Top Banner
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang
80

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

Jan 20, 2016

Download

Documents

Ambrose Stone
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007

Presented by: C. W. Fan-Chiang

Page 2: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 2

Ruiliang Chen

He is currently a PhD student in the Bradley Department of Electrical and Computer Engineering at Virginia Polytechnic Institute and State University (Virginia Tech).

His research interests include traceback and mitigation mechanisms for thwarting denial-of-service attacks, attack-resilient routing protocols forwireless ad hoc networks, and security issues incognitive radio networks.

He is a student member of the IEEE.

Page 3: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 3

Jung-Min Park

He received the bachelor’s andmaster’s degrees in electronic engineering fromYonsei University, Seoul, Republic of Korea, in1995 and 1997, respectively, and the PhDdegree from the School of Electrical andComputer Engineering at Purdue University in2003.

His research interests include DoS attackcountermeasures, e-commerce protocols,cognitive radio networks, key management, and applied cryptography.

He is a member of the IEEE and the ACM.

Page 4: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 4

Randolph Marchany

He is currentlythe director of the Virginia Polytechnic Instituteand State University (Virginia Tech) IT SecurityTesting Lab, a component of the university’sInformation Technology Security Office.

a coauthor of the FBI/SANS Institute’s “Top 10/20 Internet Security Vulnerabilities” , a co-author of the SANS Institute’s “Responding to DDoS Attacks” ,Computer Security—Incident Handling—Step by Step,”

He is a member of the IEEE.

Page 5: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 5

Page 6: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 6

Page 7: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Defending against DDoS attacks is challenging for two reasons. First, the number of attackers involved in a

DDoS attack is very large. Second, attackers usually spoof their IP

addresses, which makes it very difficult to trace the attack traffic back to its sources.

Ingress/egress ; Subnet Spoofing?

112/04/21 OPLab,NTUIM 7

Page 8: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Client puzzle, Max-min Servercentric router throttles, Differentiated service

The ideal countermeasure paradigm of Max-min Servercentric router throttles, the attack detection module is placed

at (or near) the victim and the packet filtering module is placed as

close to the attack sources

112/04/21 OPLab,NTUIM 8

Victim

Attacker

Packet Filtering

Attack Detection

Page 9: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

When attacks are detected downstream close to the victim, the upstream routers close to the attack sources filter attack packets using summarized attack signatures sent by the detection module.

However, have either or both of the following two drawbacks

112/04/21 OPLab,NTUIM 9

Page 10: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

1.The need to securely forward attack signatures to the upstream routers.

May require a global key distribution infrastructure for authenticating and verifying the attack signatures.(which is costly to deploy and maintain.)

112/04/21 OPLab,NTUIM 10

Page 11: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

2.The dependence on attack signatures to separate attack traffic from legitimate traffic. Such a signature is very difficult for three reasons.

112/04/21 OPLab,NTUIM 11

Page 12: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

2-1.In many cases, an attack detection module can only detect the existence of attacks but may not formulate any attack signatures from the observed traffic

112/04/21 OPLab,NTUIM 12

Page 13: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

2-2.Even if an attack signature is obtained, it may not be usable to a router to filter packets when the signature lies above the network layer.

Because a router is a network-layer device, it would severely degrade its performance to examine the contents of every packet to match high-layer attack signatures

112/04/21 OPLab,NTUIM 13

Page 14: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

2-3.Even signatures in the network layer may have limited value because the attackers can readily manipulate corresponding information.

Because An attacker can spoof source IP addresses and change the protocol field in the IP header, rendering these fields useless as valid attack signatures. The only absolutely reliable information in a packet is the destination IP address.

112/04/21 OPLab,NTUIM 14

Page 15: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Attack Diagnosis (AD), a novel attack mitigation scheme that combines the concepts of Pushback and packet marking to thwart DDoS attacks.

112/04/21 OPLab,NTUIM 15

Page 16: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

1.An Intrusion Detection System (IDS) installed at the victim (or at its firewall) detects an attack.

2.The victim instructs the upstream routers to start marking packets with trace back information.

3. Based on the marking information extracted from collected packets, the victim separates an attacker from other clients and traces back to the attack source.

4. The victim instructs the appropriate upstream routers to filter attack packets.

112/04/21 OPLab,NTUIM 16

Page 17: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

However, AD is not appropriate for large-scale attacks involving a large number of attackers because the process would be very slow.

An extension to AD called Parallel Attack Diagnosis (PAD) that can throttle traffic coming from multiple attackers simultaneously in a single round.

112/04/21 OPLab,NTUIM 17

Page 18: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

AD/PAD support the ideal DDoS countermeasure paradigm

AD/PAD is reactive in nature. No communication overhead is required when a network is not under attack.

AD/PAD employ deterministic packet marking, they are robust against forgery of marking fields

112/04/21 OPLab,NTUIM 18

Page 19: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

AD/PAD throttle attackers in a “divide and conquer” fashion, very low false positive ratios are incurred. Moreover, PAD provides a “tunable” parameter that enables the network to adjust the diagnosis process delay and the false positive ratio.

AD/PAD do not rely on attack signatures for packet filtering and require no global key distribution infrastructure.

112/04/21 OPLab,NTUIM 19

Page 20: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 20

Page 21: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Assumptions Overview of AD and PAD Attack Diagnosis Parallel Attack Diagnosis Analysis of False Positives Analysis of Attack Mitigation Delay

112/04/21 OPLab,NTUIM 21

Page 22: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Every host, either a client or a server, is connected to its local edge router.

Edge routers are, in turn, interconnected by core routers.

We refer to the server host being attacked as the victim.

112/04/21 OPLab,NTUIM 22

Page 23: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

A recent study has shown that 95 percent of the routes observed in the Internet have fewer than five observable daily changes. we make the reasonable assumption that every route from a client to the victim is fixed during the timeframe of interest.

Assume that Internet routers are not compromised.

112/04/21 OPLab,NTUIM 23

Page 24: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

False Negative to denote an attacker whose malicious packets have not been filtered,

False Positive to denote a legitimate client whose packets have been incorrectly throttled.

112/04/21 OPLab,NTUIM 24

Page 25: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

The existence of an IDS module installed at the victim (or at its firewall), which is able to identify the existence of attacks after observing malicious traffic.

112/04/21 OPLab,NTUIM 25

Page 26: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Some of the router interfaces are labeled with a locally unique number that identifies that interface port. We call this number the port identifier (PID).

However, when an interface port is connected to multiple hosts via a broadcast link-layer channel (such as in a LAN), a PID cannot be used to uniquely identify a host.

112/04/21 OPLab,NTUIM 26

Page 27: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Router F maintains a virtual PID table, which maps a “virtual PID” to every MAC address that the router observes coming through interface x.

112/04/21 OPLab,NTUIM 27

Page 28: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 28

Page 29: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

PID is locally unique within a router, a string of PIDs can be used to uniquely identify the path from a server to a client. Eg.4-8-24-42 、 53—8-50-27

AD is capable of throttling malicious traffic coming from a modest number of attackers.

PAD solves this problem by dealing with multiple attackers simultaneously.

112/04/21 OPLab,NTUIM 29

Page 30: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

To support AD, a router needs to mark packets with its PIDs and other traceback-related information. For this purpose, we overload the 16-bit Identification field and one reserved bit in the IP header.

Note that IP fragments constitute a very small proportion of the actual Internet traffic (less than 0.25 percent)

112/04/21 OPLab,NTUIM 30

Page 31: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Use a-bit hop-count field, a b-bit PID field, and a c-bit XOR field, where

112/04/21 OPLab,NTUIM 31

Page 32: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Hop-count field in a packet records the number of hops from a router that first marks a given packet to the edge router that is immediately upstream of the victim.

PID field of a given packet records the PID of the router’s input interface port that processed the packet.

XOR field of a packet records the value obtained by taking the XOR (exclusive OR) of the least significant c bits of PID values.

112/04/21 OPLab,NTUIM 32

Page 33: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

A router interface can be set to either of two marking modes. Active Deterministic Marking Mode

(ADMM) for V if it processes every packet destined for V as follows:

1) sets the hop-count field to zero, 2) copies its PID to the PID field, and 3) copies the least significant c bits of its PID to

the XOR field.

112/04/21 OPLab,NTUIM 33

Page 34: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

A router interface can be set to either of two marking modes. Passive Deterministic Marking Mode

(PDMM) for V if it processes every packet destined for V as follows:

1) increases the hop-count field by one and 2) computes the bit-by-bit XOR value of the

least significant c bits of its PID and the XOR field value and writes the result back to the XOR field.

112/04/21 OPLab,NTUIM 34

Page 35: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

AD process is triggered. The victim begins the process by sending a “DAI” (Diagnose-All-Interfaces) request with the TTL field set to 255 to its immediate edge router.

DII-p(Diagnose Individual Interface) request received by a router is always preceded by a DAI request.

112/04/21 OPLab,NTUIM 35

Page 36: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 36DAI

SET all interface to ADMM

DII-42

SET interface 42 to PDMMOthers remain unchanged

Status packet

Page 37: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 37

DAI

SET all C’s interface to ADMM

DII-24

SET interface 24 to PDMMOthers remain unchangedStatus packet

Page 38: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 38

V instruct G to trigger packetfilter module on 4

Figure that C1 is an attacker

Status packet

DII-4

Page 39: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 39DAI

SET all interface to ADMM

DII-42

SET interface 27 、 42 to PDMMOthers remain unchanged

Status packet

DII-27

Page 40: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 40

DAI

SET all C’s interface to ADMM

DII-24

SET interface 24 to PDMMOthers remain unchangedStatus packet

SET interface 50 to PDMMOthers remain unchanged

Status packet

DII-50

DAI

SET all B’s interface to ADMM

Page 41: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 41

V instruct G to trigger packetfilter module on 4

Figure that C1 is an attacker

Status packet

DII-4

Figure that C2 is an attacker

V instruct F to trigger packetfilter module on xAnd use Virtual PID to locateC2

Status packet

DII-31

Page 42: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 42

Page 43: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

How can V determine that interface 50 belongs to B and interface 24 belongs to C?

PID 50 at hop 1 is grouped with PID 27 (and not PID 42) at hop 0 because 41⊕50 =27

112/04/21 OPLab,NTUIM 43

Page 44: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 44

Page 45: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Under the following assumptions, one can show that AD incurs no false negatives or false positives and PAD incurs no false negatives: 1) the attackers keep sending attack packets

to the victim during the AD or PAD process, 2) the IDS installed at the victim can

accurately identify attacks, 3) the MAC addresses are not spoofed.

112/04/21 OPLab,NTUIM 45

Page 46: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

False positive occurs when each link of a legitimate client’s path (that is not on any attack path) collides with a link of an attack path,

112/04/21 OPLab,NTUIM 46

Page 47: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

We assume that each router assigns PID values to its interfaces randomly from 0 to 2b-1. If we assume that q attackers are diagnosed in a single round

The probability that a link of a legitimate client’s path collides with a link on an attack path is

112/04/21 OPLab,NTUIM 47

Page 48: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

If a legitimate client’s path has m links that do not coincide with any links on any attack path, then its false positive probability is

112/04/21 OPLab,NTUIM 48

Page 49: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 49

Page 50: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 50

Page 51: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 51

Page 52: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 52

First step

Each loop

Last step

Page 53: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 53

First step

Each loop

Last step

Page 54: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 54

Page 55: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

PRACTICAL CONSIDERATIONS Selection of Marking Field Length Security Considerations Issues of Router and Network Overhead Gradual Deployment Considerations

112/04/21 OPLab,NTUIM 55

Page 56: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Because the vast majority of routes in the Internet have fewer than 32 hops. Therefore, we set a = 5, which implies

b + c = 12 In AD, we allocate all the remaining 12

bits to the PID field

112/04/21 OPLab,NTUIM 56

Page 57: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

The role of the XOR field is to distinguish individual routes so that the DII commands can be issued to the appropriate routers.

On the other hand, the PID field identifies an individual interface port on a router, which helps the router discard DII requests with wrong PIDs.

112/04/21 OPLab,NTUIM 57

Page 58: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

b ≧ c b + c = 12 a + b + c = 17 Setting1 a = 6, b = 6, c = 5 Setting2 a = 5, b = 6, c = 6

112/04/21 OPLab,NTUIM 58

Page 59: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

1)How to authenticate DAI? 2)How we deal with DII forgery? How to

prevent DII against replay attack? 3)An attacker may attempt to forge

information in the marking fields of packets. What should we do?

112/04/21 OPLab,NTUIM 59

Page 60: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

1) The key required to authenticate the DAI requests can be established during an offline registration process

2) We can utilize a preceding DII request to authenticate its subsequent DII request in the chain, then all the DII requests in the chain are authenticated.

112/04/21 OPLab,NTUIM 60

Page 61: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Victim uses a publicly known one-way hash function H() to generate a hash chain

112/04/21 OPLab,NTUIM 61

Page 62: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

112/04/21 OPLab,NTUIM 62

Rx

Ry

Hop hDAI nh

DII nh+1

Check if

Page 63: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

3)Because AD/PAD use DPM a forged marking will be overwritten by intermediate routers.

112/04/21 OPLab,NTUIM 63

Page 64: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

AD and PAD are reactive defense mechanisms, it is unlikely that a router will receive a large number of simultaneous requests for packet marking. This ensures that a router will not be overburdened with packet marking tasks the vast majority of the time.

112/04/21 OPLab,NTUIM 64

Page 65: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

First, the commands the victim sends are from downstream to upstream, while the flooding goes the reverse direction.

Secondly, AD commands could contain some rate-limit requests (as Pushback does),

Another straightforward solution is to prioritize authenticated AD commands.

112/04/21 OPLab,NTUIM 65

Page 66: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Perimeter approach, AD/PAD is implemented only at the victim’s neighbor subnets, forming a perimeter of defense around the victim perimeter approach

Distributed diagnosis approach, the border routers of subnets, which support AD and PAD, coordinate the diagnosis process under the help of attack detection devices.

112/04/21 OPLab,NTUIM 66

Page 67: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 67

Page 68: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 68

Page 69: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

SIMULATION AND RESULTS PFPPAD versus q Attack Mitigation Delay The Trade-Off between False Positives and

Attack Mitigation Delay Partial Subnet Deployment

112/04/21 OPLab,NTUIM 69

Page 70: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

SIMULATION AND RESULTS

Use three topologies Skitter Internet Map (d=6) Lumeta Internet Mapping Projects (d=2) Complete tree (d=6)

Use Gaussian distribution with μ is 16.5 and σ is 4 to simulate routes’ number of hops.(Upper bound 32 lower bound 1)

112/04/21 OPLab,NTUIM 70

Page 71: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

SIMULATION AND RESULTS

In these simulations, we fixed the number of attackers, Na, at 2,000

and the total number of clients at 5,000. We varied q from 10 to 2,000 in

increments of 10. Each datum is the average of 10

independent experiments.

112/04/21 OPLab,NTUIM 71

Page 72: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

SIMULATION AND RESULTS –PFPPAD versus q

112/04/21 OPLab,NTUIM 72

Page 73: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 73

Page 74: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 74

Page 75: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

112/04/21 OPLab,NTUIM 75

Page 76: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

SIMULATION AND RESULTS –Attack Mitigation Delay

112/04/21 OPLab,NTUIM 76

The implementing AD in subnet 157.130.0.0/16 and subnet 152.63.0.0/16 is crucial for lowering the false positive ratio.

Page 77: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

INTRODUCTION ATTACK DIAGNOSIS AND PARALLEL

ATTACK DIAGNOSIS PRACTICAL CONSIDERATIONS SIMULATION AND RESULTS RELATED WORK CONCLUSION

112/04/21 OPLab,NTUIM 77

Page 78: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

AD/PAD employ a “divide-and-conquer”strategy to isolate attacking hosts and filter their traffic.

AD/PAD’s framework is in line with the ideal framework of DDoS mitigation schemes.

112/04/21 OPLab,NTUIM 78

Page 79: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

1. is reactive so as to incur limited overhead,

2. does not rely on attack signatures for filtering attack traffic,

3. is robust against IP spoofing and marking-field forgeries,

4. supports incremental deployment, and 5. incurs low false positives.

112/04/21 OPLab,NTUIM 79

Page 80: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 5, MAY 2007 Presented by: C. W. Fan-Chiang.

112/04/21 OPLab,NTUIM 80

Thanks for listening