denial-of-service (dos) attacks network systems security

42
Denial-of-Service (DoS) Attacks Network Systems Security Mort Anvari

Upload: indira-cote

Post on 31-Dec-2015

40 views

Category:

Documents


2 download

DESCRIPTION

Denial-of-Service (DoS) Attacks Network Systems Security. Mort Anvari. A Security Problem in Network. An adversary that has access to a network can insert new messages, modify current messages, or replay old messages in the network - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Denial-of-Service (DoS) Attacks  Network Systems Security

Denial-of-Service (DoS) Attacks Network Systems

Security

Mort Anvari

Page 2: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 2

A Security Problem in Network

An adversary that has access to a network can insert new messages, modify current messages, or replay old messages in the network

These inserted, modified, and replayed messages can go undetected until they cause severe damage to network

The physical location of the adversary in network may never be determined

Example: denial-of-service attacks

Page 3: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 3

Denial-of-Service (DoS) Attacks

Aimed to deny normal service provided by the target computer

Communication-stopping attacks ARP spoofing attack

Resource-exhausting attacks Smurf attack SYN attack

Page 4: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 4

Ping Protocol Allow any computer to check whether any other computer in the

Internet is up Any computer x can send a “ping” message to any computer y

which replies by sending back a “pong” message (thus x knows y is up)

In ping message: src = xand dst = y In pong message: src = yand dst = x

x yping(x, y)

pong(y, x)

Page 5: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 5

Broadcast Ping Protocol If in ping message dst = “all”, a copy of ping is

broadcast to every computer Each computer replies by sending back a pong, and x is

flooded with pong messages In ping message: src = xand dst = “all” In pong message: src = yand dst = x

x yping(x,all)

pong(y, x)

y´pong(y´,x)

Page 6: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 6

Smurf Attack An adversary pretends to be x and broadcasts a

ping message where src = x and dst = “all” Thus, x is flooded with pong messages that it

has not requested: denial-of-service attack at x

x y

pong(y, x)

pong(y´,x)

a ping(x,all)

Page 7: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 7

Countering Smurf Attack Make each router check the src of each

received message and discard the message if the src is suspicious

x y

y´a ping(x, all) R3R2R1

src=x shouldn’t come to me

Page 8: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 8

Clever Smurf Attack An adversary inserts a ping(x, all) message

between routers R2 and R3 R3 thinks the message was forwarded by

R2 and so accepts the message

x y

a

ping(x, all)

R3R2R1

Page 9: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 9

Countering Clever Smurf Attack

When R3 receives a message, R3 needs to determine whether message was indeed sent by R2, or was modified or replayed by an adversary between R3 and R2

If use IPSec, will need to set up SA’s between each pair of adjacent routers: too expensive

Our solution: use hop integrity protocol between each pair of adjacent routers

Page 10: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 10

Hop Integrity

Let p, q be routers connected to same subnetwork

Detection of Message Modification: when q receives a message m supposedly

from p, q can check that m was not modified after sent

Detection of Message Replay: when q receives a message m supposedly

from p, q can check that m was not a replay of an old message

Page 11: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 11

Adversary vs. Routers

The adversary can perform three types of actions to disrupt communication between two routers

Message loss Message modification Message replay

The routers are assumed to be secure and cannot be compromised by the adversary

The routers will execute hop integrity protocols that can detect and defeat the adversary actions

Page 12: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 12

Hop Integrity Protocol

Each pair of adjacent routers need to share a secret S, which is updated periodically by the two routers using a secret exchange protocol

To each IP message sent between two adjacent routers, add a sequence number sq, and an integrity check d

hd txt

hd txtsq d

IP messaged := MD(S | hd | sq | txt)

d 16 bytes if MD5;

20 bytes if SHA-1

MD MD5 or SHA-1

sq 4 bytes

Page 13: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 13

Architecture of Hop Integrity Protocols

secrets secrets

integrity check layer

secret exchange layer

pe

Network

pw or ps

Applications

Transport

Subnetwork

qe

Network

qw or qs

Applications

Transport

Subnetwork

router p router q

.

Page 14: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 14

Component of Hop Integrity Protocols

Three protocols between each pair of adjacent routers secret exchange protocol weak integrity protocol strong integrity protocol

Page 15: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 15

How to Exchange Secret

Each router p has a secret S that it uses for computing the digest of every msg sent to an adjacent router q

Both p and q need to know S What if p sends secret update message

to q periodically? Problem due to message loss

What if p sends secret update message to q periodically and q sends an ack to p? Problem due to bundling of secret exchange

layer and integrity check layer

Page 16: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 16

Secret Exchange Protocol

q updates secret S used by p by sending a secret update message to p every T hours

When p receives secret update message from q, p updates secret and sends an ack to q

If q does not receive ack from p for t seconds, q retransmits the secret update message

Page 17: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 17

Secret Exchange Protocolq p

S[0] oldS[1] new

S

S[0] = S[1] = S

S[0] = S[1] = S

BpS[0], S[1]

BqS

if S = S[0] S = S[1]then S :=S[1]

if S[1] = Sthen S[0] :=S[1]

S[0]

S[1]

S[0] oldS[1] new

S[0] = S[1] = S

BpS[0], S[1]

BqSif S[1] = Sthen S[0] :=S[1]

T hours

if S = S[0] S = S[1]then S :=S[1]

Page 18: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 18

Recovery in Secret Exchange Protocol

q p

S[0] oldS[1] new

SS[0] = S[1] = S

S[0] = S S[1]

BpS[0], S[1]

BqS

S[0]

S[1]

S[0] = S[1] = S

BpS[0], S[1]

BqSif S = S[0] S = S[1]then S :=S[1]

if S[1] = Sthen S[0] :=S[1]

t seconds

t seconds

if S = S[0] S = S[1]then S :=S[1]

BpS[0], S[1]

S[1] = S S[0]

Page 19: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 19

To detect insertion and modification Each sent msg from p to q is as follows

(hd | d | txt)where p computes d as

d = MD(S | hd | txt) On receiving a msg, q checks

if d = MD(S[0] | hd | txt) d = MD(S[1] | hd | txt)

then q forwards msgelse q discards msg

Weak Integrity Protocol

Page 20: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 20

Weak Integrity Protocol

q p

.

.

(hd | d | txt)

S[0]

S[1]S

Page 21: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 21

Strong Integrity

To detect replay, successive sequence numbers are attached to all sent msgs from p to q

Problem with reset If p is reset, unbounded number of fresh

messages are discarded by q If q is reset, it can accept unbounded

number of replayed messages Two solutions to overcome reset

Soft sequence numbers Hard sequence numbers

Page 22: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 22

Successive sequence numbers are attached to all sent msgs from p to q:

(hd | sq | txt) q maintains two variables

exp sequence number of next msgc #msgs received

On receiving a msg, q checksif (exp sq) (c = random value

cmax)then q forwards msgelse q discards msgfi; q updates exp, c, cmax

Soft Sequence Numbers

Page 23: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 23

Soft Sequence Numbers

q p

sq

.

.

(hd | sq | txt)

sq+1

exp

ccmax

sq

Page 24: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 24

Each sent msg from p to q is as follows(hd | sq | d | txt)

where p computes d asd = MD(S | hd | sq | txt)

On receiving a msg, q checksif (d = MD(S[0] | hd | sq | txt)

d = MD(S[1] | hd | sq | txt) ) (exp sq c = random value

cmax)then q forwards msgelse q discards msgfi; q updates exp, c, cmax

Strong Integrity ProtocolUsing Soft Sequence Numbers

Page 25: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 25

Hard Sequence Numbers

To overcome reset, use two operations SAVE and FETCH

When SAVE is executed, the last sequence number will be stored in persistent memory

When FETCH is executed, the last stored sequence number will be loaded from persistent memory into memory

Page 26: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 26

Strong Integrity ProtocolUsing Hard Sequence Numbers

Each sent msg from p to q is as follows(hd | sq | d | txt)

where p computes d asd = MD(S | hd | sq | txt)

On receiving a msg, q checksif (d = MD(S[0] | hd | sq | txt)

d = MD(S[1] | hd | sq | txt) ) (exp sq)then q forwards msgelse q discards msgfi; q updates exp

p and q executes SAVE periodically When waking up from a reset, p (or q) executes FETCH to

fetch last stored seq#, executes SAVE to store next seq#, and continues after SAVE finishes

Page 27: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 27

Other Applications of Hop Integrity

Mobile IP

Secure multicast

Security of routing protocols

Page 28: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 28

Mobile IP

A mobile computer c can visit a foreign network F other than its home network H

Msgs destined for c will be received by its home agent (HA) and forwarded to its foreign agent (FA)

Internet

home agent (HA)

foreign agent (FA)

F H

c

m

m

m

Page 29: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 29

Problem with Mobile IP

Mobile computer c can send a msg thru FA However, this msg may be filtered out by

next router q because its source address is “strange”

Internet

home agent (HA)

foreign agent (FA)

HF

c?

qm

m

Page 30: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 30

Mobile IP with Hop Integrity

With integrity check d added to msg m, q can check that m was indeed forwarded by FA

Thus, q ignores strange source of msg m and forwards m toward its ultimate destination

Internet

home agent (HA)

foreign agent (FA)

HF

c qm

m

d

d

m d

Page 31: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 31

Multicast

Multicast msgs are forwarded through a spanning tree from root to every multicast destination

If a destination receives a multicast msg, then each destination receives a copy of same msg with high probability

Page 32: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 32

Multicast

Multicast msgs are forwarded through a spanning tree from root to every multicast destination

If a destination receives a multicast msg, then each destination receives a copy of same msg with high probability

Page 33: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 33

Multicast

Multicast msgs are forwarded through a spanning tree from root to every multicast destination

If a destination receives a multicast msg, then each destination receives a copy of same msg with high probability

Page 34: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 34

Multicast

Multicast msgs are forwarded through a spanning tree from root to every multicast destination

If a destination receives a multicast msg, then each destination receives a copy of same msg with high probability

Page 35: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 35

Security Problem with Multicast

If adversary inserts or modifies a multicast msg between two routers in middle of tree, then only a small fraction of multicast destinations receive the inserted or modified msg

Page 36: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 36

Multicast with Hop Integrity

With hop integrity, an inserted or modified multicast message will be detected and discarded at its first hop in the spanning tree

Page 37: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 37

Routing Information Protocol (RIP)

Every 30 seconds, RIP process in router R’ sends its routing table in a response msg to RIP process in each adjacent R

R updates its routing table when it receives a response msg from any adjacent R’

Security problem

R R

RIP RIP

UDP

IP IP

Page 38: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 38

RIP with Hop Integrity With hop integrity, the response msgs are

protected against message modification, insertion, and replay

R R

RIP RIP

UDP

IP IP

Secret Update

Integrity Check

Secret Update

Integrity Check

Page 39: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 39

Security of Routing Protocols

Hop integrity can also provide uniform protection (against message modification, insertion, and replay) for other routing protocols OSPF protocols (Hello, Exchange, Flood) RSVP

Better than custom security mechanisms that have been proposed for some protocols

Page 40: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 40

Implementation of Hop Integrity

Implementation of hop integrity protocols in Linux kernel

Add integrity check digest and soft sequence number to IP options in IP header

Compatible with legacy routers Flexibility of deployment

Page 41: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 41

Related Works

Ingress filtering [RFC2827]: Completes hop integrity

Secure routing [Che97, MB96, SMG97]: Not needed if hop integrity is installed

Traceback [BLT01, SWK+01, SPS+01]: Cannot prevent denial-of-service attacks,

but can detect some of them IPsec [KA98a]:

Has goals other than dealing with denial-of-service attacks

Page 42: Denial-of-Service (DoS) Attacks  Network Systems Security

10/5/2004 42

Next Class

Security in transport layer SSL and TLS Application of SSL/TLS in Web

security