1 evaluating the vulnerability of network mechanisms to sophisticated ddos attacks udi ben-porat...

18
1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben- Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya, Israel Hanoch Levy ETH Zurich, Switzerland

Upload: heather-wilkinson

Post on 29-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

1

Evaluating the Vulnerability of Network Mechanisms to

Sophisticated DDoS Attacks

Udi Ben-PoratTel-Aviv University,

Israel

Anat Bremler-BarrIDC Herzliya, Israel

Hanoch LevyETH Zurich, Switzerland

Page 2: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

2

Study Objective Propose a DDoS Vulnerability performance metric

Vulnerability Measure To be used in addition to traditional system performance

metrics Understanding the vulnerability of different

systems to sophisticated attacks

This Talk Describe DDoS Vulnerability performance metric Demonstrate Metric impact

Hash Table: Very Common in networking Performance (traditional) : OPEN equivalent CLOSED Vulnerability analysis: OPEN << CLOSED!!

Page 3: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

3

Distributed Denial of Service (DDoS)

Attacker adds more regular users Loading the server - degrades the performance

Server Performance

Server

Attacker

NormalDDoS S. DDoS

Page 4: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

4

Sophisticated DDoS

NormalDDoS S. DDoS

Server Performance

Server

Attacker

Attacker adds sophisticated malicious users Each user creates maximal damage (per attack budget)

Page 5: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

5

Sophisticated Attacks Examples Simple example: Database server

Make hard queries Goal: consume CPU time

Sophisticated attacks in the research: Reduction of Quality (RoQ) Attacks on Internet End-

Systems Mina Guirguis, Azer Bestavros, Ibrahim Matta and Yuting Zhang INFOCOM 2005

Low-Rate TCP-Targeted Denial of Service AttacksA. Kuzmanovic and E.W.Knightly Sigcomm 2003

Denial of Service via Algorithmic Complexity AttacksScott A. Crosby and Dan S. Wallach Usenix 2003

Page 6: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

6

Our goal

Proposing a Vulnerability measurement for all sophisticated DDoS attack Vulnerability Measurement

Understanding the vulnerability of different systems to sophisticated attacks Later: Hash Tables and Queuing

Page 7: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

7

Vulnerability Factor Definition

Vulnerability=v means: Malicious user degrades the server performance v-times more than regular user

Performance

Degradation

Scales

c),ce(RegularΔPerforman

c),usce(MalicioΔPerformanmaxc)ity(CostVulnerabil st

st

(st = Malicious Strategy)

Page 8: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

9

Demonstration of Vulnerability metric: Attack on Hash Tables

Central component in networks Hash table is a data structure based on Hash

function and an array of buckets.

Operations: Insert, Search and Delete of elements according to their keys.

key

Insert (element) Buckets

Hash(key)

User Server

Page 9: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

10

Hash Tables

Bucket = one element

Collision-> the array is repeatedly probed until an empty bucket is found

Bucket = list of elements that were hashed to that bucket

Open Hash Closed Hash

Page 10: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

11

Performance Factors In Attack

While attack is on: Attacker’s operations are CPU intensive CPU loaded

Post Attack: Loaded Table insert/delete/search op’s suffer

Vulnerability: OPEN vs. CLOSEDTraditional Performance: OPEN = CLOSED*

What about Vulnerability? OPEN = CLOSED?

(* when the buckets array of closed hash is twice bigger)

Page 11: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

12

Attacker strategy (InsStrategy)

Strategy: Insert k elements (cost=budget=k) where

all elements hash into the same bucket ( )

Theorem: InsStrategy is Optimal For both performance factors

Closed Hash:Cluster

Open Hash: One long list of elements

Attack Results

Page 12: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

13

In Attack: Resource Consumption

V=

Analytic results:

Open Hash:Open Hash:

Closed Hash:Closed Hash:

In every malicious insertion, the server has to traverse all previous inserted elements (+ some existing elements)

Open Hash Closed Hash

V=

Page 13: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

14

Post Attack: Operation Complexity

Open Hash Closed Hash

Page 14: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

15

Post Attack: account for queuing Requests for the server are queued up

Vulnerability of the (post attack) Waiting Time?

Hash Table

Server

Page 15: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

16

Post Attack Waiting Time

Open Hash:Open Hash:Vulnerable !! While in the model of Post Attack Operation Complexity the Open Hash is not Vulnerable !

Closed Hash: Closed Hash: Drastically more vulnerable resulting: clusters increase the second moment of the hash operation timesNo longer stable for Load>48%

Stability Point

Page 16: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

17

Conclusions

Closed Hash is much more vulnerable than the Open Hash to DDoS, even though the two systems are considered to be equivalent via traditional performance evaluation.

After the attack has ended, regular users still suffer from performance degradation

Application using Hash in the Internet, where there is a queue before the hash, has high vulnerability.

Page 17: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

18

Related Work The alternative measure: Potency [RoQ]

Was defined only to RoQ Only count the performance degradation of a

specific attack Vulnerability measures the system

Meaningless without additional numbers Vulnerability is meaningful information based on this number alone

Analyzing Hash: Comparing Closed to Open Hash, also analyzing the post attack performance degradation

(Denial of Service via Algorithmic Complexity AttacksScott A. Crosby and Dan S. Wallach Usenix 2003)

Page 18: 1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,

19

Questions?