codef collaborative defense against large scale link
play

CoDef: Collaborative Defense against Large-Scale Link-Flooding - PowerPoint PPT Presentation

CoDef: Collaborative Defense against Large-Scale Link-Flooding Attacks Soo Bum Lee * , Min Suk Kang , Virgil D. Gligor CyLab, Carnegie Mellon University * Qualcomm Dec. 12, 2013 Large Scale Link-Flooding Attacks Massive DDoS attacks against


  1. CoDef: Collaborative Defense against Large-Scale Link-Flooding Attacks Soo Bum Lee * , Min Suk Kang , Virgil D. Gligor CyLab, Carnegie Mellon University * Qualcomm Dec. 12, 2013

  2. Large Scale Link-Flooding Attacks • Massive DDoS attacks against chosen targets in Internet Infrastructure GIG C2 Logistics ISR Smart Electric Grid scalable flooding impact Financial Services dropped legitimate packets 2

  3. Real World Example: “ Spamhaus ” Attack (2013) Adversary • flooding few links in 4 IXPs – scalable impact : regionally degraded connectivity Attack traffic – but easily mitigated : attack IXP flows are distinguished from flooding legitimate flows and filtered => lasted only ~ 1 - 1.5 hours 3 3

  4. Typical Defenses against Link-Flooding Attacks  Distinguish attack flows from legitimate ones  e.g., flow filtering, pushback, anti-spoof filtering, capability-based solutions But , advanced link-flooding attacks can easily circumvent the typical defenses 4

  5. “Crossfire” Attack (S&P’13) use “bot to public server” attack flows N bots M public servers flooding (e.g., HTTP web server) O ( NM ) flows “ indistinguishable ” attack flows from legitimate flows  many, low-rate, diverse source/destination addresses, protocol conforming, destination-wanted 5

  6. “Coremelt” Attack (ESORICS’09) use “bot to bot” colluding attack flows N bots flooding Our adversary model: “ indistinguishable link- flooding attacks” O ( N 2 ) flows 6

  7. Problems I. Identify the indistinguishable attack flows? - force the adversary’s untenable choice by conformance tests “I’m gonnamake him an offer he can’t refuse…” target II. Avoid collateral damage to legitimate flows? - route separation (i.e., providing detours for legitimate flows) III. Prevent the attack from being dispersed and causing unanticipated damage to legitimate flows? - pin down potential attack flows 7

  8. CoDef: Collaborative Defense 1. Collaborative Rerouting Target AS sends reroute requests to source ASes => provides detours around the flooded link Okay! Pls. avoid me! Link Source AS flooding Target AS 8

  9. CoDef: Collaborative Defense 2. Collaborative Rate Control Target AS sends rate-control requests to source ASes => allows source AS to prioritize flows Okay! Pls. slow down! Link Source AS flooding Target AS 9

  10. Motivations of Collaborative Defense Target AS  Has no way to distinguish attack flows by itself  Has limited control over the incoming traffic e.g., end-to-end AS-paths, traffic rate Source AS  Has no idea about the flooding at the remote target  Has good reason for collaboration to circumvent flooding Transit ASes  Has no incentive/motivation for changing (optimized/complex) routing policies 10

  11. CoDef Architecture • CoDef adds complementary routing functions – route controllers , secure route-control channels route-controller route-controller route-control autonomous router channel system 11

  12. Collaborative Rerouting C is flooded and A ’s packets to G are dropped (1) C sends re-route message to A : “ Please avoid me (i.e., C )” B * : default route R1 CG* BCG* CFG A BFG CBFG R2 Flooding B C G* A G D ABCG* F D E ADEFG FG * DEFG* EFG* FCG DABCG EDABCG 12

  13. Collaborative Rerouting C is flooded and A ’s packets to G are dropped (1) C sends re-route message to A : “ Please avoid me (i.e., C )” (2) A refers to its routing table and finds alternate route: ADEFG B * : default route R1 CG* BCG* CFG A BFG CBFG R2 Flooding B C G* A G D ABCG* F D E ADEFG FG * DEFG* EFG* FCG DABCG EDABCG 13

  14. Collaborative Rerouting C is flooded and A ’s packets to G are dropped (1) C sends re-route message to A : “ Please avoid me (i.e., C )” (2) A refers to its routing table and finds alternate route: ADEFG (3) A changes “Import Policy” of its BGP router (i.e., R2) B * : default route R1 CG* BCG* CFG A BFG CBFG R2 Flooding B C G* A G D ABCG* F D E ADEFG FG * DEFG* EFG* FCG DABCG EDABCG 14

  15. Collaborative Rerouting C is flooded and A ’s packets to G are dropped (1) C sends re-route message to A : “ Please avoid me (i.e., C )” (2) A refers to its routing table and finds alternate route: ADEFG (3) A changes “Import Policy” of its BGP router (i.e., R2) * : default route CG* “What if domain A BCG* CFG BFG CBFG is single-homed Flooding B C reroutingrequest exclusively to B ?” G* => rerouting at B A G ABCG* F D E ADEFG FG * DEFG* EFG* FCG DABCG EDABCG 15

  16. Rerouting Conformance Test Link Flooding 16

  17. Rerouting Conformance Test Okay! Link Flooding Okay! 17

  18. Rerouting Conformance Test 18

  19. Rerouting Conformance Test oh… wait… identify attack Link flooding has flows Flooding stopped! let’s create new attack flows ! 19

  20. Rerouting Conformance Test oh… wait… identify attack Link flooding has flows Flooding stopped! let’s create new attack flows ! Adversary’s untenable choice : give up the attack or be detected (by conforming to the test) (by creating new attack flows) 20

  21. Path Pinning identify attack flows! Link Flooding CoDef fixes attack paths to the target to prevent unanticipated damages 21

  22. Evaluation of Collaborative Rerouting  Internet AS topology  40K+ ASes and their business relationships (e.g., customer-provider, peer-peer) from CAIDA  538 attack ASes selected based on real spam bot distribution  Forwarding path decision model  preference: (i) cheaper paths; (ii) shorter paths 22

  23. Evaluation of Collaborative Rerouting evaluate the “availability of alternate paths” from legitimate ASes to a destination conservative attack scenario  all ASes on the attack paths (i.e., paths from attack ASes to destination) are the flooding targets Finding alternate paths : “ avoid target ASes ”  three evaluation policies  strict … P 1 … P 3  viable S … path exists?  flexible … D P 2 … P 4 … 23

  24. Availability of Alternate Paths 100 Destination ASes Series1 AS 20144 Connection Ratio (%) 80 Series2 AS 297 Series3 AS 7500 60 Series4 AS 27 Series5 40 AS 2149 Series6 AS 29216 20 0 strict 1 viable 2 flexible 3 24

  25. Ease of Deployment • No significant deployment cost – no changes to existing systems (e.g., BGP and OSPF)  honors routing policies of individual ASes  requires no disclosure of internal topology/policies • Significant deployment incentives – technical advantage  detects and mitigates large-scale link-flooding attacks – economical advantages  provides premium services 25

  26. Conclusion • CoDef : a practical mechanism for defending against large-scale link-flooding attacks • Test to identify the attack flows exploiting adversary’s untenable choices • Significant deployment incentives 26

  27. Thank You 27

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend