17
1 A TCAM-based solution for integrated traffic anomaly detection and policy filtering Author: Zhijun Wang, Hao Che, Jiannong Cao, Jingshan Wang Publisher: Computer Communications 2009 Presenter: Hsin-Mao Chen Date:2009/9/30

A TCAM-based solution for integrated traffic anomaly detection and policy filtering

Embed Size (px)

DESCRIPTION

A TCAM-based solution for integrated traffic anomaly detection and policy filtering. Author : Zhijun Wang, Hao Che, Jiannong Cao, Jingshan Wang Publisher: Computer Communications 2009 Presenter: Hsin-Mao Chen Date: 2009/9/30. Outline. Introduction Background Architecture - PowerPoint PPT Presentation

Citation preview

Page 1: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

1

A TCAM-based solution for integrated traffic anomaly detection and policy filtering

Author:Zhijun Wang, Hao Che, Jiannong Cao, Jingshan Wang

Publisher:Computer Communications 2009

Presenter:Hsin-Mao ChenDate:2009/9/30

Page 2: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

2

Outline

IntroductionBackgroundArchitectureData StructuresPacket ProcessingPerformance

Page 3: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

3

Introduction

Distributed Denial of Service (DDoS) attacks are the major threats to the Internet.

The TCP-base DDoS attacks using spoofed source IP address are detected in the edge router through two-dimensional matching.

Page 4: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

4

Background

Two-dimensional(2D) matching

A normal TCP flow generated from one end host to another should have a corresponding flow from the other direction.

Page 5: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

5

Background

Page 6: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

6

Background

TCP Packet Header

Source Port Number(16) Destination Port Number(16)

Sequence number(32)

Head len(4)

Unused(6)

URG

ACK

PSH

RST

SYN

FIN

Window Size(16)

Header Data

(bit)

Page 7: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

7

Background

Three Way Handshake Client Server

TimeTime

FIN

FIN+ACK

ACK

Page 8: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

8

Architecture

Page 9: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

9

Data Structures

Format of action code

(0)Policy Filter Rule

(1)Flow Identity

(0)Not Pass to the local CPU

(1)Pass to the local CPU

Forwarding ActionFlow index in the flow table located in the local CPU

Free bits

Page 10: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

10

Data Structures

Format of flow table in the local CPU

(00)Empty Entry

(01)Unmatched existing flow

(10)Excepted flow

(11)Matching existing flow

FIN and ACK bits are used to terminate a pair of completed flows

Flow location in the TCAM rule tableTimer: Talm, Tidl, Trmv

Page 11: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

11

Packet Processing

Packet in new flow

<1.2.3.4, 5.6.7.8, 80, 1028, 6>

TCAM table

Flow table

Page 12: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

12

Packet Processing

Packet in expected flow

TCAM table

<5.6.7.8, 1.2.3.4, 1028, 80, 6>

Page 13: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

13

Packet Processing

Packet in matched flow

TCAM table

Page 14: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

14

Packet Processing

Packet with FIN and/or ACK bit set

TCAM table

FINFIN+ACKACK

Page 15: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

15

Performance

False alarm probability

Pfalse=(1-p)n-1p

Page 16: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

16

Performance

Average time an attack to be monitored

Trace 1 Trace 2

Page 17: A TCAM-based solution for integrated traffic anomaly detection and policy filtering

17

Performance

Number of falsely alarmed flows per second