daas : ddos mitigation-as-a-service

41
DaaS: DDoS Mitigation-as-a-Service 2011 IEEE/IPSJ International Symposium on Applications and the Internet Author: Soon Hin Khor & Akihiro Nakao Speaker: 101065511 沈沈沈 1

Upload: jett

Post on 24-Feb-2016

42 views

Category:

Documents


0 download

DESCRIPTION

DaaS : DDoS Mitigation-as-a-Service. 2011 IEEE/IPSJ International Symposium on Applications and the Internet Author : Soon Hin Khor & Akihiro Nakao Speaker: 101065511 沈 祈恩. Outline. INTRODUCTION DESIGN A RCHITECTURE EVALUATION CONCLUSION. Outline. INTRODUCTION DESIGN - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: DaaS :  DDoS Mitigation-as-a-Service

DaaS: DDoS Mitigation-as-a-Service

2011 IEEE/IPSJ International Symposium on Applications and the Internet

Author: Soon Hin Khor & Akihiro NakaoSpeaker: 101065511 沈祈恩

1

Page 2: DaaS :  DDoS Mitigation-as-a-Service

2

Outline

• INTRODUCTION • DESIGN• ARCHITECTURE• EVALUATION• CONCLUSION

Page 3: DaaS :  DDoS Mitigation-as-a-Service

3

Outline

• INTRODUCTION • DESIGN• ARCHITECTURE• EVALUATION• CONCLUSION

Page 4: DaaS :  DDoS Mitigation-as-a-Service

4

INTRODUCTION

• DaaS is a service that protects a server against all 3 types of Distributed Denial-of-Service (DDoS)– Arbitrary packet (Network Layer)– Legit user-mimicking (Application Layer)– Economic attacks (EDDoS).

Page 5: DaaS :  DDoS Mitigation-as-a-Service

5

INTRODUCTION

• Most research concur that using widely distributed Internet-edge or core intermediaries that possess more resource than DDoS bots, receive traffic on behalf of a server is an effective technique to overcome the three issues.

Page 6: DaaS :  DDoS Mitigation-as-a-Service

6

INTRODUCTION

• For defense against application-layer DDoS, a Proof-of Work (PoW) mechanism empowers legit clients (legits, forshort) to attain differentiated service based on the difficulty of PoW "puzzles" solved.

Page 7: DaaS :  DDoS Mitigation-as-a-Service

7

Outline

• INTRODUCTION • DESIGN• ARCHITECTURE• EVALUATION• CONCLUSION

Page 8: DaaS :  DDoS Mitigation-as-a-Service

8

DESIGN

On-Demand Idle Resource Pool :– DaaS’s framework can recruit any existing or

future system/service as an intermediary.– Ex: IRC, Amazon’s S3, forums

Page 9: DaaS :  DDoS Mitigation-as-a-Service

9

DESIGN

Ephemeral Initial Channels :– Channels:

a named entity on an intermediary. EX: a channel name on IRC, a storage bucket in S3.

– I-Channel: Ephemeral initial channels.

– C-Channel:Communication channels.

Page 10: DaaS :  DDoS Mitigation-as-a-Service

10

DESIGN

Prioritize traffic:– Prioritize existing connection traffic over initial

connection request traffic. – Prioritize among the initial connection requests

using sPoW(self-proof-of-work). Prioritizing by puzzle difficulty.

Page 11: DaaS :  DDoS Mitigation-as-a-Service

11

Outline

• INTRODUCTION • DESIGN• ARCHITECTURE• EVALUATION• CONCLUSION

Page 12: DaaS :  DDoS Mitigation-as-a-Service

12

ARCHITECTURE

• DaaS consists of a framework and sPoW.• Implemented as DaaS name servers, client-

side and server-side components

Page 13: DaaS :  DDoS Mitigation-as-a-Service

13

ARCHITECTURE

Page 14: DaaS :  DDoS Mitigation-as-a-Service

14DaaS utilizes highly scalable Cloud #1 as a metered intermediary to protect a metered-server in Cloud #2.

Page 15: DaaS :  DDoS Mitigation-as-a-Service

15

A client that wants to contact the server performs a DNS resolution to obtain the location of the client-side component on the CDN

Page 16: DaaS :  DDoS Mitigation-as-a-Service

16

Proceeds to download it together with the server-side component’s public key embedded in its SSL certificate

Page 17: DaaS :  DDoS Mitigation-as-a-Service

17

The client-side component then performs a DaaS name resolution, specifying the server host name and the puzzle difficulty, k, to obtain a crypto-puzzle for the server.

Page 18: DaaS :  DDoS Mitigation-as-a-Service

18

The DaaS name server forwards the puzzle request to the server-side puzzle generator

Page 19: DaaS :  DDoS Mitigation-as-a-Service

19

The server side component randomly creates an ephemeral i-channel

Page 20: DaaS :  DDoS Mitigation-as-a-Service

20

Server encrypts the channel details and sends back both the encrypted details and the encryption key with k bits undisclosed as the crypto-puzzle.

Page 21: DaaS :  DDoS Mitigation-as-a-Service

21

The client-side component brute-forces and recovers the i-channel details, submits an initial connection request includes a randomly generated secret key, encrypted using the server-side component’s public key through i-channel.

Page 22: DaaS :  DDoS Mitigation-as-a-Service

22

If the initial connection request is not handled within a timeout period, it can request for a more difficult crypto-puzzle and re-submit the connection request through the higher priority i-channel.

Page 23: DaaS :  DDoS Mitigation-as-a-Service

23

The server-side component receives the initial connection request

Page 24: DaaS :  DDoS Mitigation-as-a-Service

24

Server creates a c-channel

Page 25: DaaS :  DDoS Mitigation-as-a-Service

25

Server encrypts the channel details using the client generated secret key and sends the information back to the client-side component

Page 26: DaaS :  DDoS Mitigation-as-a-Service

26

Server also informs the name server to invalidate the cached puzzle associated with that consumed i-channel.

Page 27: DaaS :  DDoS Mitigation-as-a-Service

27

ARCHITECTURE

Hide DaaS server detail:– Using intermediary and multipath stack of

client/server side component.

Page 28: DaaS :  DDoS Mitigation-as-a-Service

28

ARCHITECTURE

Enable any system/service to be used as an intermediary:– Using different intermediary plug-in to enable

communication between client and server.

Page 29: DaaS :  DDoS Mitigation-as-a-Service

29

ARCHITECTURE

sPoW Threats :– Puzzle Generation Resource Exhaustion:

Bots request a lot of puzzles without solving them. leads to:1. processing power exhaustion2. network connectivity exhaustion

– Solution:Channel Sharing.

Page 30: DaaS :  DDoS Mitigation-as-a-Service

30

ARCHITECTURE

sPoW Threats :– PoW Violation with Channel Sharing:

Clients can obtain high priority service by reusing high priority channels discovered by others.

– Solution:Only the quickest puzzle solver being successful in connection request submission.

Page 31: DaaS :  DDoS Mitigation-as-a-Service

31

ARCHITECTURE

sPoW Threats :– Puzzle Level Inflation:

attckers can inflate puzzle difficulty by repeatedly requesting for the most difficult puzzles results in clients having to solve unnecessarily high-level puzzles to submit connection

– Solution:requires the algorithm to track puzzle resolution capacity of the user-base (legits and bots) within a designated period.

Page 32: DaaS :  DDoS Mitigation-as-a-Service

32

ARCHITECTURE

Puzzle Level Inflation:– Detecting algorithm:

if the sum of required capacity to solve all open puzzles in the current period exceeds the user-base puzzle resolution capability estimated in the last period—a possible attack indicator.

Page 33: DaaS :  DDoS Mitigation-as-a-Service

33

• C: Server capacity for i-channle handling• rt: capacity required to solve all unique puzzles for open i-

channels in the current period.• st-1: estimated user-base capacity in the previous period.• k_lowest: the lowest protection level of the channel

Page 34: DaaS :  DDoS Mitigation-as-a-Service

34

Outline

• INTRODUCTION • DESIGN• ARCHITECTURE• EVALUATION• CONCLUSION

Page 35: DaaS :  DDoS Mitigation-as-a-Service

35

Average transmission time of various file sizes through different intermediary types

Page 36: DaaS :  DDoS Mitigation-as-a-Service

36

Average transmission time of various file sizes through I3 and IRC when different percentages of multipaths fail due to congestion.

Page 37: DaaS :  DDoS Mitigation-as-a-Service

37

Tardiness=

Page 38: DaaS :  DDoS Mitigation-as-a-Service

38

Tardiness=

Page 39: DaaS :  DDoS Mitigation-as-a-Service

39

Outline

• INTRODUCTION • DESIGN• ARCHITECTURE• EVALUATION• CONCLUSION

Page 40: DaaS :  DDoS Mitigation-as-a-Service

40

CONCLUSION

• Contribution:Employs sPoW, a unique scheme to enable legits to compete and reduce indistinguishable DDoS.

• Advantage:1. Shield the location of server2. sPoW frees a server from traffic verification burden.

• Disadvantage:1. Didn’t give a clear explanation of how to utilize systems as intermediaries.2. Have to implements many kinds of intermediaries plug-in.3. Clients have to install many plug-in of intermediaries.4. Cost burden to other system/service.

Page 41: DaaS :  DDoS Mitigation-as-a-Service

Thank youQ&A

41