1.1 operating system concepts defending against ddos attacks using max-min fair server centric...

47
Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue University CS&E Dept,CUHK

Post on 22-Dec-2015

224 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.1Operating System Concepts

Defending Against DDoS Attacks Using Max-min Fair Server Centric

Router Throttles

David K.Y. Yau John C.S. LuCS Dept, Purdue University CS&E Dept,CUHK

Page 2: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.2Operating System Concepts

Motivations

Internet is an open and democratic environment increasingly used for mission-critical work

and commercial applications.

Many security threats are present or appearing Easy to launch, even for naïve users. need effective and flexible defenses to

detect/trace/counter attacks Goals:

protect innocent users; prosecute criminals

Ambitious goals

Page 3: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.3Operating System Concepts

Network Denial-of-service Attacks

Some attacks quite subtle securing protocols and intrusion

detection (e.g., BGP, TCP-syn attack) at routing infrastructure, malicious

dropping of packets, etc (low-rate TCP) Others by brute force:

- flooding (e.g., UDP, valid Web Request)

Cripples victim: - precludes any sophisticated defense at

victim site Philosophical question: what is an “attacker”? Viewed as resource management problem

Page 4: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.4Operating System Concepts

Flooding Attack

Server

Page 5: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.5Operating System Concepts

Server-centric Router Throttle

Installed by server when under stress, at a set deployment routers can be sent by multicast

Specifies leaky bucket rate at which router can forward traffic to the server aggressive traffic for server dropped

before reaching server rate determined by a feedbak control

algorithm

Issues: (1) Which set of routers? (2) What is the “proper” dropping rate?

Page 6: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.6Operating System Concepts

To S

Router Throttle

Aggressive flow

Throttlefor S’

To S’

Throttlefor S

Securely installed by S

Deployment router

C: Each victim has a leaky bucket for rate limit. Small memory and computationoverhead!

Page 7: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.7Operating System Concepts

Key Design Problems

Resource allocation: who is entitled to what? need to keep server operating within load

limits notion of fairness, and how to achieve it?

Need global, rather than router-local, fairness

How to respond to network and user dynamics (e.g., fluctuation of traffic)? Feedback control strategy is needed

Page 8: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.8Operating System Concepts

What is being fair?

Baseline approach of dropping a fraction “f”, say ½, of traffic for each flow won’t work well a flow can cause more damage to other flows

simply by being more aggressive!

Rather, no flow should get a higher rate than another flow that has unmet demands this way, we penalize “aggressive” flows only,

but protect the well-behaving ones

Page 9: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.10Operating System Concepts

Level-k Deployment Points

Deployment points parameterized by an integer k

R(k) -- set of routers that are either k hops away from server S, or less than k hops away from S but are directly connected to a host

Fairness across global routing points R(k)

Page 10: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.11Operating System Concepts

Level-3 Deployment

Server

Page 11: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.12Operating System Concepts

Feedback Control Strategy

Hysteresis control high and low water marks for server load, to

strengthen or relax router throttle

Additive increase/multiplicative decrease rate adjustment increases when server load exceeds US, and

decreases when server load falls below LS

throttle removed when a relaxed rate does not result in significant server load increase

Page 12: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.13Operating System Concepts

Fairness Definition

A resource control algorithm achieves level-k max-min fairness among the routers R(k) if the allowed forwarding rate of traffic for S at each router is the router’s max-min fair share of some rate r satisfying LS r US

Page 13: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.14Operating System Concepts

Fair Throttle Algorithm

Page 14: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.15Operating System Concepts

Example Max-min Rates (L=18, H=22)

Server

18.236.65

14.1

0.01

1.40

0.22

17.73

0.610.95

6.25

6.25

6.2520.53

24.88

15.51

17.73

0.22

0.61

0.95

59.9

Page 15: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.16Operating System Concepts

Interesting Questions

Can we preferentially drop attacker traffic over good user traffic?

Can we successfully keep server operating within design limits, so that good user traffic that makes it gets acceptable service?

How stable is such a control algorithm? How does it converge?

Page 16: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.17Operating System Concepts

Algorithm Evaluation

Control-theoretic analysis (fluid analysis) algorithm stability and convergence

under different system parameters Packet network simulations (packet

level analysis) Test under UDP and TCP traffic. Also test

with Web traces System implementation (the real

thing, baby !!!) deployment costs

Page 17: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.18Operating System Concepts

Control-theoretic Model

Adjusted traffic from source i

Throttle signal from victim

Step size

When throttle signal is high, server is underloaded.When throttle signal is low, server is overloaded.

ANALOGY!!!

Page 18: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.19Operating System Concepts

Feedback Control Model (Us=1750;Ls=1650)

Constant Source of 20

Constant Source of 30

Constant Source of 25

Constant Source of 4000

Constant Source of 2800

Page 19: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.20Operating System Concepts

Output for good traffic (total from source 1)

Page 20: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.21Operating System Concepts

Output for attack traffic (total from source 5)

Page 21: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.22Operating System Concepts

Output for attack traffic (total from source 6)

Page 22: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.23Operating System Concepts

Total traffic to server (Us=1750;Ls=1650)

Page 23: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.24Operating System Concepts

Case 2: variable attack traffic (Us=1750,Ls=1650)

Square Pulse

Page 24: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.25Operating System Concepts

Output of attack traffic 1

Page 25: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.26Operating System Concepts

Output of attack traffic 2

Page 26: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.27Operating System Concepts

Total traffic to server (Us=1750;Ls=1650)

Page 27: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.28Operating System Concepts

Feedback Control Model(sources and server)

Page 28: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.29Operating System Concepts

Feedback Control Model (server throttle signal)

Page 29: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.30Operating System Concepts

Feedback Control Model (sources process throttle)

Page 30: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.31Operating System Concepts

Throttle Rate (L=900; U=1100)

Page 31: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.32Operating System Concepts

Server Load (L = 900; U = 1100)

Page 32: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.33Operating System Concepts

Throttle Rate (U = 1100)

Page 33: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.34Operating System Concepts

Server Load (U = 1100)

Page 34: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.35Operating System Concepts

Throttle Rate (L=1050;U=1100)

Page 35: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.36Operating System Concepts

Server Load (L=1050; U=1100)

Page 36: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.37Operating System Concepts

NS2: UDP Simulation Experiments

Global network topology reconstructed from real traceroute data AT&T Internet mapping project: 709,310 traceroute

paths, single source to 103,402 other destinations randomly select 5,000 paths, with 135,821 nodes of

which 3879 are hosts

Randomly select x% of hosts to be attackers good users send at rate [0,r], attackers at rate [0,R]

Page 37: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.38Operating System Concepts

20% Evenly Distributed Aggressive (10:1) Attackers

Page 38: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.39Operating System Concepts

40% Evenly Distributed Aggressive (5:1) Attackers

Page 39: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.40Operating System Concepts

Evenly Distributed “meek” Attackers

Page 40: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.41Operating System Concepts

Deployment Extent

Page 41: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.42Operating System Concepts

NS2: TCP Simulation Experiment

Clients access web server via HTTP 1.0 over TCP Reno

Simulated network subset of AT&T traceroute topology 85 hosts, 20% attackers

Web clients make request probabilistically with empirical document size and inter-request time distributions

Page 42: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.43Operating System Concepts

Web Server Protection

Page 43: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.44Operating System Concepts

Web Server Traffic Control

Page 44: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.45Operating System Concepts

System Implementation

On Linux router loadable kernel moduleCPU resource reservation

Deployment platformPentium 4/2G Hz PCmultiple 10/100 Mb/s Ethernet

interfaces

Page 45: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.46Operating System Concepts

System Implementation: cont

OPERA: An Open-Source Extensible Router Architecture

http://www.cse.cuhk.edu.hk/~cslui/ANSRlab/software/opera/ A Linux-based package for implementing a

software programmable router architecture with the aim to facilitate networking experiments for the research community. Using this architecture, one can dynamically load new extension and services into the programmable router. Some interesting extensions include QoS support and traceback of DDoS attacks.)

Dynamic module loading Resource reservation General extension framework Secured Communication

Page 46: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.48Operating System Concepts

Future Work

Offered load-aware control algorithm for computing throttle rate impact on convergence and stability

Policy-based notion of fairness heterogeneous network regions, by size,

susceptibility to attacks, tariff payment

Selective deployment issues Impact on real user applications Defense for other forms of DDoS like

the reflector attack, BGP cascading failure..etc.

Page 47: 1.1 Operating System Concepts Defending Against DDoS Attacks Using Max-min Fair Server Centric Router Throttles David K.Y. Yau John C.S. Lu CS Dept, Purdue

1.49Operating System Concepts

Conclusions

Extensible routers can help improve network health

Presented a server-centric router throttle mechanism for DDoS flooding attacks can better protect good user traffic from aggressive

attacker traffic can keep server operational under an ongoing

attack has efficient implementation