distributed denial of service attacks & defensesmassey/teaching/cs457/restricted... · 2011....

23
Distributed Denial of Service Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati

Upload: others

Post on 20-Sep-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Distributed Denial of Service Attacks & Defenses

Fall 2011

Guest Lecture by: Vamsi Kambhampati

Page 2: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Distributed Denial of Service (DDoS)

•  Exhaust resources of a target, or the resources it depends on

•  Resources: CPU, Memory, Bandwidth

–  Legitimate clients cannot access the target server

•  Should we care? –  For researchers: interesting problem; difficult to

solve. –  For others: monetary loss, infrastructure security.

Page 3: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Example: Bandwidth Exhaustion DDoS Attack

legitimate packets also dropped

destination

attacker packets dropped

attacker

congested router

legitimate client

attacker

Page 4: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Well-behaved and misbehaving flow at router

time

rate pkts/sec

congestion at router

Legitimate flow

Attacker flow

congested router

Page 5: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

congested router

Well-behaved and misbehaving traffic at router

time

rate pkts/sec

misbehaving aggregate gains throughput

well-behaved aggregate looses throughput

Page 6: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Well-behaved and misbehaving traffic at destination

time

rate pkts/sec

well-behaved traffic slows down when destination requests

misbehaving traffic does not slow down when destination requests

destination

Page 7: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

What is the problem?

•  Well-behaved (i.e., legitimate) traffic follows protocol rules

•  Misbehaving traffic does not follow protocol rules

•  Internet lacks distributed enforcement of protocol rules

Page 8: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Defending DDoS Attacks •  Filtering

–  Ingress filtering, Traceback, Pushback

•  Network capabilities –  Stateless Internet flow filtering (SIFF) –  Traffic validation architecture (TVA)

•  Proof of work –  Congestion puzzles, Defense by offense

•  Location hiding –  Secure overlay services (SOS), i3

Page 9: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

DDoS defense with traceback

destination

packet

routers insert edge information

destination constructs path from edge information

Page 10: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

DDoS defense with pushback

contributing router

congested router destination

identify aggregate responsible for congestion

pushback to contributing router

Page 11: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Network Capabilities

•  Fundamental change to the Internet, so that sender must have authorization from receiver to send traffic – Receiver decides what traffic it wants to

receive or not receive – Network enforces receiver’s decision

Page 12: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Phase 1: Request Capabilities

destination source

SYN

pre-capabilities

SYN SYN

Page 13: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Pre-Capabilities

•  Cryptographically generated at each router R –  Each router can independently verify its own pre-

capability

•  Timestamp + Hash(SrcIP, DstIP, time, Rsecret) –  SrcIP, DstIP tie the capability to a flow –  Rsecret : secret key only known to the router (the

same secret is used for all pre-capabilities) •  Rsecret changed twice per timestamp roll over

Page 14: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Phase 2: Authorizing a source

destination source

host-capability

SYN

attacker

Page 15: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Host-Capability

•  Cryptographically generated at the destination using pre-capabilities

•  Timestamp + Hash(pre-capabilities, N, T) –  N is the number of packets authorized per

capability –  T is the time period for which the capability is valid

•  Routers track N, and T

Page 16: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Phase 3: Send Traffic

destination source

DATA

verify pre-capability

verify host-capability

attacker BOGUS

Page 17: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Traffic Classes

•  Traffic classes –  Request

•  Request packets (such as TCP SYN) –  Regular

•  Packets with capabilities –  Demoted

•  Packets with invalid capabilities –  Legacy

•  Separate bandwidth allocated to regular and request traffic at each router

Page 18: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Denial of Capabilities (DoC)

•  Attacker sends flood of request packets – Legitimate requests get lost before

reaching the destination •  TVA solution:

– Path identifiers (Pi)

Page 19: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Path Identifiers

•  Routers insider Pi bits into request packets – Kind of like pre-capabilities

•  Next downstream router fair-queues on the Pi bits inserted at upstream routers – Number of Pi queues = number of

upstream routers

Page 20: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Simulation Topology

destination

colluder

10ms

10ms

10 legitimate clients

1 ~ 100 attackers

10Mbps, 10ms

bottleneck link

Page 21: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Simulation Results (1)

Legacy traffic floods

As number of attackers increase, legitimate clients

suffer

Legitimate clients are unaffected

Page 22: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Simulation Results (2)

Request traffic floods

Page 23: Distributed Denial of Service Attacks & Defensesmassey/Teaching/cs457/Restricted... · 2011. 11. 18. · Attacks & Defenses Fall 2011 Guest Lecture by: Vamsi Kambhampati. Distributed

Summary

•  DDoS attacks are a major threat to the Internet

•  Capabilities make fundamental changes to the Internet to defend DDoS attacks – Sender needs authorization from receiver

to send traffic •  Capabilities setup is challenging

– Denial of Capability attacks