CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
CSE 543 - Computer Security (Fall 2006)
Lecture 18 - Network Security November 7, 2006
URL: http://www.cse.psu.edu/~tjaeger/cse543-f06/
1
CSE 543 - Computer Security (Fall 2006) Lecture 18 - Network - - PowerPoint PPT Presentation
CSE 543 - Computer Security (Fall 2006) Lecture 18 - Network Security November 7, 2006 URL: http://www.cse.psu.edu/~tjaeger/cse543-f06/ CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger 1 Denial of Service Intentional
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
1
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
2
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
domain (e.g., local network)
3
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
broadcast IP addresses (e.g., 192.168.27.254)
Host Host Host Host Host Host Host Host Host
adversary Broadcast victim
4
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
5
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
6
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
work than
cryptographic hash function
hash function, how hard would it be to solve the puzzle?
7
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
8
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
9
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
10
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
11
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
routing and congestion control, …
consume lots of resources on the server side
12
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
13
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger
14
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page
– Helps spoofed sources, not much else
– Limit availability of zombies, not feasible – Prevent compromise, viruses, …
– Pre- or dynamically allocate bandwidth – E.g., diffserv, RSVP – Helps where such things are available …
– E.g,. CDS – Useful for static content
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page
– Use local algorithm, ID-esque processing – Flag the sources/types/links of DDOS traffic
– Contact upstream routers using PB protocol – Indicate some filtering rules (based on observed)
– Eventually, all (enough) sources will be filtered
R1 R2 R3 R4 R1 R2 R3 R4
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page
– Include packets and previous hop … – At low frequency (1/20,000) …
– Use per-hop data to look at – Statistics say that the path will be exposed
– Add filters at routers along the path
R1 R2 R3 R4
R1 R2 R3
CSE543 Computer (and Network) Security - Fall 2006 - Professor Jaeger Page
– too many untrusting, ill-informed, mutually suspicious parties must play together well (hint: human nature) – solution have many remaining challenges
– Large ISP police there ingress/egress points very carefully – Watch for DDOS attacks and filter appropriately
– Products in existing that coordinate view from many points in the network to identify upswings in – Interestingly, this is the same way they deal with worms ...