

11 05/2007ORNL Presentation 2 A [1, 2, 7] 516 NA – Zombie at A 5 is chosen B [3, 4, 5] 289 Loop – (2-5-2) Blue Wins 9 is chosen C [2, 6, 9] 56 NA – Zombie at CLoop – (5-9-5) Blue Wins BLUE WINS THE GAME !!!! An Example Game

12 05/2007ORNL Presentation Thermographs Any given enterprise relies on multiple distributed processes –Each distributed process represents a single game An attacker can not expect to destroy all of the processes at any point in time  tries to maximize the number of disabled processes This situation describes a “sum of games” problem Blue and Red have alternate moves At each turn, a player chooses a game (process) and a move to make in that game This problem has been shown to be  P-Space complete Thermographs can be used to find the near optimal solution Use of thermographs to choose a game from all the games and then make a move in that game

13 05/2007ORNL Presentation Applications Local Area Networks (LANs): Zombies in the larger Internet may target processes on the LAN –To identify system bottlenecks –To determine if volume of the external traffic can compromise distributed processes on the LAN. Corporate Networks: Zombies can attack the VPN traffic traveling through global Internet –Graph structure of the VPN connections can be used to create an adaptive VPN infrastructure that can tolerate DDoS attacks. Global routing problems: Routing between AS uses the BGP, which is subject to instability in the presence of flooding DDoS attacks. –AS graph structure can be used to determine if the volume of traffic reaching sensitive BGP nodes is enough to disrupt the routing between critical agencies.


Download ppt "05/2007ORNL Presentation Distributed Denial of Service Games by Chinar Dingankar, Student Dr. R. R. Brooks, Associate Professor Holcombe Department of."

Similar presentations


Ads by Google