student : wilson hidalgo ramirez supervisor: udaya tupakula

28
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks

Upload: iago

Post on 25-Feb-2016

43 views

Category:

Documents


3 download

DESCRIPTION

Filtering Techniques for Counteracting DDoS Attacks. Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula. Introduction. Proposal. 5. 1. Distributed Denial of Services. 2. Filtering Techniques. 3. Evaluation. Conclusion. 6. 4. Agenda. 1. Introduction. Problem: - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Student : Wilson Hidalgo RamirezSupervisor: Udaya Tupakula

Filtering Techniques for Counteracting DDoS Attacks

Page 2: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

AgendaIntroduction1

Distributed Denial of Services2

Filtering Techniques3

Evaluation4

Proposal5

Conclusion6

ITEC-8102

Page 3: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

1. Introduction

Problem:Distributed Denial of Service (DDoS) attack is a serious and challenging threat that is faced on the Internet at the present time. The consequence of this threat is the cut of service availability and the dramatic reduction of performance on the targeted network. The challenge posed by DDoS Attacks is to distinguish the normal and abnormal traffic; because, these attackers generally hide or mask their true identities and sources.

ITEC-8103

Page 4: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

1. IntroductionAim:The project is going to analyse and evaluate the different generic types of attacks and filtering techniques for counteracting DDoS attacks. As a result of this project, the lack of information about the advantages and disadvantages of different filtering techniques will be reduced.

Outcomes:• Report on the strengths and weaknesses of the different

filtering techniques.• Recommendations and suggestions about the use of

some filtering techniques to prevent DoS attacks.

ITEC-8104

Page 5: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Agenda

Distributed Denial of Services2

Filtering Techniques3

Evaluation4

Proposal5

Conclusion6

ITEC-8105

Page 6: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

2. DDoS

Flood Attacks

TCP SYN Flood AttackSmurf IP AttackUDP Flood AttackICMP Flood Attack.

Classification of DDoS

Logic/SW Attacks Ping of DeathTeardropLand

ITEC-8106

Page 7: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Agenda

Filtering Techniques3

Evaluation4

Proposal5

Conclusion6

ITEC-8107

Page 8: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

3. Filtering Techniques

Filtering Based on Hop-Count

Source Address Prefixes Filtering

History-Based IP Filtering

Filtering Techniques

ITEC-8108

Page 9: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Use network information, such as the number of hops, to distinguish spoofed from legitimate packets.

The challenge in hop-count computation is calculate the hop-count only based in the final and initial TTL.

HCF has two possible states, learning and filtering.

3. Filtering Techniques Hop-Count Filtering

ITEC-8109

Page 10: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

3. Filtering Techniques Source Address Prefix Provides support at network level for blocking malicious

traffic before it reaches and compromises vulnerable hosts.

SAPF is implemented at routers via access control lists (ACLs) that denies access to a source IP address or prefix.

SAPF record two sets of traffic on the victim. One during a non-attack period (baseline) and during an attack.

ITEC-81010

Page 11: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

3. Filtering Techniques Source Address Prefix Based on a comparative analysis of the regular traffic and

traffic attack, SPAF produces three types of algorithms.

Positive that denies all traffic going to the victim by default and only allows traffic using ACL rules.

Negative that allows all traffic by default but also have ACL rules to block traffic from some sources prefix.

Mixed that gives a list with a mix of accept and deny rules.

ITEC-81011

Page 12: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

3. Filtering Techniques Historic Based IP

Solution consist in distinguish bad and good packets by comparing the actual traffic with the previous historic traffic.

The two main parts are: a rule that will be able to distinguish legitimate traffic and a mechanism to look on the IP Address Database.

IAP store frequent IP address based on the numbers of days that appeared and the number of packets by IP address.

HIF use a sliding window to remove expired IP addresses (2 weeks).

ITEC-81012

Page 13: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Agenda

Evaluation4

Proposal5

Conclusion6

ITEC-81013

Page 14: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Weaknesses

Attributes

Strengths

Limitations

4. Evaluation

ITEC-81014

Page 15: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Advantages Learning and filtering state increment the efficiency of

the filtering technique.

HFC is able to recognise up to 90% of spoofed IP packets.

Effectiveness are: the method of capturing legitimate Hop-Count values, the limited possible number of TTL values and the stability on the routing behaviour in the Internet.

Use of aggregation to reduce the size of the IP2HC table.

4. Evaluation Hop-Count Filtering

ITEC-81015

Page 16: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Disadvantages: Possibility to add invalid address on IP2HC table using

real IP address. Use of network address translation (NAT) creates invalid

entries and hop-count on the IP2HC table.

Limitations: HFC make the assumption that most of the available

DDoS attacking tools are not able to alter the initial TTL value of the packet.

A incorrect definition of threshold may allow DDoS.

4. Evaluation Hop-Count Filtering

ITEC-81016

Page 17: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Advantages Simplicity and scalability of the solution.

Flexibility to apply different strategies to counteract DDoS and ability of assigning weight to different prefix.

Computational requirements to implement ACLs are small

4. Evaluation Source Address Prefix

ITEC-81017

Page 18: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Disadvantages: Aggregation of source prefix address mixes legitimate IP

traffic with illegitimate traffic. Produce significant collateral damage by block traffic

from a prefix

Limitations: The ACLs rules are based on previous traffic attacks;

however, the patterns can change. Accurate information captured at non-attack and on-

going attack period.

4. Evaluation Source Address Prefix

ITEC-81018

Page 19: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

4. Evaluation Historic Based IP

Advantages HIF is easy to deploy in the network infrastructure

without the necessity of specialized equipment.

Criteria to classify normal traffic.

Rules to narrow the range of IP address to protect.

Efficient solution because the filtering technique is only activated after high level of traffic has been detected.

ITEC-81019

Page 20: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

4. Evaluation Historic Based IP

Disadvantages: Size of IAD table. Effectiveness in look up process.

Limitations: Resources on equipment. HIF allow DDoS attack with real IP address.

ITEC-81020

Page 21: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Administrationcomplexity

Scientific analysis

Detectioneffectiveness

Scope of involvement

Logging capability

Transparencylevel

Factors to consider

Implementationcomplexity

Scalability

Preventioneffectiveness

Range of applicability

Reaction timeliness

Effectiveness leavingNormal traffic

4. Evaluation Methodology

ITEC-81021

Page 22: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Factor Significance(SS)

Assessment (AS)

HFC SAPF HIF

Implementation complexity. 3 3 3 4Administration complexity. 4 4 2 4Scalability. 4 3.5 3.5 4Detection effectiveness. 5 3.8 N/A 4Prevention effectiveness. 5 4 N/A 4Scope of involvement 3 3.5 3.5 4Effectiveness at leaving normal traffic alone 4 3.7 3 3

Transparency level for all involved parties 2 2.5 4 4Reaction timeliness 5 N/A N/A N/ALogging capability 3 N/A 2.5 N/ARange of applicability 2 3.5 3.5 4Scientific analysis 4 4.5 3 2.8

4. Evaluation Methodology

SS1*AS1 + SS2*AS2 + SS3*AS3…. + SS12*AS12

Result:Hop-Count Filtering : 133.3Source Address Prefixes Filtering : 88 History-based IP Filtering : 135.2

ITEC-81022

Page 23: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Agenda

Proposal5

Conclusion6

ITEC-81023

Page 24: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

5. ProposalThis project proposes a combination of HIF and SAPF to increase the strength of the filter and reduce the false-positive and collateral damage on the victim Advantages:

The SAPF learning process increase his accuracy with HIF criteria.

Increase of effectiveness of look up process.

Disadvantages: The combination increase the complexity of solution.

Limitation: Resources of equipment.

ITEC-81024

Page 25: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

5. Proposal

HIF and SAPFMassive flood + legitimate traffic

High speed router performing SAPF

Legitimate traffic

Legitimate traffic

Traffic dropped by SAPF

Filtering equipment

performing HIF

Factor Significance(SS)

Proposed technique

Implementation complexity. 3 2.5Administration complexity. 4 3Scalability. 4 4Detection effectiveness. 5 N/APrevention effectiveness. 5 N/AScope of involvement 3 3.5Effectiveness at leaving normal traffic alone 4

N/A

Transparency level for all involved parties 2 4Reaction timeliness 5 N/ALogging capability 3 N/ARange of applicability 2 4Scientific analysis 4 N/A

ITEC-81025

Page 26: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

Agenda

Conclusion6

ITEC-81026

Page 27: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula

6. Conclusions

The project state that History-based IP Filtering is the most effective solutions based on the factors: detection effectiveness, scalability, implementation and administration complexity.

The project identify as critical key point the selection of the threshold between normal and attack traffic on HIF and HCF.

HIF, SAPF and HCF are effective solutions to prevent flooding attacks.

The project state that Source Address Prefix filtering technique is a inefficient solution.

ITEC-81027

Page 28: Student     : Wilson Hidalgo Ramirez Supervisor:  Udaya Tupakula