SENSS Against Volumetric DDoS Attacks
Sivaram Ramanathan1, Jelena Mirkovic1, Minlan Yu2 and Ying Zhang3
1University of Southern California/Information Sciences Institute 2Harvard University 3Facebook
1
SENSS Against Volumetric DDoS Attacks Sivaram Ramanathan 1 , Jelena - - PowerPoint PPT Presentation
SENSS Against Volumetric DDoS Attacks Sivaram Ramanathan 1 , Jelena Mirkovic 1 , Minlan Yu 2 and Ying Zhang 3 1 University of Southern California/Information Sciences Institute 2 Harvard University 3 Facebook 1 DDoS attacks Volumetric DDoS
Sivaram Ramanathan1, Jelena Mirkovic1, Minlan Yu2 and Ying Zhang3
1University of Southern California/Information Sciences Institute 2Harvard University 3Facebook
1
networks
victim
need help of upstream ISPs
need help to place imperfect filters near attack sources to minimize collateral damage
response
infrastructure for victim to ask peers
2 *Figure taken from Arbor Networks worldwide infrastructure security report, 2016
Victim Attacker
Attacker
Attacker Attacker
APS deployed at victim
inspection and rules
as the origin of attack is upstream from victim
Bro Arbor APS
3
Victim Attacker
Attacker
Attacker Attacker First hop ISP
human channels which are error prone and slow
triggered blackhole saves ISP from attack but cuts victim from internet
defense on demand
control but is resource intensive
RTBH Bohatei
4
Victim Attacker
Attacker
Attacker Attacker
Cloud Providers
diverting all victim’s traffic towards themselves during an attack
remove attack traffic, send the rest to victim
depends on extent of geo- replication, which is costly
Cloudflare Akamai
5
to communicate with peers or remote networks
which can be easily implemented in current ISP infrastructure
attacks
types of DDoS flavors
6
7
8
Attacker SENSS client SENSS server SENSS server Victim
9
SENSS client SENSS server SENSS server Attacker Victim
10
SENSS client SENSS server SENSS server Attacker Victim SENSS directory
11
Traffic Monitor request Traffic Monitor request SENSS client SENSS server SENSS server Attacker Victim
$ $
12
SENSS server authenticates requests SENSS client Attacker Victim
$ $
13
SENSS server charges client SENSS client Attacker Victim
Gather traffic stats Gather traffic stats
14
SENSS client Attacker Victim
15
Return monitoring stats SENSS client SENSS server SENSS server Attacker Victim
16
Devise mitigation strategy SENSS server SENSS server Attacker Victim
17
Traffic control request SENSS client SENSS server Attacker Victim
$
18
SENSS server authenticates requests SENSS client Attacker Victim
$
19
SENSS server charges client SENSS client Attacker Victim
Apply control request
20
SENSS client Attacker Victim
Attack traffic blocked!
21
SENSS client Attacker Victim
22
Intelligence at victim
$ $
With incentives!
23
Simple implementation at ISP
24
Queries only on client’s owned prefixes SENSS server verifies prefix
Communication secured by TLS
Type Response from SENSS server Traffic Query Traffic stats matching predicates
25
Type Response from SENSS server Traffic Query Traffic stats matching predicates Route Query AS paths from SENSS server to prefix
26
Type Response from SENSS server Traffic Query Traffic stats matching predicates Route Query AS paths from SENSS server to prefix Traffic filter Adds filter matching predicate
27
Type Response from SENSS server Traffic Query Traffic stats matching predicates Route Query AS paths from SENSS server to prefix Traffic filter Adds filter matching predicate Route demote Demotes AS path from SENSS server to prefix with certain path segment
28
Type Response from SENSS server Traffic Query Traffic stats matching predicates Route Query AS paths from SENSS server to prefix Traffic filter Adds filter matching predicate Route demote Demotes AS path from SENSS server to prefix with certain path segment
29
Each traffic query/control consists of a predicate matching flow(s)
conjunction, disjunction and wildcard
implemented using Openflow or Netflow+ACL
from clients, authenticates and sends appropriate replies
with various border routers within the same ISP and gathers statistics
SENSS Server SENSS ISP
30
31
V S1 S2 S3 L1 L2 A B C D
32
Legit traffic from L1 and L2
V S1 S2 S3 L1 L2 A B C D
33
Periodic traffic query to S1, S2 and S3
V S1 S2 S3 L1 L2 A B C D
34
Replies S1: 1000 Mbps S2: 0 Mbps S3: 400 Mbps
V S1 S2 S3 L1 L2 A B C D
35
Attack from A
V S1 S2 S3 L1 L2 A B C D
36
More attack from B, C and D
V S1 S2 S3 L1 L2 A B C D
37
Periodic traffic query to S1, S2 and S3
V S1 S2 S3 L1 L2 A B C D
38
Replies S1: 1000 Mbps S2: 500 Mbps S3: 750 Mbps
V S1 S2 S3 L1 L2 A B C D
39
Replies S1: 1000 Mbps S2: 500 Mbps S3: 750 Mbps Replies S1: 1000 Mbps S2: 0 Mbps S3: 400 Mbps
V S1 S2 S3 L1 L2 A B C D
40
Replies S1: 1000 Mbps S2: 500 Mbps S3: 750 Mbps Unusual traffic from S2 and S3 Replies S1: 1000 Mbps S2: 0 Mbps S3: 400 Mbps
V S1 S2 S3 L1 L2 A B C D
41
Traffic filter at S3 Traffic filter at S2
V S1 S2 S3 L1 L2 A B C D
42
Attack stopped at S2 and S3!
43
certificates
using TLS and occurs over HTTPS
requests
44
higher prices
45
control actions
issue traffic control to drop traffic
46
47
floods and reflector attacks
without signature and reflector attacks with just 1—3.8% of SENSS adoption
48
floods and reflector attacks
without signature and reflector attacks with just 1—3.8% of SENSS adoption
49
floods and reflector attacks
without signature and reflector attacks with just 1—3.8% of SENSS adoption
50
floods and reflector attacks
without signature and reflector attacks with just 1—3.8% of SENSS adoption
51
botnet
52
deployment
achieves 90% for direct/single homed customer
achieves 90% of multi homed customers and remote customers
20 40 60 80 100 0.01 0.1 1 10 % attack fltered % transit ASes deploying SENSS uni-dir-single real-dir-single uni-dir-multi real-dir-multi uni-remote real-remote
53
SENSS and cloud deployment strategies
between bandwidth consumed with and without defense strategy
bandwidth
60% of bandwidth, 1.5—8 times more bandwidth than others
55
DDoS attacks can request help from upstream ISPs
to mitigate attacks
based defense
56