The Crossfire Attack Min Suk Kang Soo Bum Lee Virgil D. Gligor - - PowerPoint PPT Presentation

the crossfire attack
SMART_READER_LITE
LIVE PREVIEW

The Crossfire Attack Min Suk Kang Soo Bum Lee Virgil D. Gligor - - PowerPoint PPT Presentation

The Crossfire Attack Min Suk Kang Soo Bum Lee Virgil D. Gligor ECE Department and CyLab, Carnegie Mellon University May 20 2013 Old: DDoS Attacks against Single Servers typical attack : floods server with HTTP, UDP, SYN, ICMP packets


slide-1
SLIDE 1

The Crossfire Attack

Min Suk Kang Soo Bum Lee Virgil D. Gligor ECE Department and CyLab, Carnegie Mellon University May 20 2013

slide-2
SLIDE 2

Old: DDoS Attacks against Single Servers

2

Adversary’s Challenge:

DDoS Attacks are either Persistent or Scalable to N Servers

  • N x traffic to 1 server => high-intensity traffic triggers network detection
  • detection not triggered => low-intensity traffic is insufficient for N servers
  • typical attack: floods server with HTTP, UDP, SYN, ICMP… packets
  • persistence
  • maximum: 2.5 days (outlier: 81 days)
  • average: 1.5 days
slide-3
SLIDE 3

3

Example: “Spamhaus” Attack (2013)

3

Adversary

  • 100K open DNS recursors

Attack traffic

  • Adversary: DDoS -> 1 Spamhaus Server

3/16 – 3/18: ~ 10 Gbps persistent: ~ 2.5 days

slide-4
SLIDE 4

4

Example: “Spamhaus” Attack (2013)

4

Adversary

  • 100K open DNS recursors

` Anycast

  • Spamhaus -> CloudFlare (3/19 – 3/22)

– non-scalable: -> 90-120 Gbps traffic is diffused over N > 20 servers in 4 hours

Attack traffic

  • Adversary: DDoS -> 1 Spamhaus Server

3/16 – 3/18: ~ 10 Gbps persistent: ~ 2.5 days

slide-5
SLIDE 5

5

Example: “Spamhaus” Attack (2013)

5

Adversary

  • 100K open DNS recursors

IXP Anycast

  • Adversary: DDoS -> 4 IXPs (3/23)

– scalable: regionally degraded connectivity some disconnection

  • non-persistent: attack detected, pushed back

& legitimate traffic re-routed in ~ 1 - 1.5 hours

Attack traffic

slide-6
SLIDE 6
  • Persistent:
  • attack traffic is indistinguishable from legitimate
  • low-rate, changing sets of flows
  • attack is “moving target” for same N-server area
  • changes target links before triggering alarms

6

New: The Crossfire Attack

A link-flooding attack that degrades/cuts off network connections of scalable N-server area persistently

  • Scalable N-Server areas
  • N = small (e.g., 1 -1000 servers), medium (e.g., all servers in a US state),

large (e.g., the West Coast of the US)

slide-7
SLIDE 7

7

Definitions

  • Target

area Area containing chosen target servers e.g., an organization, a city, a state, or a country

  • Target

link Network link selected for flooding

  • Decoy

server Publicly accessible servers surrounding the target area

chosen servers

slide-8
SLIDE 8

Bots Decoy Servers

8

1-Link Crossfire

… …

Attack Flows => Indistinguishable from Legitimate

low-rate flows

40 Gbps (4 Kbps x 10K bots x 1K decoys)

slide-9
SLIDE 9

Bots Decoy Servers

9

1-Link Crossfire

… …

Attack Flows => Indistinguishable from Legitimate

changing sets of flows

slide-10
SLIDE 10

link-failure detection latency, Tdet

IGP routers: 217 sec/80 Gbps – 608 sec/60 Gbps BGP routers: 1,076 sec/80Gbps – 11,119 sec/60 Gbps

Bots Decoy Servers

10

1-Link Crossfire

… …

suspend flows in t < Tdet sec & resume later

Attack Flows => Alarms Not Triggered t = 40 – 180 sec => Alarms are Not Triggered link-failure detection latency, Tdet

IGP routers: 217 sec/80 Gbps – 608 sec/60 Gbps BGP routers: 1,076 sec/80Gbps – 11,119 sec/60 Gbps

slide-11
SLIDE 11

11

n-Link Crossfire

  • n links traversed by a large number of persistent paths to a target area.

small n; e.g., 5 - 15 “Narrow Path Waist” (observed power law for Internet route paths) “moving targets,” same N servers = suspend-resume flooding of different link sets

≥ 3 hops

target link set Good

N servers

slide-12
SLIDE 12

12

n-Link Crossfire

  • n links traversed by a large number of persistent paths to a target area.

small n; e.g., 5 - 15 “Narrow Path Waist” (observed power law for Internet route paths) “moving targets,” same N servers = suspend-resume flooding of different link sets

≥ 3 hops

target link set Alternate

N servers

slide-13
SLIDE 13

13

n-Link Crossfire

  • n links traversed by a large number of persistent paths to a target area.

small n; e.g., 5 - 15 “Narrow Path Waist” (observed power law for Internet route paths) “moving targets,” same N servers = suspend-resume flooding of different link sets

≥ 3 hops

target link set Relatively good

N servers

slide-14
SLIDE 14

5 10 15 20 25 30 35 40 45 50 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

Number of target links Degradation Ratio

Univ1 Univ2 New York Pennsylvania Massachusetts Virginia East Coast (US) West Coast (US)

Univ1 Univ2 New York Pennsylvania Massachusetts Virginia East Coast (US) West Coast (US)

n target links Degradation ratio

  • Flooding a few target links causes high degradation (DR*)

– 10 links => DR: 74 – 90% for Univ1 and Univ2 – 15 links => DR: 53% (33%) for Virginia (West Coast)

14

Degraded Connectivity

* Degradation Ratio (target link set) =

# degraded bot-to-target area paths # all bot-to-target area paths

Small target Medium target Large target

slide-15
SLIDE 15

Attack Steps & Experiments

15

slide-16
SLIDE 16

Only persistent links are targeted

16

Attack Step 1: Link-Map Construction

traceroute trace results servers

transient links persistent

… … … … …

target area

Internet vs.

routers

slide-17
SLIDE 17

Goal:

Find n links whose failure maximizes DR

=> maximum coverage problem

17

Attack Step 2: Target-Link Selection

Select n Target Links

servers

Internet

target area

slide-18
SLIDE 18

Low send/receive rates ~ 1 Mbps

18

Attack Step 3: Bot Coordination

Commands

Attack Flows decoy server

… … … … …

… …

Internet

servers

target area

slide-19
SLIDE 19
  • 1,072 traceroute nodes

–620 PlanetLab nodes + 452 Looking Glass servers

19

Experiments

Geographical Distribution of Traceroute Nodes

PlanetLab node Looking Glass server

slide-20
SLIDE 20

20

Experiments

Target Areas

Target Areas

  • Univ1
  • Univ2
  • New York
  • Pennsylvania
  • Massachusetts
  • Virginia
  • East Coast
  • West Coast

small medium large

slide-21
SLIDE 21
  • Flooding a few target links causes high degradation (DR*)

– 10 links => DR: 74 – 90% for Univ1 and Univ2 – 15 links => DR: 53% (33%) for Virginia (West Coast)

21

Degraded Connectivity

5 10 15 20 25 30 35 40 45 50 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

Number of target links Degradation Ratio

Univ1 Univ2 New York Pennsylvania Massachusetts Virginia East Coast (US) West Coast (US)

Univ1 Univ2 New York Pennsylvania Massachusetts Virginia East Coast (US) West Coast (US)

Degradation ratio n target links

slide-22
SLIDE 22

Setting:

Experiments using 6 different bot distributions

Result:

No significant difference in attack performance

22

Effective Independence of Bot Distribution

< Bot distribution on the map >

n target links Degradation ratio

Baseline Distr1 Distr2 Distr3 Distr4 Distr5 Distr6 Univ1 Pennsylvania East Cost (US) Baseline Distribution Distr 1 2 3 4 5 6

slide-23
SLIDE 23

23

More bots => Lower “Send” Flow Rate

Average rate when flooding 10 Target Links against Pennsylvania

1 2 3 4 1 2 3

Average send/receive rate (Mbps) Rates

Per-Bot Send-Rate (100K bots) Per-Bot Send-Rate (200K bots) Per-Bot Send-Rate (500K bots) Per-Decoy Receive-Rate (350K decoys)

slide-24
SLIDE 24
  • Attack bots available from Pay-Per Install (PPI) markets [2011]

– 10 target link flooding » 500 K bots =>$46K » 100 K bots =>$9K

  • State-/corporate-sponsored attacks use 10 – 100 x more bots
  • Zero cost; e.g., harvest 100 – 500 K bots for 10 links

24

Cost

Region Price per thousand bots US / UK $100 - $180 Continental Europe $20 - $60 Rest of the world < $10

slide-25
SLIDE 25

25

Crossfire vs. Other Attacks

Design Goal Old DDoS Coremelt

(2009)

“Spamhaus” Attack

(2013)

Crossfire

(2013)

Persistence Scalable choice

  • f N server targets

Not a Goal

Indistinguishability from Legitimate flows Bot distribution independence

Not a Goal

Reliance on wanted flows only

slide-26
SLIDE 26
  • Any countermeasure must address (at least one of)

i. the existence of the “narrow path waist” ii. slow network & ISP reaction

  • Cooperation among multiple ISPs becomes necessary for detection
  • Application-layer overlays can route around flooded links
  • Additional measures

– Preemptive or retaliatory disruption of bot markets – International agreements regarding prosecution of telecommunication- infrastructure attacks

26

Possible Countermeasures

slide-27
SLIDE 27
  • New DDoS attack: the Crossfire attack

– Scalable & Persistent

  • Internet-scale experiments

– Feasibility of the attack – High impact with low cost

  • Generic Countermeasures

– Characterization of possible solutions

27

Conclusion

slide-28
SLIDE 28

Min Suk Kang minsukkang@cmu.edu

28

Questions?