Outline Distributed Denial of Service Introduction Attacks - - PDF document

outline distributed denial of service
SMART_READER_LITE
LIVE PREVIEW

Outline Distributed Denial of Service Introduction Attacks - - PDF document

Outline Distributed Denial of Service Introduction Attacks Characteristics of DDoS attacks CS 239 Some examples Security for Networks and Proposed prevention methods System Software May 15, 2002 Lecture 12 Lecture 12


slide-1
SLIDE 1

Lecture 12 Page 1 CS 239, Spring 2002

Distributed Denial of Service Attacks CS 239 Security for Networks and System Software May 15, 2002

Lecture 12 Page 2 CS 239, Spring 2002

Outline

  • Introduction
  • Characteristics of DDoS attacks
  • Some examples
  • Proposed prevention methods

Lecture 12 Page 3 CS 239, Spring 2002

Introduction

  • DDoS is a relatively new kind of attack

– First seen at small scale late in 99

  • Use standard denial of service tools

– SYN floods, smurf attacks, etc.

  • Combined with not-very-sophisticated

distributed systems technology

  • Resulting in an extremely effective attack

The Problem

Compromised nodes start a DDoS attack Other nodes on target’s network also suffer

Lecture 12 Page 5 CS 239, Spring 2002

Other Elements of Such Attacks

  • Each attacking machine can spoof its IP

address

  • Typically under control of a single master

machine – Why is this “better” than launching from the attacker’s own machine?

  • Often able to use different kinds of attacks

Lecture 12 Page 6 CS 239, Spring 2002

Why Are Distributed Denial of Service Attacks Hard to Handle?

  • Single machine denial of service

attacks are hard to handle

  • Spoofed IP addresses makes it harder
  • The Internet offers few or no tracing

tools

  • Hacker toolkits make it trivial to

compromise many machines

slide-2
SLIDE 2

Lecture 12 Page 7 CS 239, Spring 2002

Sample Distributed Denial of Service Toolkits

  • Trinoo
  • Tribe Flood Network
  • Stacheldraht

Lecture 12 Page 8 CS 239, Spring 2002

Trinoo

  • An early example
  • Relatively unsophisticated
  • But still effective
  • Doesn’t spoof IP addresses
  • Uses UDP flooding attacks

–Basically, sending streams of UDP packets at random ports

Lecture 12 Page 9 CS 239, Spring 2002

Trinoo Masters and Daemons

  • The machines actually sending the UDP

packets are daemons

  • The daemons are controlled by one or more

masters

  • Master machines start and stop attacks

– And specify the victim

  • Daemons store encrypted list of acceptable

masters

Lecture 12 Page 10 CS 239, Spring 2002

Tribe Flood Network (TFN)

  • Somewhat more sophisticated than

trinoo

  • Also uses master and daemon concept
  • But can spoof IP addresses
  • And can exploit several different

weaknesses – TCP SYN flood, ICMP echo request flood, smurf attacks, plus UDP floods

  • Master/daemon communications sometimes

encrypted

Lecture 12 Page 11 CS 239, Spring 2002

Stacheldraht

  • German for barbed wire
  • Derived, apparently, from Tribe Flood

Network

  • Added encryption to master/daemon

communications before TFN did

  • Uses similar attacks to TFN

Lecture 12 Page 12 CS 239, Spring 2002

Where Did the Toolkits Come From?

  • A German hacker who calls himself

Mixter wrote at least some of them –TFN, at least

  • Other hackers altered his code or wrote

their own

  • After authors fiddled around a bit, they

posted the kits to hacking sites

slide-3
SLIDE 3

Lecture 12 Page 13 CS 239, Spring 2002

Effects of Distributed Denial of Service Attacks

  • Successfully launched against Yahoo,

CNN, ETrade, many other sites

  • Less successfully launched against

Microsoft –Attacker didn’t have enough client machines

  • Attacks occur regularly

Lecture 12 Page 14 CS 239, Spring 2002

Combating Distributed Denial of Service Attacks

  • Desirable properties of solution
  • Approaches

Lecture 12 Page 15 CS 239, Spring 2002

Desirable Solution Properties

Should be quick

Lecture 12 Page 16 CS 239, Spring 2002

Desirable Solution Properties

Should be accurate

Lecture 12 Page 17 CS 239, Spring 2002

Desirable Solution Properties

Should be cheap

  • To deploy
  • To run

Lecture 12 Page 18 CS 239, Spring 2002

Desirable Solution Properties

Must interoperate properly with existing Internet technology Not realistic to change basic stuff

slide-4
SLIDE 4

Lecture 12 Page 19 CS 239, Spring 2002

Desirable Solution Properties

Must itself be secure

Lecture 12 Page 20 CS 239, Spring 2002

Candidate Approaches

  • Filtering at the target
  • Tracing approaches
  • Pushback approaches
  • Filtering near source
  • Cooperative approaches
  • Public hygiene approaches
  • Law enforcement approaches

Lecture 12 Page 21 CS 239, Spring 2002

Filtering at the Target

  • When attack is detected, filter it
  • How?

–Based on source IP addresses –Based on other header information –Based on packet payload information

  • Modern routers can do this filtering

Filtering Solutions

Shut off the flow at the target’s router

Lecture 12 Page 23 CS 239, Spring 2002

Problems With Filtering Solutions

  • Can only be reactive
  • Often requires assistance of third party

–ISP provider or backbone site

  • Can’t filter everything always
  • More clever attacks could bypass any

simple filter

Lecture 12 Page 24 CS 239, Spring 2002

Tracing Approaches

  • Find the sending sources and shut them

down

  • Requires tracing the attack packets

back through the network

  • Not simple with today’s technology
  • Smart attackers only attack for a while

–Leaving nothing to trace

slide-5
SLIDE 5

Lecture 12 Page 25 CS 239, Spring 2002

Basics of Tracing

  • Identify an attack packet
  • Check its IP address

– If not forged, take external action – But it’s probably forged

  • Ask next upstream router where it came

from

  • And that router must ask the previous router

Tracing Solutions

Trace the attack back to its source(s) ? ? ? ? ?

Lecture 12 Page 27 CS 239, Spring 2002

Problems With Tracing Solutions

  • No automated tools to do this
  • “Asking a router” amounts to a phone

call to a system administrator

  • Ultimately requires help of backbone

providers

  • In wide DDOS, may have to trace

hundreds of attack streams

Lecture 12 Page 28 CS 239, Spring 2002

Pushback Approaches

  • Install filtering at router close to target
  • That router asks upstream routers to install

filters – Which relieves the burden on target’s router

  • Filters can be pushed further back, as

needed

  • Can rate limit, rather than filter

Lecture 12 Page 29 CS 239, Spring 2002

Pushback Solutions

Start by shutting

  • ff the flow at the

target’s router But that router may still be

  • verloaded

So push the filtering further back

Lecture 12 Page 30 CS 239, Spring 2002

Problems With Pushback Approaches

  • Requires cooperation among parties

who normally don’t cooperate

  • Must address security flaws
  • Like other types of filtering, may filter

the wrong stuff –And, with this approach, may get a lot of it

slide-6
SLIDE 6

Lecture 12 Page 31 CS 239, Spring 2002

Filtering Near the Sources

  • Try to detect the problem close to the sites

that are creating the traffic

  • Rate limit at routers close to the problem

sites

  • A distributed solution to a distributed

problem

  • Routers near attackers may have better

information

Lecture 12 Page 32 CS 239, Spring 2002

Source Side Filtering Solutions

Shut off the flow at multiple entry points

Lecture 12 Page 33 CS 239, Spring 2002

Problems With Filtering Near the Sources

  • Requires deployment at many sites to be

effective

  • Trying to detect the problem far away from

where it occurs

  • Might be foolable from outside the local

network – Turning the defense tool into an attack tool

Lecture 12 Page 34 CS 239, Spring 2002

Cooperative Approaches

  • Gather information from many

different sources

  • Analyze the total information to

understand what’s going on

  • Apply some subset of previous

mechanisms to solve the problem

Lecture 12 Page 35 CS 239, Spring 2002

Problems With Cooperative Approaches

  • Must leverage off other approaches

–Possibly inheriting their problems

  • Some information provided may be

untrustworthy

  • Presumes some network connectivity

–Will that be available during an attack?

Lecture 12 Page 36 CS 239, Spring 2002

Public Hygiene Approaches

  • A longer-term solution
  • Make sure that it’s harder to launch

attacks

  • Make sure it’s harder to spoof IP

addresses

  • Basically, make sure everyone on the

Internet has secure machines

slide-7
SLIDE 7

Lecture 12 Page 37 CS 239, Spring 2002

Public Hygiene Solutions

Make it harder to corrupt a bunch

  • f machines

Lecture 12 Page 38 CS 239, Spring 2002

Problems With Public Hygiene Approaches

  • Only work well if a high percentage of all

sites follow them

  • Only work as long as no new vulnerabilities

are discovered

  • Some of the prophylactic measures are

limiting to those who apply them – And they’re not directly getting the benefits

Lecture 12 Page 39 CS 239, Spring 2002

Law Enforcement Approaches

  • Call in the FBI
  • Have them trace down the culprit and

toss him in jail

  • That’ll teach him!

Lecture 12 Page 40 CS 239, Spring 2002

Law Enforcement Solutions

Call in the Feds!

Lecture 12 Page 41 CS 239, Spring 2002

Problems With Law Enforcement Approaches

  • The law, in its majesty, moves slowly

–Even by human standards

  • This kind of investigation is inherently

costly –And thus can’t often be done

  • Smart attackers may be very, very hard

to find

Lecture 12 Page 42 CS 239, Spring 2002

A Sample Approach

  • D-WARD
  • Being developed here at UCLA
  • One of the family of approaches that

works close to sources

slide-8
SLIDE 8

Lecture 12 Page 43 CS 239, Spring 2002

Basic Ideas Behind D-WARD

  • Deploy at routers at exit points of networks
  • Observe two-way traffic to particular

destinations

  • If “bad” traffic patterns, apply rate limits
  • Observe how “bad” traffic behaves when

limited – If well-behaved, relax limit – If poorly behaved, set higher limit

Lecture 12 Page 44 CS 239, Spring 2002

D-WARD in our Example

Deploy D- WARD at border routers

Lecture 12 Page 45 CS 239, Spring 2002

Detecting Problems

  • D-WARD observes all traffic through router

– Since border router, volume is usually reasonable

  • Track traffic by destination address

– Which won’t be forged, unlike source

  • Over time, compare pattern of traffic to

known good patterns

Lecture 12 Page 46 CS 239, Spring 2002

What Is Good Traffic?

  • For TCP, a small ratio of packets sent

to packets received –Due to ACKS

  • For things like ICMP, similar
  • But what about UDP?

–A challenging problem for the research

Lecture 12 Page 47 CS 239, Spring 2002

What Does D-WARD Do When It Finds a Problem?

  • Apply a rate limit to all traffic flowing

towards destination address – Set sufficiently low to limit problems at possible target – But some traffic still flows

  • Basic idea gives “fair share” to all offered

traffic – Which would cause attack traffic to push

  • ut good traffic

Lecture 12 Page 48 CS 239, Spring 2002

Giving Preferential Treatment to Good Traffic

  • Could observe flows to target on a

source IP address level –Keep separate counts for each source IP address observed

  • What will happen if we do that?
  • Are there some problems with realistic

routers here?

slide-9
SLIDE 9

Lecture 12 Page 49 CS 239, Spring 2002

What Happens Next?

  • D-WARD observes the local network’s

response to the rate limit – Well-behaved flows back off when rate limits are applied – Does this flow?

  • Gradually ease rate limit if the traffic is

well-behaved

  • Keep it or increase it if poorly behaved

Lecture 12 Page 50 CS 239, Spring 2002

Status of System

  • Prototype built

– In Linux router

  • Experiments have been performed
  • Works quite well

– Able to shut down large percentage of all attack traffic

  • Good flows from other places get through

– Even if their packets are indistinguishable from attack packets

Lecture 12 Page 51 CS 239, Spring 2002

Challenges for D-WARD

  • Differentiation and preferential

treatment for good flows

  • Deployment
  • Security issues