Terminus: Towards a Network-Level Deployable Architecture Against - - PowerPoint PPT Presentation

terminus
SMART_READER_LITE
LIVE PREVIEW

Terminus: Towards a Network-Level Deployable Architecture Against - - PowerPoint PPT Presentation

Terminus: Towards a Network-Level Deployable Architecture Against Distributed Denial-of- Service Attacks Felipe Huici and Mark Handley Networks Research Group Department of Computer Science Overview Terminus architecture Protecting


slide-1
SLIDE 1

Terminus:

Towards a Network-Level Deployable Architecture Against Distributed Denial-of- Service Attacks

Felipe Huici and Mark Handley Networks Research Group Department of Computer Science

slide-2
SLIDE 2

2

  • Terminus architecture
  • Protecting the architecture
  • Performance results

Overview

slide-3
SLIDE 3

3

Terminus Architecture

slide-4
SLIDE 4

4

No Magic Bullet

  • Need minimal IP-level changes that can raise the

bar for the attacker

  • Difficult deployment issues:

– Can’t change the hosts – Too expensive to change network core

  • These point towards reactive solutions at edge

ISPs

slide-5
SLIDE 5

5

Architecture Introduction

  • General idea

– Identify attack traffic at destination – Request that traffic be filtered – Block attack traffic at source ISP’s filtering box

  • Pretty obvious…

– Architecture’s novelty lies in meeting these criteria robustly and with minimum mechanism.

A S

detect filter ISP ISP Internet

slide-6
SLIDE 6

6

ISP A ISP C Internet

BM BM

C C A C C C S

BP BP IDS FM

ISP B

Terminus Architecture

IDS = intrusion detection BP = border patrol BM = border manager FM = filter manager

Block A

slide-7
SLIDE 7

7

Traffic Marking

  • Problem

– Need to know origin of attack packets

  • Must send filter request to the right place

– IP source address cannot be trusted

  • Can be spoofed
  • Solve by adding a “true-source” bit to packets

– Only Terminus ISPs with ingress filtering can set bit

slide-8
SLIDE 8

8

ISP A ISP B ISP C ISP D ISP E ISP F ISP G Terminus ISP Legacy ISP S

Preventing True-Source Bit Spoofing

Router E1 Router E2 Router F1 Router F2 Router G1 Router G2

  • Edge router at Terminus ISP connected to legacy ISP unsets this bit

for all packets

TS = 0 TS = 0

slide-9
SLIDE 9

9

Protecting the Architecture

1. Attackers in legacy ISPs 2. Malicious filtering requests 3. Spoofed traffic triggering filtering requests 4. Reflection attacks

slide-10
SLIDE 10

10

Legacy ISP A ISP B ISP D ISP C A C S

R1

R2 R3

Router D1

Problem 1: Defending Against Attackers at Legacy ISPs

  • During initial stages, legacy ISPs will be the norm
  • Use true-source bit to prioritize traffic at the destination

ISP’s peering routers

– Implement true-source bit as a diffserv code point

prioritize TS = 0 TS = 1

slide-11
SLIDE 11

11

Problem 2: Filtering Requests

  • Where to send request?

– Digitally-signed p2p mechanism used to distribute source-to-BM mappings

  • Where can it come from?

– Same mechanism distributes signed destination-to-FM mappings – BM checks if FM allowed to request filter for destination

  • BM must validate source of a filtering request

– Cannot rely on TS=1 since path may be asymmetric – Simple nonce exchange validates FM

BM

A

BP

S

FM

slide-12
SLIDE 12

12

Problem 3: Triggering Requests Through Spoofing

Scenario: attacker is in a legacy ISP that allows spoofing ISP A Legacy ISP B ISP C Internet

BM

C A S

BP src = C TS = 0 Erroneous request: Block C IDS FM

Solution: do not issue filtering request if TS = 0

slide-13
SLIDE 13

13

Problem 4: Reflection Attacks

  • In a reflection attack

– The attacker spoofs requests using victim’s address – The requests are sent to third-party servers (reflectors) – Response flood overwhelms victim

  • For most part, Terminus unaffected, except when:

– Reflector is in a Terminus ISP – Terminus path between reflector and victim

slide-14
SLIDE 14

14

Legacy ISP A

BP

A Terminus ISP B

R

S

Reflection Attacks

Terminus ISP E

Terminus ISP C EP TS: 0 SRC: S TS: 1 SRC: S ISP D TS: 0 TS: 1

slide-15
SLIDE 15

15

Performance Results

slide-16
SLIDE 16

16

Border Patrol Parallelism

cpu0 cpu1 SMP border patrol UP border patrol filter = interface 64-byte packets cpu filter filter

slide-17
SLIDE 17

17

Terminus: God of boundaries

  • Presented Terminus, a

deployable architecture against large DDoS that uses minimum mechanism

  • Robust against attack
  • Performs well even on

cheap hardware

Summary

Paper under submission, URL: http://www.cs.ucl.ac.uk/staff/F.Huici/publications/terminus-lsad.pdf

slide-18
SLIDE 18

18

Additional Slides

slide-19
SLIDE 19

19

Motivation

  • Majority of operators spend more resources on

DDoS than any other security threat

  • Attack firepower increasing
  • Majority of ISPs mitigate attacks by filtering all

traffic to victim

  • Attacks happen in the thousands per day

Sources: Symantec Internet Security Threat Report XI and Arbour Worldwide Infrastructure Security Report 2006

slide-20
SLIDE 20

20

Triggering Requests Through Spoofing

Scenario 2: Attacker is in same Terminus ISP as victim, but behind different BP ISP A ISP B Internet C S

BP2 src = C BP1

A

slide-21
SLIDE 21

21

Triggering Requests Through Spoofing

Scenario 3: Attacker is behind same BP as victim ISP A ISP B Internet C S

src = C BP

A

slide-22
SLIDE 22

22

Control Plane Performance

  • Filter manager

– 75,000 requests/sec – Biggest botnets about 1,500,000 hosts, filter in 20 secs

  • Border manager

– 87,000 requests/sec

  • Border patrol

– 354,000 requests/sec (in batches of 100 filters)

slide-23
SLIDE 23

23

Setup

  • Testbed

– Non-blocking Force10 E1200 switch

  • Computers

– Inexpensive 1U servers – Two dual-core processors at 2.66GHz – Two dual-port Gigabit Ethernet cards

  • Software

– Linux 2.6 – Click modular router for forwarding plane – C++ for control plane

slide-24
SLIDE 24

24

Protecting Terminus’ Components

  • Border and egress patrols

– Not externally visible

  • Border manager

– Off fast-path – Low return on investment for attacker

  • Filter manager

– Off fast-path – Only has to handle incoming nonces, which have priority at edge

slide-25
SLIDE 25

25

BP Forwarding Plane – HashFilter

HF IF cpu0 HF IF cpu1 SMP border patrol UP border patrol HF IF IF = Ingress Filter HF = Hash Filter = interface

slide-26
SLIDE 26

26

BP Forwarding Plane – HashFilter

  • All filters hash to same chain
  • All packets fully traverse chain before being forwarded
slide-27
SLIDE 27

27

BP Forwarding Plane – IngressFilter

  • Packets force look-up against all prefixes before being forwarded