the crossfire attack
play

The Crossfire Attack Min Suk Kang Soo Bum Lee Virgil D. Gligor - PowerPoint PPT Presentation

The Crossfire Attack Min Suk Kang Soo Bum Lee Virgil D. Gligor ECE Department and CyLab, Carnegie Mellon University May 20 2013 Old: DDoS Attacks against Single Servers typical attack : floods server with HTTP, UDP, SYN, ICMP packets


  1. The Crossfire Attack Min Suk Kang Soo Bum Lee Virgil D. Gligor ECE Department and CyLab, Carnegie Mellon University May 20 2013

  2. Old: DDoS Attacks against Single Servers  typical attack : floods server with HTTP, UDP, SYN, ICMP… packets  persistence - maximum: 2.5 days (outlier: 81 days ) - average: 1.5 days Adversary’s Challenge: DDoS Attacks are either Persistent or Scalable to N Servers  N x traffic to 1 server => high-intensity traffic triggers network detection  detection not triggered => low-intensity traffic is insufficient for N servers 2

  3. Example: “ Spamhaus ” Attack (2013) Adversary • Adversary: DDoS -> 1 Spamhaus Server 3/16 – 3/18: ~ 10 Gbps - 100K open DNS recursors persistent : ~ 2.5 days Attack traffic 3 3

  4. Example: “ Spamhaus ” Attack (2013) Adversary • Adversary: DDoS -> 1 Spamhaus Server 3/16 – 3/18: ~ 10 Gbps - 100K open DNS recursors persistent : ~ 2.5 days • Spamhaus -> CloudFlare (3/19 – 3/22) Attack traffic – non-scalable: -> 90-120 Gbps traffic is diffused over N > 20 servers in 4 hours ` Anycast 4 4

  5. Example: “ Spamhaus ” Attack (2013) Adversary - 100K open DNS recursors Attack traffic IXP Anycast • Adversary: DDoS -> 4 IXPs (3/23) – scalable : regionally degraded connectivity some disconnection - non-persistent : attack detected, pushed back & legitimate traffic re-routed in ~ 1 - 1.5 hours 5 5

  6. New: The Crossfire Attack A link-flooding attack that degrades/cuts off network connections of scalable N-server area persistently  Scalable N-Server areas - N = small (e.g., 1 -1000 servers), medium (e.g., all servers in a US state), large (e.g., the West Coast of the US)  Persistent : - attack traffic is indistinguishable from legitimate - low-rate, changing sets of flows - a ttack is “ moving target” for same N -server area - changes target links before triggering alarms 6

  7. Definitions • Target Area containing chosen target servers area e.g., an organization, a city, a state, or a country chosen servers • Target link Network link selected for flooding • Decoy server Publicly accessible servers surrounding the target area 7

  8. 1-Link Crossfire Attack Flows => Indistinguishable from Legitimate low-rate flows 40 Gbps Decoy Bots Servers … … ( 4 Kbps x 10K bots x 1K decoys) 8

  9. 1-Link Crossfire Attack Flows => Indistinguishable from Legitimate changing sets of flows Decoy Bots Servers … … 9

  10. 1-Link Crossfire Attack Flows => Alarms Not Triggered suspend flows in t < T det sec & resume later Decoy Bots Servers … … link-failure detection latency, T det link-failure detection latency, T det IGP routers: 217 sec /80 Gbps – 608 sec /60 Gbps IGP routers: 217 sec /80 Gbps – 608 sec /60 Gbps BGP routers: 1,076 sec /80Gbps – 11,119 sec /60 Gbps BGP routers: 1,076 sec /80Gbps – 11,119 sec /60 Gbps t = 40 – 180 sec => Alarms are Not Triggered 10

  11. n -Link Crossfire • n links traversed by a large number of persistent paths to a target area. small n ; e.g., 5 - 15 “ Narrow Path Waist” ≥ 3 hops (observed power law for Internet route paths) … N servers Good target link set “moving targets,” same N servers = suspend-resume flooding of different link sets 11

  12. n -Link Crossfire • n links traversed by a large number of persistent paths to a target area. small n ; e.g., 5 - 15 “ Narrow Path Waist” ≥ 3 hops (observed power law for Internet route paths) … N servers Alternate target link set “moving targets,” same N servers = suspend-resume flooding of different link sets 12

  13. n -Link Crossfire • n links traversed by a large number of persistent paths to a target area. small n ; e.g., 5 - 15 “ Narrow Path Waist” ≥ 3 hops (observed power law for Internet route paths) … N servers Relatively good target link set “moving targets,” same N servers = suspend-resume flooding of different link sets 13

  14. Degraded Connectivity # degraded bot-to-target area paths * Degradation Ratio (target link set) = # all bot-to-target area paths Small 1 target 0.9 Univ1 Univ1 Degradation ratio 0.8 Univ2 Univ2 0.7 Degradation Ratio New York New York 0.6 Pennsylvania Medium Pennsylvania 0.5 target Massachusetts Massachusetts 0.4 Virginia Virginia 0.3 East Coast (US) Large target East Coast (US) 0.2 West Coast (US) West Coast (US) 0.1 0 0 5 10 15 20 25 30 35 40 45 50 n target links Number of target links • Flooding a few target links causes high degradation (DR*) – 10 links => DR: 74 – 90% for Univ1 and Univ2 – 15 links => DR: 53% (33%) for Virginia (West Coast) 14

  15. Attack Steps & Experiments 15

  16. Attack Step 1: Link-Map Construction traceroute … persistent trace … vs. … results routers transient links … … … Internet servers target area Only persistent links are targeted 16

  17. Attack Step 2: Target-Link Selection Goal: Select n Find n links whose Target Links failure maximizes DR … => maximum coverage problem Internet servers target area 17

  18. Attack Step 3: Bot Coordination Attack Low send/receive rates Commands Flows … ~ 1 Mbps … … … … … … … Internet … servers … target area decoy server 18

  19. Experiments Geographical Distribution of Traceroute Nodes • 1,072 traceroute nodes – 620 PlanetLab nodes + 452 Looking Glass servers PlanetLab node Looking Glass server 19

  20. Experiments Target Areas Target Areas • Univ1 small • Univ2 • New York • Pennsylvania medium • Massachusetts • Virginia • East Coast large • West Coast 20

  21. Degraded Connectivity 1 0.9 Univ1 Univ1 Degradation ratio 0.8 Univ2 Univ2 0.7 Degradation Ratio New York New York 0.6 Pennsylvania Pennsylvania 0.5 Massachusetts Massachusetts 0.4 Virginia Virginia 0.3 East Coast (US) East Coast (US) 0.2 West Coast (US) West Coast (US) 0.1 0 0 5 10 15 20 25 30 35 40 45 50 Number of target links n target links • Flooding a few target links causes high degradation (DR*) – 10 links => DR: 74 – 90% for Univ1 and Univ2 – 15 links => DR: 53% (33%) for Virginia (West Coast) 21

  22. Effective Independence of Bot Distribution < Bot distribution on the map > Setting: Experiments using 6 different bot Baseline distributions Distr 1 Distribution 5 4 3 2 6 Result: Baseline Degradation ratio Univ1 Distr1 No significant difference Distr2 in attack performance Distr3 Pennsylvania Distr4 Distr5 East Cost (US) Distr6 n target links 22

  23. More bots => Lower “Send” Flow Rate Average rate when flooding 10 Target Links against Pennsylvania Average send/receive rate (Mbps) Per-Bot Send-Rate (100K bots) 3 Per-Bot Send-Rate (200K bots) Per-Bot Send-Rate (500K bots) Per-Decoy Receive-Rate (350K decoys) 2 1 0 Rates 1 2 3 4 23

  24. Cost • Attack bots available from Pay-Per Install (PPI) markets [2011] Region Price per thousand bots US / UK $100 - $180 Continental Europe $20 - $60 Rest of the world < $10 – 10 target link flooding » 500 K bots =>$46K » 100 K bots =>$9K • State-/corporate-sponsored attacks use 10 – 100 x more bots • Zero cost; e.g., harvest 100 – 500 K bots for 10 links 24

  25. Crossfire vs. Other Attacks “ Spamhaus ” Old Coremelt Crossfire Design Goal Attack DDoS (2009) (2013) (2013) Scalable choice Not a of N server targets Goal Bot distribution Not a independence Goal Indistinguishability from Legitimate flows Reliance on wanted flows only Persistence 25

  26. Possible Countermeasures • Any countermeasure must address (at least one of) i. the existence of the “ narrow path waist” ii. slow network & ISP reaction • Cooperation among multiple ISPs becomes necessary for detection • Application-layer overlays can route around flooded links • Additional measures – Preemptive or retaliatory disruption of bot markets – International agreements regarding prosecution of telecommunication- infrastructure attacks 26

  27. Conclusion • New DDoS attack: the Crossfire attack – Scalable & Persistent • Internet-scale experiments – Feasibility of the attack – High impact with low cost • Generic Countermeasures – Characterization of possible solutions 27

  28. Questions? Min Suk Kang minsukkang@cmu.edu 28

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend