DDoS Defense Mechanisms for IXP Infrastructures Tim Dijkhuizen - - PowerPoint PPT Presentation

ddos defense mechanisms for ixp infrastructures
SMART_READER_LITE
LIVE PREVIEW

DDoS Defense Mechanisms for IXP Infrastructures Tim Dijkhuizen - - PowerPoint PPT Presentation

DDoS Defense Mechanisms for IXP Infrastructures Tim Dijkhuizen Lennart van Gijtenbeek Supervisor: Stavros Konstantaras (AMS-IX) SNE: Research Project II 03-07-2018 Introduction D istributed D enial o f S ervice DDoS attacks on banks in


slide-1
SLIDE 1

DDoS Defense Mechanisms for IXP Infrastructures

Tim Dijkhuizen Lennart van Gijtenbeek

SNE: Research Project II 03-07-2018

Supervisor: Stavros Konstantaras (AMS-IX)

slide-2
SLIDE 2

DDoS Defense Mechanisms for IXP Infrastructures

Introduction

2

  • Distributed Denial of Service
  • DDoS attacks on banks in NL [1]
  • DDoS launched via botnets/booters
  • Increase in size and complexity [2]
  • IXP is a central entity
  • Challenges:

○ High traffic loads ○ IXP neutrality ○ Complex infrastructure

slide-3
SLIDE 3

DDoS Defense Mechanisms for IXP Infrastructures

Research Question

3

What (automated) solution can be developed to identify and mitigate DDoS attacks in an IXP network?

Image source - thenounproject.com

slide-4
SLIDE 4

DDoS Defense Mechanisms for IXP Infrastructures

Internet eXchange Points (IXPs)

  • Peering LAN (BGP)
  • Exchange of traffic
  • Wide range of networks connected

○ Such as banks, content providers, etc.

  • Layer 2 forwarding (no routing)
  • Route servers

4

slide-5
SLIDE 5

DDoS Defense Mechanisms for IXP Infrastructures

Amsterdam Internet Exchange (AMS-IX)

  • ~820 peers
  • 5 Tbit/s peaks each day
  • Traffic forwarding: MPLS/VPLS
  • Statistics collector: sFlow
  • Route server: BIRD
  • Current DDoS solution

○ Disable port(s), NaWas

5

slide-6
SLIDE 6

DDoS Defense Mechanisms for IXP Infrastructures

Types of DDoS Attacks

6 Image source - nbip.nl/nl/2018/05/16/nbip-ddos-data-report-2017-now-available/

slide-7
SLIDE 7

DDoS Defense Mechanisms for IXP Infrastructures

Types of DDoS Attacks cont'd

  • Volumetric attacks

○ Amplification attacks ■ E.g. DNS amplification ■ Small request, large response

  • Protocol attacks

○ E.g. TCP SYN flood ○ State exhaustion

  • Application attacks

○ Layer 7

  • No single detection method
  • Distinct in: bandwidth and packets per second

7 Image source - thenounproject.com

slide-8
SLIDE 8

DDoS Defense Mechanisms for IXP Infrastructures

Design Principles

1. Mitigate as close to the source as possible 2. No configuration required on the CEs 3. No congestion in the IXP core 4. Identification and mitigation on lower layers is preferred 5. Detect most common DDoS attacks 6. Intelligence resides in the IXP 7. Minimal impact on good traffic 8. IXP neutrality 9. Compatibility

8

slide-9
SLIDE 9

DDoS Defense Mechanisms for IXP Infrastructures

Detection Methods

  • Traffic monitoring needed

○ PE switches ○ Sample data: sFlow/Netflow

  • L2 detection

○ L2 headers are too limited ■ Frame size, CRC ○ Other parameters ■ Send rate, arrival interval

  • L3/L4 detection

9

slide-10
SLIDE 10

DDoS Defense Mechanisms for IXP Infrastructures

Detection Methods cont'd

  • Threshold-based detection

○ Calculate thresholds based on destination IP(s) ■ Scalability: thresholds on prefixes ■ IXP environment: per source AS ○ Metrics:

■ L2/L3: BPS, PPS ■ L4: TCP flags, source ports, destination ports

  • Fingerprint-based detection

○ DDoSDB [3] ○ False negatives

10

slide-11
SLIDE 11

DDoS Defense Mechanisms for IXP Infrastructures

Mitigation Methods

  • Scrubbing

○ On-site ■ Proprietary box ○ Off-site ■ NaWas

  • Access Control Lists
  • Software Defined Networking (SDN)
  • BGP Blackholing

11

slide-12
SLIDE 12

DDoS Defense Mechanisms for IXP Infrastructures

Blackholing Techniques with BGP

  • Source-based blackholing

○ IXP neutrality ○ IP spoofing / false positives

  • Destination-based blackholing on the CE
  • 1. Route withdrawal
  • 2. Static routing entry for prefix to Null0

and announce next-hop

  • Destination-based blackholing on the PE

○ Set CE next-hop to ARP-dummy ○ L2 ACL

12

slide-13
SLIDE 13

DDoS Defense Mechanisms for IXP Infrastructures

Design Proposal

13 Image source - thenounproject.com

slide-14
SLIDE 14

DDoS Defense Mechanisms for IXP Infrastructures

Added Components to IXP

14

DTM = DDoS Threat Mitigator

slide-15
SLIDE 15

DDoS Defense Mechanisms for IXP Infrastructures

Component Interaction

15

DTM = DDoS Threat Mitigator DTA = DDoS Threshold Adviser CTA = Current Traffic Analyzer

slide-16
SLIDE 16

DDoS Defense Mechanisms for IXP Infrastructures

Design Proposal

16

Threshold-based detection Three-way mitigation

slide-17
SLIDE 17

DDoS Defense Mechanisms for IXP Infrastructures

Design Workflow

17

slide-18
SLIDE 18

DDoS Defense Mechanisms for IXP Infrastructures

Identification Start Phase (1.1)

1. Peer starts the process 2. Identify PE port(s) of the victim 3. Get the CE IP, and announced prefixes (RS) 4. Start the DTA/CTA

○ Based on victim ports, and destination prefixes

5. Perform threshold comparisons 6. Present customer with exceeded prefixes ○ Customer decides which prefixes to mitigate

18

slide-19
SLIDE 19

DDoS Defense Mechanisms for IXP Infrastructures

Mitigation Start Phase (1.2)

1. Determine the culprit AS(es)

○ Compare current to historical traffic ○ ASes to mitigation prefix 2. Determine mitigation workflow

○ Culprit AS is peered with RS:

■ Perform mitigation via BGP route withdrawal (phase 2.1)

○ Culprit AS is NOT peered with RS:

■ Perform mitigation via ACL on the ingress PE (phase 2.3)

19

slide-20
SLIDE 20

DDoS Defense Mechanisms for IXP Infrastructures

CE Route Withdrawal Mitigation (2.1)

  • Instruct the RS to withdraw

the destination prefix to culprit

○ Wait for <BGP_convergence_timeout>

  • Threshold is still exceeded:

○ Method unsuccessful, restore original BGP announcement ○ Perform mitigation via BGP blackhole nexthop (phase 2.2 )

  • Threshold is NOT exceeded:

○ Continue mitigation until DDoS no longer active ○ DDoS stopped or mitigation still working?

20

slide-21
SLIDE 21

DDoS Defense Mechanisms for IXP Infrastructures

CE Blackhole Next-hop Mitigation (2.2)

  • Instruct the RS to announce

blackhole next-hop to culprit

○ Wait for <BGP_convergence_timeout>

  • Threshold is still exceeded:

○ Method unsuccessful, restore original BGP announcement ○ Perform mitigation via L2 ACL (phase 2.3)

  • Threshold is NOT exceeded:

○ Continue mitigation until DDoS no longer active ○ Monitor on ingress PE

21

slide-22
SLIDE 22

DDoS Defense Mechanisms for IXP Infrastructures

PE L2 ACL Mitigation (2.3)

  • Determine MAC addresses

and DDoS ingress PE

  • Instruct the PE to set up L2 ACL on the ingress PE

○ Based on source CE and destination CE ○ Wait for <ACL_timeout>

  • Threshold is still exceeded:

○ Identification unsuccessful, remove ACL and go to phase 1.1

  • Threshold is NOT exceeded:

○ Continue mitigation until DDoS no longer active ○ Monitor on ingress PE

22

slide-23
SLIDE 23

DDoS Defense Mechanisms for IXP Infrastructures

Proof of Concept

23

  • Focused on mitigation phases

○ Prefix identification, DTA, culprit AS identification

  • Four different scenarios

○ Peered with RS: ■ 2.1 ✔ ■ 2.1 ✘, 2.2 ✔ ■ 2.1 ✘, 2.2 ✘, 2.3 ✔ ○ Not peered with RS: ■ 2.3 ✔

Mitigation Scenario 1 Scenario 2 Scenario 3 Scenario 4 2.1 ✔ 2.2 ✘ ✔ 2.3 ✘ ✘ ✔ 2.4 ✘ ✘ ✘ ✔

slide-24
SLIDE 24

DDoS Defense Mechanisms for IXP Infrastructures

Proof of Concept cont'd

24

The DTM here also functions as the statistics collector FastNetMon: DDoS detector that supports multiple packet capture engines iPerf to generate traffic

slide-25
SLIDE 25

DDoS Defense Mechanisms for IXP Infrastructures

  • Culprit AS is peered with RS
  • BGP route withdrawal mitigation (2.1)
  • Converge timeout: 10s, analysis: 4s
  • 50Mbit normal traffic, 150Mbit threshold

Proof of Concept cont'd

25

BPS (Mbit) Threshold (Mbit) BPS (Mbit) Time (s)

Mitigation Scenario 1 Threshold detected and performing 2.1 mitigation at 27s 2.1 converge timeout at 37s 2.1 mitigation successful at 41s

slide-26
SLIDE 26

DDoS Defense Mechanisms for IXP Infrastructures

Proof of Concept cont'd

  • Culprit AS is peered with RS
  • BGP route withdrawal mitigation unsuccessful (2.1)
  • BGP blackhole next-hop mitigation (2.2)

26

BPS (Mbit) Threshold (Mbit) BPS (Mbit) Time (s)

Mitigation Scenario 2 Threshold detected and performing 2.1 mitigation at 26s 2.1 NOT successful and performing 2.2 mitigation at 40s 2.1 converge timeout at 36s 2.2 converge timeout at 44s 2.2 mitigation successful at 55s

slide-27
SLIDE 27

DDoS Defense Mechanisms for IXP Infrastructures

Proof of Concept cont'd

  • Culprit AS is peered with RS
  • BGP route withdrawal mitigation unsuccessful (2.1)
  • BGP blackhole next-hop mitigation unsuccessful (2.2)
  • Ingress PE L2 ACL mitigation (2.3)

27

BPS (Mbit) Threshold (Mbit) BPS (Mbit) Time (s)

Mitigation Scenario 3 2.1 mitigation NOT successful and performing 2.2 mitigation at 41s Threshold detected and performing 2.1 mitigation at 27s 2.1 converge timeout at 37s 2.2 mitigation NOT successful and performing 2.3 mitigation at 55s 2.2 converge timeout at 51s

slide-28
SLIDE 28

DDoS Defense Mechanisms for IXP Infrastructures

Proof of Concept cont'd

  • Culprit AS is NOT peered with RS
  • Ingress PE L2 ACL mitigation (2.3)

28

Mitigation Scenario 4

BPS (Mbit) Threshold (Mbit) BPS (Mbit) Time (s)

Threshold detected and 2.3 mitigation at 25s

slide-29
SLIDE 29

DDoS Defense Mechanisms for IXP Infrastructures

Discussion

  • Usage of route server and statistics collector
  • BGP convergence time (too long?)
  • Layer 3 ACL

○ IXP environment: focus on layer 2 mitigation

  • Fine-grained thresholds (time of day)
  • Present more details to customer

29

slide-30
SLIDE 30

DDoS Defense Mechanisms for IXP Infrastructures

Conclusion

  • Thresholds and Three-way mitigation
  • Identification requires layer 3 analysis (prefixes)
  • Mitigation achieved on layer 2

○ BGP TE ○ IXP perspective

30

slide-31
SLIDE 31

DDoS Defense Mechanisms for IXP Infrastructures

Future Work

  • Different mitigations per type of attack

○ More advanced threshold metrics

  • Testing with different sample rates
  • Test scalability of the design
  • Expand proof of concept

○ Identification phase

  • Other methods of identification

○ Unsupervised/supervised learning

31

slide-32
SLIDE 32

DDoS Defense Mechanisms for IXP Infrastructures

Questions

Image source - thenounproject.com

slide-33
SLIDE 33

DDoS Defense Mechanisms for IXP Infrastructures

References

[1] ABN AMRO Group. Service temporarily disrupted by DDoS attacks (Jan 2018). Available at https://www.abnamro.com/en/newsroom/newsarticles/2018/service-temporarily-disrupted-by-ddos-atta cks.html (Accessed on 01/06/2018) [2] Cyberscoop. Arbor: DDoS attacks growing faster in size, complexity (Jan 2018). Available at https://www.cyberscoop.com/ddos-attacks-growing-arbor-networks/ (Accessed on 01/06/2018) [3] DDoSDB. Collecting and Sharing the most important information of DDoS attacks. https://ddosdb.org/ (Accessed on 14/06/2018)

33