Adaptive Distributed Distributed Traffic Traffic Adaptive - - PowerPoint PPT Presentation

adaptive distributed distributed traffic traffic adaptive
SMART_READER_LITE
LIVE PREVIEW

Adaptive Distributed Distributed Traffic Traffic Adaptive - - PowerPoint PPT Presentation

Adaptive Distributed Distributed Traffic Traffic Adaptive Adaptive Distributed Traffic Control Service Service for for DDoS DDoS Attack Attack Control Control Service for DDoS Attack Mitigation Mitigation Mitigation Bernhard Plattner,


slide-1
SLIDE 1

UK ProgNet Workshop, 1st December 2004

TIK ETH Zürich

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation Adaptive Adaptive Distributed Distributed Traffic Traffic Control Control Service Service for for DDoS DDoS Attack Attack Mitigation Mitigation

Bernhard Plattner, ETH Z Bernhard Plattner, ETH Zü ürich rich

Joint work with Joint work with Matthias Matthias Bossardt Bossardt and Thomas and Thomas D Dü übendorfer bendorfer

slide-2
SLIDE 2

TIK ETH Zürich

2

The trouble with AN The trouble with AN

Approximately 1980-83 Xerox, 1970-73 Ethernet Apple Lisa, 1983 Xerox Alto, 1972 2-D Graphical User Interface IBM 5150 (PC): 1981 Intel 4004: 1971 Xerox Alto, 1972 PCs Not here yet! 1969? 1982? 1993? 1996? 2004? Active Networks System IV: 1982 Sun Workstation with BSD: 1982 Edition 1: 1970 UNIX First commercial routers (Cisco Systems): 1986 Internet: 1973 TCP/IP Entry into market Research / basic technology development Landmark technology leading to paradigm shift

slide-3
SLIDE 3

TIK ETH Zürich

3

What What Went Went Wrong Wrong? ?

  • Capsule model is scary, a security nightmare: Anybody

can inject code into the network!

  • Maintained equality (AN == Capsules) for too long
  • Anything can be done statically, if of broad interest
  • No killer application
  • Did we eliminate the need for standardization?
  • No real business case / business model

Did not convince the industry Ran out of funding Challenge of promoting and introducing a disruptive technology was underestimated

slide-4
SLIDE 4

TIK ETH Zürich

4

Three Three Ways Ways Out Out

a) Switch to research in life sciences b) Reboot and do purely basic research on AN/mobile code c) Consider non-disruptive approaches b) and c) can be followed in combination

slide-5
SLIDE 5

TIK ETH Zürich

5

Outline Outline

  • 1. Introduction and problem statement
  • 2. Approaches to denial of service mitigation
  • 3. Distributed Traffic Control: Concepts and approach
  • 4. Deployment Infrastructure
  • 5. Conclusions
slide-6
SLIDE 6

TIK ETH Zürich

6

Introduction and problem statement Introduction and problem statement

  • Frequency of reported security incidents grows

exponentially

– 1988: 6 2003: 137‘529 [CERT]

  • We will have to live with masses of ill-configured hosts
  • Knowledge and tools for attackers abound
  • Danger of massive attacks grows with the number of

compromised hosts and the ease of mounting attacks

  • Distributed denial of service (DDoS) attacks will be more

frequent

  • Defence focuses on hosts and company networks

Need for security services within the network a case for programmable networks!

slide-7
SLIDE 7

TIK ETH Zürich

7

Direct Direct DDoS DDoS attack attack

Attacker Victim Masters Agents/Zombies

slide-8
SLIDE 8

TIK ETH Zürich

8

Analysis of Analysis of direct direct DDoS DDoS attack attack

Attacker Victim Masters Zombies

From:Xi (spoofed) To: Victim V … attack packet From: Xi (spoofed) To: Zombie Zi … control packet From:Xi (spoofed) To: Master Mi … control packet

slide-9
SLIDE 9

TIK ETH Zürich

9

Reflector Reflector DDoS DDoS attack attack

(spoofed)

slide-10
SLIDE 10

TIK ETH Zürich

10

Role Role of

  • f amplification

amplification network network

  • Increase the rate of attack packets

– Attacker sends a few control packets, victim gets it all

  • Increase attack traffic by increasing packet size

– If request packet size < reply packet size

  • Increase the difficulty of counteraction

– By making traceback difficult

Note:

  • Attack traffic has V as a destination address (direct and

reflector DDoS attack)

  • Attack packet to reflector has V as the source address

(reflector DDoS attack)

slide-11
SLIDE 11

TIK ETH Zürich

11

Approaches to denial of service mitigation Approaches to denial of service mitigation

  • Reactive approaches: Detect – identify - react – relax

– Detection of DDoS attack

  • Sysadmin‘s experience
  • Traffic statistics (e.g. entropy of addresses, ports found in packets)

– Identification

  • Source addresses are often spoofed
  • traceback to identify attack source

– Reaction

  • Filter incoming attack traffic
  • Pushback (recursively follow congestion and rate-limit traffic)
  • Mount counter-attack
  • Proactive approaches

– Ingress filtering – Secure overlay networks, VPNs

slide-12
SLIDE 12

TIK ETH Zürich

12

Assessment Assessment of

  • f The

The State of State of The The Art Art

Current mitigation schemes not effective enough:

  • Detection is often difficult, due to differentiation between

good and bad traffic

  • Identification

– Traceback may be useless, since it identifies zombies or reflectors

  • Reaction

– Filtering: what, where, and who? – Pushback may hit legitimate sources and needs ubiquitous deployment – Counter-attacks may hit the wrong targets

  • Ingress filtering: quite simple, but not done (incentive?)
  • Secure overlay networks, VPNs:

– Scalability problems due to number of trust relations needed – Not adequate for generally accessible information services (Google, Yahoo, …)

slide-13
SLIDE 13

TIK ETH Zürich

13

Distributed Traffic Control: Concepts and Approach Distributed Traffic Control: Concepts and Approach

  • What would you want to do as an operator of a service

under attack?

1a Direct DDoS attack: block packet coming towards you from certain ASes 1b Reflector DDoS attack: block trigger packets flowing towards reflectors „customer-specific“ ingress filtering 2 Ask trustworthy ISPs/BSPs to install „suitable“ filters

  • Suitable filters

– Act on packets that have your address as the source, destination

  • r both
  • Definition of traffic ownership

– Packet is „owned“ by network user who is officially registered to hold either the source or destination address or both

You request ISPs/BSPs to take specific action on your (and only your!) packets

slide-14
SLIDE 14

TIK ETH Zürich

14

Traffic Traffic Control Control Device Device

User-programmable action Virtualized per network user This path only taken by user‘s

  • wn packets
slide-15
SLIDE 15

TIK ETH Zürich

15

Actions Actions

  • Restricted to prevent misuse

– Acts only on packets owned by network user – No modification of source or destination addresses – No change of time to live (TTL) – No increase of packet rate and/or size

  • Properties of user-defined functionality checked at

installation or run time

  • Context information available to user code

– Allow for context-specific actions Where am I? What type of traffic am I acting on? – Router state and configuration

Prevention of collateral damage ISPs/BSPs don‘t lose control over their network

slide-16
SLIDE 16

TIK ETH Zürich

16

Actions Actions for for DDoS DDoS attack attack mitigation mitigation

  • Actions triggered by matching source/dest address, ports,

payload, payload hashes

  • Packet dropping
  • Payload deletion
  • Source blacklisting
  • Traffic rate control

User-specific ingress control Reactive or proactive Filtering close to source of attack traffic

slide-17
SLIDE 17

TIK ETH Zürich

17

Other Other applications applications

  • Traceback

– Proactively collect packet hashes – Supporting network forensics – Locate origin of spoofed network traffic

  • Automated reaction to traffic anomalies

– Suspicious increase in connection attempts from/to server or network – Entropy variations in addresses and or ports – Detection of spoofing attempts

  • Network debugging and optimization

– Measure link delays, packet loss – Optimize content distribution network

slide-18
SLIDE 18

TIK ETH Zürich

18

Deployment Infrastructure: Network Model Deployment Infrastructure: Network Model

Network management ISP 2 Network management ISP 1 ISP 1 Network user Internet number authority ISP 2

Adapt. Device

Traffic control service provider registration control Servers Internet

Adapt. Device Adapt. Device Adapt. Device

slide-19
SLIDE 19

TIK ETH Zürich

19

Service Service Registration Registration

slide-20
SLIDE 20

TIK ETH Zürich

20

Service Service Deployment Deployment

slide-21
SLIDE 21

TIK ETH Zürich

21

Node Architecture Node Architecture

  • Premium service; few packets are rerouted through adaptive device
  • Authenticated IP address owners can reprogram adaptive devices
  • Filter order:
  • 1. Actions on behalf or owner of source IP address
  • 2. Actions on behalf or owner of destination IP address
slide-22
SLIDE 22

TIK ETH Zürich

22

Current Current status status and and future future work work

  • International patent application filed

(PCT/CH2004/000631)

  • Proof of concept implementation underway

– PromethOS environment – To be ported to Network Processor (Intel IXP line)

  • Commercialisation

– Box and service business – Start-up company – Patent licencing – Co-operation with interested company: Trade patent against research money.

Example of „modest“ active networking. More to follow?

slide-23
SLIDE 23

TIK ETH Zürich

23

Conclusions Conclusions

  • Any chance of success?

– Control remains with the network service providers – Incrementally deployable

  • Add-on box
  • Function may be integrated in future routers
  • Not necessary to have complete coverage on all routers

– Premium (paid) service for large customers (not home users!) – Business incentive for network service providers

  • Did we address the issues?

– Approach not scary for ISPs: Safe, scalable, controllable – Ever changing shape of DDoS threat needs adaptive solution – Standardization may happen through market forces – We have a business model and business proposition – Technology is not disruptive

slide-24
SLIDE 24

UK ProgNet Workshop, 1st December 2004

TIK ETH Zürich

Thank you! Thank Thank you you! !

Questions Questions? ?