a divide-and-conquer strategy for thwarting distributed denial-of service attacks

80
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang

Upload: crwys

Post on 13-Jan-2016

29 views

Category:

Documents


0 download

DESCRIPTION

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007. A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks. Presented by: C. W. Fan-Chiang. Author(1/3). Ruiliang Chen He is currently a PhD student in the Bradley - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007

Presented by: C. W. Fan-Chiang

Page 2: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 2

Ruiliang Chen

He is currently a PhD student in the Bradley Department of Electrical and Computer Engineering at Virginia Polytechnic Institute and State University (Virginia Tech).

His research interests include traceback and mitigation mechanisms for thwarting denial-of-service attacks, attack-resilient routing protocols forwireless ad hoc networks, and security issues incognitive radio networks.

He is a student member of the IEEE.

Page 3: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 3

Jung-Min Park

He received the bachelor’s andmaster’s degrees in electronic engineering fromYonsei University, Seoul, Republic of Korea, in1995 and 1997, respectively, and the PhDdegree from the School of Electrical andComputer Engineering at Purdue University in2003.

His research interests include DoS attackcountermeasures, e-commerce protocols,cognitive radio networks, key management, and applied cryptography.

He is a member of the IEEE and the ACM.

Page 4: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 4

Randolph Marchany

He is currentlythe director of the Virginia Polytechnic Instituteand State University (Virginia Tech) IT SecurityTesting Lab, a component of the university’sInformation Technology Security Office.

a coauthor of the FBI/SANS Institute’s “Top 10/20 Internet Security Vulnerabilities” , a co-author of the SANS Institute’s “Responding to DDoS Attacks” ,Computer Security—Incident Handling—Step by Step,”

He is a member of the IEEE.

Page 5: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 5

Page 6: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 6

Page 7: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Defending against DDoS attacks is challenging for two reasons. First, the number of attackers involved in a

DDoS attack is very large. Second, attackers usually spoof their IP

addresses, which makes it very difficult to trace the attack traffic back to its sources.

Ingress/egress ; Subnet Spoofing?

112/04/21 OPLab,NTUIM 7

Page 8: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Client puzzle, Max-min Servercentric router throttles, Differentiated service

The ideal countermeasure paradigm of Max-min Servercentric router throttles, the attack detection module is placed

at (or near) the victim and the packet filtering module is placed as

close to the attack sources

112/04/21 OPLab,NTUIM 8

Victim

Attacker

Packet Filtering

Attack Detection

Page 9: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

When attacks are detected downstream close to the victim, the upstream routers close to the attack sources filter attack packets using summarized attack signatures sent by the detection module.

However, have either or both of the following two drawbacks

112/04/21 OPLab,NTUIM 9

Page 10: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

1.The need to securely forward attack signatures to the upstream routers.

May require a global key distribution infrastructure for authenticating and verifying the attack signatures.(which is costly to deploy and maintain.)

112/04/21 OPLab,NTUIM 10

Page 11: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

2.The dependence on attack signatures to separate attack traffic from legitimate traffic. Such a signature is very difficult for three reasons.

112/04/21 OPLab,NTUIM 11

Page 12: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

2-1.In many cases, an attack detection module can only detect the existence of attacks but may not formulate any attack signatures from the observed traffic

112/04/21 OPLab,NTUIM 12

Page 13: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

2-2.Even if an attack signature is obtained, it may not be usable to a router to filter packets when the signature lies above the network layer.

Because a router is a network-layer device, it would severely degrade its performance to examine the contents of every packet to match high-layer attack signatures

112/04/21 OPLab,NTUIM 13

Page 14: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

2-3.Even signatures in the network layer may have limited value because the attackers can readily manipulate corresponding information.

Because An attacker can spoof source IP addresses and change the protocol field in the IP header, rendering these fields useless as valid attack signatures. The only absolutely reliable information in a packet is the destination IP address.

112/04/21 OPLab,NTUIM 14

Page 15: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Attack Diagnosis (AD), a novel attack mitigation scheme that combines the concepts of Pushback and packet marking to thwart DDoS attacks.

112/04/21 OPLab,NTUIM 15

Page 16: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

1.An Intrusion Detection System (IDS) installed at the victim (or at its firewall) detects an attack.

2.The victim instructs the upstream routers to start marking packets with trace back information.

3. Based on the marking information extracted from collected packets, the victim separates an attacker from other clients and traces back to the attack source.

4. The victim instructs the appropriate upstream routers to filter attack packets.

112/04/21 OPLab,NTUIM 16

Page 17: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

However, AD is not appropriate for large-scale attacks involving a large number of attackers because the process would be very slow.

An extension to AD called Parallel Attack Diagnosis (PAD) that can throttle traffic coming from multiple attackers simultaneously in a single round.

112/04/21 OPLab,NTUIM 17

Page 18: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

AD/PAD support the ideal DDoS countermeasure paradigm

AD/PAD is reactive in nature. No communication overhead is required when a network is not under attack.

AD/PAD employ deterministic packet marking, they are robust against forgery of marking fields

112/04/21 OPLab,NTUIM 18

Page 19: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

AD/PAD throttle attackers in a “divide and conquer” fashion, very low false positive ratios are incurred. Moreover, PAD provides a “tunable” parameter that enables the network to adjust the diagnosis process delay and the false positive ratio.

AD/PAD do not rely on attack signatures for packet filtering and require no global key distribution infrastructure.

112/04/21 OPLab,NTUIM 19

Page 20: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 20

Page 21: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Assumptions Overview of AD and PAD Attack Diagnosis Parallel Attack Diagnosis Analysis of False Positives Analysis of Attack Mitigation Delay

112/04/21 OPLab,NTUIM 21

Page 22: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Every host, either a client or a server, is connected to its local edge router.

Edge routers are, in turn, interconnected by core routers.

We refer to the server host being attacked as the victim.

112/04/21 OPLab,NTUIM 22

Page 23: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

A recent study has shown that 95 percent of the routes observed in the Internet have fewer than five observable daily changes. we make the reasonable assumption that every route from a client to the victim is fixed during the timeframe of interest.

Assume that Internet routers are not compromised.

112/04/21 OPLab,NTUIM 23

Page 24: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

False Negative to denote an attacker whose malicious packets have not been filtered,

False Positive to denote a legitimate client whose packets have been incorrectly throttled.

112/04/21 OPLab,NTUIM 24

Page 25: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

The existence of an IDS module installed at the victim (or at its firewall), which is able to identify the existence of attacks after observing malicious traffic.

112/04/21 OPLab,NTUIM 25

Page 26: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Some of the router interfaces are labeled with a locally unique number that identifies that interface port. We call this number the port identifier (PID).

However, when an interface port is connected to multiple hosts via a broadcast link-layer channel (such as in a LAN), a PID cannot be used to uniquely identify a host.

112/04/21 OPLab,NTUIM 26

Page 27: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Router F maintains a virtual PID table, which maps a “virtual PID” to every MAC address that the router observes coming through interface x.

112/04/21 OPLab,NTUIM 27

Page 28: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 28

Page 29: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

PID is locally unique within a router, a string of PIDs can be used to uniquely identify the path from a server to a client. Eg.4-8-24-42 、 53—8-50-27

AD is capable of throttling malicious traffic coming from a modest number of attackers.

PAD solves this problem by dealing with multiple attackers simultaneously.

112/04/21 OPLab,NTUIM 29

Page 30: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

To support AD, a router needs to mark packets with its PIDs and other traceback-related information. For this purpose, we overload the 16-bit Identification field and one reserved bit in the IP header.

Note that IP fragments constitute a very small proportion of the actual Internet traffic (less than 0.25 percent)

112/04/21 OPLab,NTUIM 30

Page 31: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Use a-bit hop-count field, a b-bit PID field, and a c-bit XOR field, where

112/04/21 OPLab,NTUIM 31

Page 32: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Hop-count field in a packet records the number of hops from a router that first marks a given packet to the edge router that is immediately upstream of the victim.

PID field of a given packet records the PID of the router’s input interface port that processed the packet.

XOR field of a packet records the value obtained by taking the XOR (exclusive OR) of the least significant c bits of PID values.

112/04/21 OPLab,NTUIM 32

Page 33: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

A router interface can be set to either of two marking modes. Active Deterministic Marking Mode

(ADMM) for V if it processes every packet destined for V as follows:

1) sets the hop-count field to zero, 2) copies its PID to the PID field, and 3) copies the least significant c bits of its PID to

the XOR field.

112/04/21 OPLab,NTUIM 33

Page 34: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

A router interface can be set to either of two marking modes. Passive Deterministic Marking Mode

(PDMM) for V if it processes every packet destined for V as follows:

1) increases the hop-count field by one and 2) computes the bit-by-bit XOR value of the

least significant c bits of its PID and the XOR field value and writes the result back to the XOR field.

112/04/21 OPLab,NTUIM 34

Page 35: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

AD process is triggered. The victim begins the process by sending a “DAI” (Diagnose-All-Interfaces) request with the TTL field set to 255 to its immediate edge router.

DII-p(Diagnose Individual Interface) request received by a router is always preceded by a DAI request.

112/04/21 OPLab,NTUIM 35

Page 36: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 36DAI

SET all interface to ADMM

DII-42

SET interface 42 to PDMMOthers remain unchanged

Status packet

Page 37: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 37

DAI

SET all C’s interface to ADMM

DII-24

SET interface 24 to PDMMOthers remain unchangedStatus packet

Page 38: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 38

V instruct G to trigger packetfilter module on 4

Figure that C1 is an attacker

Status packet

DII-4

Page 39: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 39DAI

SET all interface to ADMM

DII-42

SET interface 27 、 42 to PDMMOthers remain unchanged

Status packet

DII-27

Page 40: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 40

DAI

SET all C’s interface to ADMM

DII-24

SET interface 24 to PDMMOthers remain unchangedStatus packet

SET interface 50 to PDMMOthers remain unchanged

Status packet

DII-50

DAI

SET all B’s interface to ADMM

Page 41: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 41

V instruct G to trigger packetfilter module on 4

Figure that C1 is an attacker

Status packet

DII-4

Figure that C2 is an attacker

V instruct F to trigger packetfilter module on xAnd use Virtual PID to locateC2

Status packet

DII-31

Page 42: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 42

Page 43: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

How can V determine that interface 50 belongs to B and interface 24 belongs to C?

PID 50 at hop 1 is grouped with PID 27 (and not PID 42) at hop 0 because 41⊕50 =27

112/04/21 OPLab,NTUIM 43

Page 44: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 44

Page 45: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Under the following assumptions, one can show that AD incurs no false negatives or false positives and PAD incurs no false negatives: 1) the attackers keep sending attack packets

to the victim during the AD or PAD process, 2) the IDS installed at the victim can

accurately identify attacks, 3) the MAC addresses are not spoofed.

112/04/21 OPLab,NTUIM 45

Page 46: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

False positive occurs when each link of a legitimate client’s path (that is not on any attack path) collides with a link of an attack path,

112/04/21 OPLab,NTUIM 46

Page 47: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

We assume that each router assigns PID values to its interfaces randomly from 0 to 2b-1. If we assume that q attackers are diagnosed in a single round

The probability that a link of a legitimate client’s path collides with a link on an attack path is

112/04/21 OPLab,NTUIM 47

Page 48: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

If a legitimate client’s path has m links that do not coincide with any links on any attack path, then its false positive probability is

112/04/21 OPLab,NTUIM 48

Page 49: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 49

Page 50: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 50

Page 51: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 51

Page 52: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 52

First step

Each loop

Last step

Page 53: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 53

First step

Each loop

Last step

Page 54: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 54

Page 55: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

PRACTICAL CONSIDERATIONS Selection of Marking Field Length Security Considerations Issues of Router and Network Overhead Gradual Deployment Considerations

112/04/21 OPLab,NTUIM 55

Page 56: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Because the vast majority of routes in the Internet have fewer than 32 hops. Therefore, we set a = 5, which implies

b + c = 12 In AD, we allocate all the remaining 12

bits to the PID field

112/04/21 OPLab,NTUIM 56

Page 57: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

The role of the XOR field is to distinguish individual routes so that the DII commands can be issued to the appropriate routers.

On the other hand, the PID field identifies an individual interface port on a router, which helps the router discard DII requests with wrong PIDs.

112/04/21 OPLab,NTUIM 57

Page 58: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

b ≧ c b + c = 12 a + b + c = 17 Setting1 a = 6, b = 6, c = 5 Setting2 a = 5, b = 6, c = 6

112/04/21 OPLab,NTUIM 58

Page 59: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

1)How to authenticate DAI? 2)How we deal with DII forgery? How to

prevent DII against replay attack? 3)An attacker may attempt to forge

information in the marking fields of packets. What should we do?

112/04/21 OPLab,NTUIM 59

Page 60: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

1) The key required to authenticate the DAI requests can be established during an offline registration process

2) We can utilize a preceding DII request to authenticate its subsequent DII request in the chain, then all the DII requests in the chain are authenticated.

112/04/21 OPLab,NTUIM 60

Page 61: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Victim uses a publicly known one-way hash function H() to generate a hash chain

112/04/21 OPLab,NTUIM 61

Page 62: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

112/04/21 OPLab,NTUIM 62

Rx

Ry

Hop hDAI nh

DII nh+1

Check if

Page 63: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

3)Because AD/PAD use DPM a forged marking will be overwritten by intermediate routers.

112/04/21 OPLab,NTUIM 63

Page 64: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

AD and PAD are reactive defense mechanisms, it is unlikely that a router will receive a large number of simultaneous requests for packet marking. This ensures that a router will not be overburdened with packet marking tasks the vast majority of the time.

112/04/21 OPLab,NTUIM 64

Page 65: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

First, the commands the victim sends are from downstream to upstream, while the flooding goes the reverse direction.

Secondly, AD commands could contain some rate-limit requests (as Pushback does),

Another straightforward solution is to prioritize authenticated AD commands.

112/04/21 OPLab,NTUIM 65

Page 66: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Perimeter approach, AD/PAD is implemented only at the victim’s neighbor subnets, forming a perimeter of defense around the victim perimeter approach

Distributed diagnosis approach, the border routers of subnets, which support AD and PAD, coordinate the diagnosis process under the help of attack detection devices.

112/04/21 OPLab,NTUIM 66

Page 67: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 67

Page 68: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 68

Page 69: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

SIMULATION AND RESULTS PFPPAD versus q Attack Mitigation Delay The Trade-Off between False Positives and

Attack Mitigation Delay Partial Subnet Deployment

112/04/21 OPLab,NTUIM 69

Page 70: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

SIMULATION AND RESULTS

Use three topologies Skitter Internet Map (d=6) Lumeta Internet Mapping Projects (d=2) Complete tree (d=6)

Use Gaussian distribution with μ is 16.5 and σ is 4 to simulate routes’ number of hops.(Upper bound 32 lower bound 1)

112/04/21 OPLab,NTUIM 70

Page 71: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

SIMULATION AND RESULTS

In these simulations, we fixed the number of attackers, Na, at 2,000

and the total number of clients at 5,000. We varied q from 10 to 2,000 in

increments of 10. Each datum is the average of 10

independent experiments.

112/04/21 OPLab,NTUIM 71

Page 72: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

SIMULATION AND RESULTS –PFPPAD versus q

112/04/21 OPLab,NTUIM 72

Page 73: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 73

Page 74: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 74

Page 75: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 75

Page 76: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

SIMULATION AND RESULTS –Attack Mitigation Delay

112/04/21 OPLab,NTUIM 76

The implementing AD in subnet 157.130.0.0/16 and subnet 152.63.0.0/16 is crucial for lowering the false positive ratio.

Page 77: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 77

Page 78: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

AD/PAD employ a “divide-and-conquer”strategy to isolate attacking hosts and filter their traffic.

AD/PAD’s framework is in line with the ideal framework of DDoS mitigation schemes.

112/04/21 OPLab,NTUIM 78

Page 79: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

1. is reactive so as to incur limited overhead,

2. does not rely on attack signatures for filtering attack traffic,

3. is robust against IP spoofing and marking-field forgeries,

4. supports incremental deployment, and 5. incurs low false positives.

112/04/21 OPLab,NTUIM 79

Page 80: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of Service Attacks

112/04/21 OPLab,NTUIM 80

Thanks for listening