44
A Dynamic Packet A Dynamic Packet Stamping Stamping Methodology for Methodology for DDoS Defense DDoS Defense Project Presentation Project Presentation by by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 CISC 859 University of Delaware University of Delaware

A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

Embed Size (px)

Citation preview

Page 1: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

A Dynamic A Dynamic Packet Stamping Packet Stamping Methodology for Methodology for DDoS DefenseDDoS Defense

Project PresentationProject Presentationbyby

Maitreya Natu, Kireeti Valicherla, Namratha HundigopalMaitreya Natu, Kireeti Valicherla, Namratha Hundigopal

CISC 859CISC 859University of DelawareUniversity of Delaware

Page 2: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 2

OutlineOutline• Objectives• Problem Description• Related Work• Proposed Solution• Implementation Details• Results• Future Work• Conclusion

Page 3: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 3

Objectives of the ProjectObjectives of the Project• Propose a new simple and effective

solution to stamp IP packet to enable easy authentication of IP packets so as to counter DDoS Attacks.

• Implement the above solution and conduct experiments on emulab testbed to verify its effectiveness.

Page 4: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 4

Problem DescriptionProblem Description• DDoS is enormous threat to Internet.

• Many public websites available which don’t verify the authenticity of their users.

• Victims overwhelmed with requests and the legitimate users are denied service.

Page 5: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 5

Why DDoS difficult to solve?Why DDoS difficult to solve?• No authentication required to use services

• Little chance of attacker being caught

• Difficult to differentiate attack from legitimate traffic

• Huge Number of Vulnerable machines available

• Problem of finite resources

Page 6: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 6

Related WorkRelated Work• IP Easy-pass: Edge Resource Access Control by H. Wang, A. Bose, M. El-Gendy, K. G. Shin

• Practical Network Support for IP Tracebackby S. Savage, D. Wetherall, A. Karlin, T. Anderson

• StackPiby A. Perrig, D. Song. A. Yaar

Page 7: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 7

IP Easy-pass: Edge Resource Access ControlIP Easy-pass: Edge Resource Access Control by H. Wang, A. Bose, M. El-Gendy, K. G. Shin by H. Wang, A. Bose, M. El-Gendy, K. G. Shin

• What we liked about this paper?– Per Packet Filtering based on IP Easy

Pass– Dynamic Passes

• What we didn’t like about this paper?– Space Overhead– Encryption and Decryption Overhead

Page 8: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 8

Practical Network Support for IP Traceback Practical Network Support for IP Traceback by S. Savage, D. Wetherall, A. Karlin, T. Anderson by S. Savage, D. Wetherall, A. Karlin, T. Anderson

• What we liked about this paper?– The use of IP identification field for

storing marks in the packets.

• What we didn’t like about this paper?– Reactive in nature

Page 9: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 9

StackPiStackPiby A. Perrig, D. Song. A. Yaar by A. Perrig, D. Song. A. Yaar

• What we liked about this paper?– Per Packet Filtering– Proactive approach

• What we didn’t like about this paper?– Stale Pass– Complicated

Page 10: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 10

Desired Properties in Desired Properties in Proposed Solution Proposed Solution

• Simple to implement• Limited Overheads• Limited increase in end to end delay• Per Packet Filtering• Easily Deployable• Robust

Page 11: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 11

Proposed SolutionProposed Solution

• Create mechanism which would distinguish legitimate IP packets from attack packets.

• Drop all the packets which fail the filtering test.

Page 12: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 12

How to differentiate attack How to differentiate attack and legitimate packets?and legitimate packets?

• Generate Unique ID for each packet

• Store this key in the IP header’s identification field to avoid space overheads

• Routers check the packets ID field to check whether the given packet is genuine or not before forwarding to destination (Victim)

Page 13: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 13

Issues with key generationIssues with key generation• Complex generation techniques at client

so that key spoofing is difficult to do

• Simple verification at router so that router overhead remains small

• Keep changing the keys so that attackers don’t have time to predict the keys

Page 14: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 14

How does our solution How does our solution work?work?

• Generation of keys is done at client• Initial communication between client and

core router takes place to understand the initial key

• Generation of legitimate packets takes place

• Verification of packets done at core routers

• Router drops or accepts packets based on the key value

Page 15: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 15

Other IssuesOther Issues• We use a sliding window to take care of

packet loss or reordering.

• As we use dynamic pass and not a stale pass replay attacks are also avoided.

• Our solution can be used with any Transport or Application protocol as we just change IP ID field.

Page 16: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

Implementation Implementation DetailsDetails

bybyMaitreya NatuMaitreya Natu

Page 17: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 17

Page 18: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 18

f1 f100f101

Client uses SHA to generate a queue of 101 keys

Page 19: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 19

f1 f100f101

Client sends the 101st key to the router for before sending the data packets

Page 20: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 20

10.1.4.2 f101

f1 f100

0 0 0 0 0 0 0 0

•Router receives the key and stores it in a client table•Router maintains a window to keep track of arriving packets

Page 21: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 21

10.1.4.2 f101

f1 f99

f100

0 0 0 0 0 0 0 0

•Client inserts a new key (here f100 ) in the IP ID field of each outgoing packet•We use the dos code to insert the key in ID field

Page 22: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 22

10.1.4.2 f101

f1 f99

f100

0 0 0 0 0 0 0 0

Page 23: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 23

10.1.4.2 f101

f1 f99

f100

0 0 0 0 0 0 0 0

Page 24: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 24

10.1.4.2 f101

f1 f99

f100

f (f100) = f101

0 0 0 0 0 0 0 0

•Router captures each packet and extracts the key from the IP ID field•We use capture code to capture incoming packets•It identifies the source IP address and accepts packets only with valid IP addresses•For each packet with a valid IP address, applies SHA on the ID key to detect if the key is in the window range

f101 f94

Page 25: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 25

10.1.4.2 f101

f1 f99

f100

f (f100) = f101

1 0 0 0 0 0 0 0

•Router sets the corresponding bit in the window and forwards the packet

Page 26: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 26

10.1.4.2 f100

f1 f99

f100

1 0 0 0 0 0 0 0

•Router sets the corresponding bit in the window and forwards the packet

Page 27: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 27

10.1.4.2 f101

f1 f98

f99

1 1 0 0 0 0 0 0

Page 28: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 28

10.1.4.2 f101

f1 f97

f98

1 1 1 0 0 0 0 0

Page 29: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 29

10.1.4.2 f101

f1 f96

f97

1 1 1 1 0 0 0 0

Page 30: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 30

10.1.4.2 f97

f1 f96

1 1 1 1 0 0 0 0

f97

•When the first four bits of the window are set, the window is advanced by 4 bits by setting the client key to the 4th key (here f97) received

Page 31: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 31

10.1.4.2 f97

f1 f95

f96

0 0 0 0 0 0 0 0

•The window is advanced by 4 bits by left shifting by 4 bits to process further packets

Page 32: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 32

10.1.4.2 f101

f1 f92

1 1 0 1 0 1 1 0

Page 33: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 33

10.1.4.2 f101

f1 f92

f93

1 1 0 1 0 1 1 0

Page 34: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 34

10.1.4.2 f93

f1 f92

1 1 0 1 0 1 1 1

f93

•If the first 4 bits are not set due to packet loss, then the window is shifted when the 8th packet is received, changing the client key to the 8th key (here f93) received

Page 35: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 35

10.1.4.2 f93

f1 f91

f92

0 0 0 0 0 0 0 0

•The window is advanced by 8 bits by left shifting by 8 bits to process further packets

Page 36: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

ResultsResultsByBy

Namratha HundigopalNamratha Hundigopal

Page 37: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 37

TopologyTopology

V

LANLAN5Mb 5Mb

250 kb

1Mb 1Mb

Page 38: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 38

ResultsResults

Total legitimate packet at victim with varying attacker's sending rate (with and w/o pass)

0

50

100

150

200

250

5 10 20 30 40 50 60 90 120 130

Sending rate of an attcker(pkts/sec)

Nu

m o

f le

git

imate

pkts

at

vic

tim

w/o filter

with filter

Client 20 pkts/sec for 10 sec Attacker 5 – 130 pkts/sec for 15 sec

Page 39: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 39

Total legitimate packets at victim with varying attackers sending rates (with and w/o pass)

0

50

100

150

200

250

5 10 20 30 40 50 60 70

Sending rate of attackers (pkts/sec)

Nu

m o

f le

git

imate

pkts

at

vic

tim

w/o filter

with filter

Client 20 pkts/sec for 10 secAttacker 5 – 70 pkts/sec for 15 sec

Page 40: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 40

Measure of end to end delay for legitimate packets with one attacker

9980

10000

10020

10040

10060

10080

10100

1 2 3

en

d t

o e

nd

de

lay

(m

s)

w/o filter with filter spoofing

(with filter)

Page 41: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 41

Measure of end to end delay for legitimate packets with two attackers

10000

10500

11000

11500

12000

12500

13000

13500

14000

1 2 3

en

d t

o e

nd

de

aly

(m

s)

1 legitimate with 2 attacker

w/o filter with filter spoofing

(with filter)

Page 42: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 42

Future Work Future Work

• Implementation of initial handshake between legitimate clients and router

• Extension of the scheme to achieve a secure end to end path

• Testing with smart attacks

• Testing with real time applications

Page 43: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 43

ConclusionConclusion• Proposed a stamping technique to identify

legitimate packets

• Implemented the algorithm on emulab testbed

• It effectively prevents legitimate packets from loss for all flooding rates we considered with negligible increase in end to end delay

Page 44: A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University

05/11/2004 CISC 859 44

Question or Comments?Question or Comments?

Thank you Thank you