do network layer connections solve dos
play

Do Network-layer Connections Solve DoS ? Katerina Argyraki David - PowerPoint PPT Presentation

Do Network-layer Connections Solve DoS ? Katerina Argyraki David R. Cheriton Datagrams vs. Connections Datagrams vs. Connections Connection-less network layer flexibility, simplicity best-effort service Datagrams vs. Connections


  1. Do Network-layer Connections Solve DoS ? Katerina Argyraki David R. Cheriton

  2. Datagrams vs. Connections

  3. Datagrams vs. Connections ● Connection-less network layer – flexibility, simplicity – best-effort service

  4. Datagrams vs. Connections ● Connection-less network layer – flexibility, simplicity – best-effort service ● Connection-oriented network layer – end-to-end guarantees – more mechanism in routers, connection setup

  5. Bandwidth Flooding Attacks

  6. Bandwidth Flooding Attacks G srv G

  7. Bandwidth Flooding Attacks B srv B ● Victim's link flooded with malicious traffic

  8. Bandwidth Flooding Attacks B srv B ● Victim's link flooded with malicious traffic ● Legitimate TCP clients back off

  9. Datagrams vs. Connections

  10. Datagrams vs. Connections ● Datagram approach – allow all, explicitly deny bad traffic – use filtering to block bad traffic

  11. Datagrams vs. Connections ● Datagram approach – allow all, explicitly deny bad traffic – use filtering to block bad traffic ● Connection-oriented (capability) approach – deny (or limit) all, explicitly allow good traffic – use network-layer connections to shield good traffic

  12. What about Connection Setup?

  13. What about Connection Setup? ● Must protect connection setup against DoS

  14. What about Connection Setup? ● Must protect connection setup against DoS ● Necessarily datagram traffic

  15. What about Connection Setup? ● Must protect connection setup against DoS ● Necessarily datagram traffic ● Need datagram DoS solution

  16. What about Connection Setup? ● Must protect connection setup against DoS ● Necessarily datagram traffic ● Need datagram DoS solution ● Can use to protect all datagrams

  17. What about Connection Setup? ● Must protect connection setup against DoS ● Necessarily datagram traffic ● Need datagram DoS solution ● Can use to protect all datagrams Once datagram DoS solution is deployed, connections become unnecessary

  18. The Datagram Approach B srv B

  19. The Datagram Approach B srv B ● Explicitly filter traffic from bad sources

  20. The Datagram Approach B srv B ● Explicitly filter traffic from bad sources ● Securely move filtering state close to sources – Active Internet Traffic Filtering (USENIX '05)

  21. Capabilities: Stateless Connections cli srv

  22. Capabilities: Stateless Connections marking/verification nodes cli srv

  23. Capabilities: Stateless Connections capability request cli srv

  24. Capabilities: Stateless Connections capability request cli srv capability

  25. Capabilities: Stateless Connections capability request cli srv capability ● Ticket to send n bytes within t seconds

  26. Capabilities: Stateless Connections capability request cli srv capability ● Ticket to send n bytes within t seconds ● No filtering state, no special inter-ISP relationships

  27. Capabilities: Stateless Connections capability request cli srv capability ● Ticket to send n bytes within t seconds ● No filtering state, no special inter-ISP relationships Elegant and easy to deploy

  28. DoS with Capability Requests capability requests B srv capability requests B ● Can flood victim with capability requests

  29. DoS with Capability Requests capability requests B srv capability requests B ● Can flood victim with capability requests

  30. DoS with Capability Requests capability requests B srv capability requests B ● Can flood victim with capability requests ● New client has trouble connecting to site

  31. DoS with Capability Requests capability requests B srv capability requests B ● Can flood victim with capability requests ● New client has trouble connecting to site Denial of Capability

  32. Setup vs. General Traffic

  33. Setup vs. General Traffic ● Are setup requests easier to protect ? – more resistant to loss – more predictable

  34. Setup vs. General Traffic ● Are setup requests easier to protect ? – more resistant to loss – more predictable ● Our position: Setup traffic is not different – with respect to vulnerability to DoS – and means required to protect it

  35. Is Connection Setup Resistant to Loss ?

  36. Is Connection Setup Resistant to Loss ? ● Assume victim knows good clients

  37. Is Connection Setup Resistant to Loss ? ● Assume victim knows good clients ● A single setup request must get through

  38. Is Connection Setup Resistant to Loss ? ● Assume victim knows good clients ● A single setup request must get through ● Can retransmit setup request until connected

  39. Is Connection Setup Resistant to Loss ? ● Assume victim knows good clients ● A single setup request must get through ● Can retransmit setup request until connected ● Probability of failure decreases exponentially

  40. Is Connection Setup Resistant to Loss ? 2.5 Gbps attack traffic B srv 100 Mbps B

  41. Is Connection Setup Resistant to Loss ? 2.5 Gbps attack traffic B srv 100 Mbps B ● Good client retransmits every second

  42. Is Connection Setup Resistant to Loss ? 2.5 Gbps attack traffic B srv 100 Mbps B ● Good client retransmits every second ● Expected time to connection is over 8 minutes

  43. Is Connection Setup Resistant to Loss ? 2.5 Gbps attack traffic B srv 100 Mbps B ● Good client retransmits every second ● Expected time to connection is over 8 minutes Response time suffers

  44. Is Setup Traffic Policeable ?

  45. Is Setup Traffic Policeable ? ● Attack sources send more than good sources

  46. Is Setup Traffic Policeable ? ● Attack sources send more than good sources ● Fair-queue setup requests

  47. Is Setup Traffic Policeable ? ● Attack sources send more than good sources ● Fair-queue setup requests ● Each source gets same share of receiver's bwdth

  48. Is Setup Traffic Policeable ? G srv B ● Fair-queuing per incoming interface

  49. Is Setup Traffic Policeable ? B srv B ● Fair-queuing per incoming interface ● Ineffective during highly distributed attacks

  50. Is Setup Traffic Policeable ? B srv B ● Fair-queuing per source

  51. Is Setup Traffic Policeable ? B srv B ● Fair-queuing per source ● Similar state with per-source filtering

  52. Is Setup Traffic Policeable ? B srv B ● Fair-queuing per source ● Similar state with per-source filtering At the cost of simplicity and deployability

  53. The Datagram Approach B srv B ● Explicitly filter setup requests from bad sources

  54. The Datagram Approach B srv B ● Explicitly filter setup requests from bad sources ● Explicitly filter all traffic from bad sources

  55. The Datagram Approach B srv B ● Explicitly filter setup requests from bad sources ● Explicitly filter all traffic from bad sources Connections become unnecessary

  56. Capabilities as an Optimization

  57. Capabilities as an Optimization B srv B ● At least connected clients are unaffected by attack

  58. Unless there Are Lots of Bad Guys

  59. Unless there Are Lots of Bad Guys ● Undetected bad sources acquire capabilities

  60. Unless there Are Lots of Bad Guys ● Undetected bad sources acquire capabilities ● Victim must decide how to split bandwidth

  61. Unless there Are Lots of Bad Guys ● Undetected bad sources acquire capabilities ● Victim must decide how to split bandwidth ● Randomly chooses which capabilities to renew

  62. Unless there Are Lots of Bad Guys ● Undetected bad sources acquire capabilities ● Victim must decide how to split bandwidth ● Randomly chooses which capabilities to renew ● Good clients lose to bad sources

  63. Unless there Are Lots of Bad Guys ● Undetected bad sources acquire capabilities ● Victim must decide how to split bandwidth ● Randomly chooses which capabilities to renew ● Good clients lose to bad sources Undetected bad sources can always harm good traffic

  64. Capabilities = Reservations

  65. Capabilities = Reservations ● Sender reserves receiver's bandwidth

  66. Capabilities = Reservations ● Sender reserves receiver's bandwidth ● Challenge: make the “right” reservation

  67. Capabilities = Reservations ● Sender reserves receiver's bandwidth ● Challenge: make the “right” reservation ● Large botnets: each attack source sends low rate

  68. Capabilities = Reservations ● Sender reserves receiver's bandwidth ● Challenge: make the “right” reservation ● Large botnets: each attack source sends low rate ● Less relevant to restrict per-sender bandwidth

  69. Capabilities = Reservations ● Sender reserves receiver's bandwidth ● Challenge: make the “right” reservation ● Large botnets: each attack source sends low rate ● Less relevant to restrict per-sender bandwidth ● More relevant to monitor traffic patterns

  70. Conclusions ● Connections can protect good traffic against DoS ● Connection-setup relies on datagrams – must protect datagrams against DoS ● Connections become unnecessary

  71. Conclusions ● Connections can protect good traffic against DoS ● Connection-setup relies on datagrams – must protect datagrams against DoS ● Connections become unnecessary ● Capabilities may be useful optimization – must compute the “right” capability for each source

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend