25
On the Effectiveness of On the Effectiveness of Route-Based Packet Route-Based Packet Filtering for Filtering for Distributed DoS Attack Distributed DoS Attack Prevention in Power-Law Prevention in Power-Law Internets Internets Kihong Park and Heejo Lee Kihong Park and Heejo Lee Network Systems Lab, Computer Network Systems Lab, Computer Sciences Sciences Purdue University Purdue University In Proc. ACM SIGCOMM 2001 In Proc. ACM SIGCOMM 2001 Presented by Brad Burres Presented by Brad Burres

On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

Page 1: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

On the Effectiveness of On the Effectiveness of Route-Based Packet Route-Based Packet

Filtering for Distributed Filtering for Distributed DoS Attack Prevention in DoS Attack Prevention in

Power-Law InternetsPower-Law InternetsKihong Park and Heejo LeeKihong Park and Heejo Lee

Network Systems Lab, Computer SciencesNetwork Systems Lab, Computer Sciences

Purdue UniversityPurdue University

In Proc. ACM SIGCOMM 2001In Proc. ACM SIGCOMM 2001

Presented by Brad BurresPresented by Brad Burres

Page 2: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

AgendaAgenda

IntroductionIntroduction Related Work Related Work Route-Based Packet FilteringRoute-Based Packet Filtering Performance EvaluationPerformance Evaluation ResultsResults Implementation IssuesImplementation Issues ConclusionsConclusions

Page 3: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

IntroductionIntroduction DoS – Denial of ServiceDoS – Denial of Service

Attacker demands more resources than are Attacker demands more resources than are availableavailable

We’ve talked about this!We’ve talked about this!

You cannot prevent a DoS/DDoS attackYou cannot prevent a DoS/DDoS attack

Protection takes two formsProtection takes two forms Proactive – put measures in place to prevent Proactive – put measures in place to prevent

attacksattacks Reactive – put systems in place to react to the Reactive – put systems in place to react to the

attack and minimize its impactattack and minimize its impact

Page 4: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Related WorksRelated Works

Resource Management (e.g. Resource Management (e.g. firewall/detect)firewall/detect) Mitigate the impact on the victimMitigate the impact on the victim Does not eliminate the problemDoes not eliminate the problem Does not (likely) deter the attackerDoes not (likely) deter the attacker

Ingress FilteringIngress Filtering Place at all boarder gatewaysPlace at all boarder gateways Should limit source IP address spoofingShould limit source IP address spoofing Expensive to implementExpensive to implement

Page 5: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

IP Traceback (related IP Traceback (related works)works)

Trace back the attacking packets to their Trace back the attacking packets to their sourcesource

Traffic AnalysisTraffic Analysis Use logs at the routers to perform traceUse logs at the routers to perform trace High storage and processing costsHigh storage and processing costs

ICMP Traceback messagesICMP Traceback messages Variable length marking denotes route pathVariable length marking denotes route path Increased network trafficIncreased network traffic Now ICMP messages can be spoofed…Now ICMP messages can be spoofed…

Page 6: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

IP Traceback (related IP Traceback (related works)works)

Probabilistic Packet MarkingProbabilistic Packet Marking Probabilistically mark a packet by adding Probabilistically mark a packet by adding

route inforoute info Constant marking fieldConstant marking field Efficient to implementEfficient to implement Reconstructs the path of the attacker with Reconstructs the path of the attacker with

a high probabilitya high probability Can track attacker to within 5 equally likely Can track attacker to within 5 equally likely

sitessites Reactive Only! Allows initial attack… Reactive Only! Allows initial attack… Doesn’t scale well with lots of attackersDoesn’t scale well with lots of attackers

Page 7: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Route-Based Distributed Route-Based Distributed Packet Filtering (DPF)Packet Filtering (DPF)

Break the name into piecesBreak the name into pieces Route-Based Packet FilteringRoute-Based Packet Filtering

Filter the spoofed packets whenever they are Filter the spoofed packets whenever they are traversing an unexpected routing pathtraversing an unexpected routing path

Distributed Packet FilteringDistributed Packet Filtering Applying the filtering technique at certain points in Applying the filtering technique at certain points in

the networkthe network Key Objectives are to 1) Maximize proactive Key Objectives are to 1) Maximize proactive

filtering, 2) Minimize the number of possible filtering, 2) Minimize the number of possible attackers, 3) achieve 1&2 with smallest attackers, 3) achieve 1&2 with smallest number of nodes possiblenumber of nodes possible

Page 8: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Illustration of Route-Based Illustration of Route-Based FilteringFiltering

0

12

43

67

5

8

9

Valid Routing path of node 2

Node 7 Attacks 4 by spoofing Node 2’s address

Node 6 filters the attack

Page 9: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Definition of TermsDefinition of Terms

F: filtering functionF: filtering function

0

12

43

67

5

8

9

Routing paths from node 2

G: network topologyG: network topology T: filtering nodesT: filtering nodes R: routing policiesR: routing policies

Page 10: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

More Terms (quickly)More Terms (quickly) V – a set of nodes in G (vertices)V – a set of nodes in G (vertices) E – a set of links in G (edges)E – a set of links in G (edges) U – all non-filtering nodes (so V = U + T)U – all non-filtering nodes (so V = U + T) S(a,t) – set of nodes an attacker can spoof that S(a,t) – set of nodes an attacker can spoof that

won’t get filtered (attacker located at a and won’t get filtered (attacker located at a and attacking t)attacking t)

R(u,v) – the path from node u to v (in lower R(u,v) – the path from node u to v (in lower case, it’s a specific node)case, it’s a specific node)

Routing PoliciesRouting Policies Tight – there exists a single path between two Tight – there exists a single path between two

nodesnodes Loose – any loop free path between two nodesLoose – any loop free path between two nodes

Page 11: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Maximal and Semi-maximal Maximal and Semi-maximal FiltersFilters

Maximal FilterMaximal Filter Use all source and dest routing paths in GUse all source and dest routing paths in G If V nodes, then V nodes can be the source, and V-1 If V nodes, then V nodes can be the source, and V-1

nodes can be the dest…nodes can be the dest… V*(V-1) = VV*(V-1) = V22 O(n O(n22) )

If edge e is on the routing path, the filter returns a 0, If edge e is on the routing path, the filter returns a 0, otherwise return a 1 and filter it.otherwise return a 1 and filter it.

Semi-Maximal FilterSemi-Maximal Filter Use only the source address coming over link eUse only the source address coming over link e O(n) complexity, storageO(n) complexity, storage

.otherwise,1

);,(if,0),(

tsRetsFe

otherwise.

;someforif

,1

,0),('

VvR(s,v)etsFe

Page 12: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Final Term: Vertex Cover Final Term: Vertex Cover (VC)(VC)

T=VCT=VC Any node in the set U has only Any node in the set U has only

nodes in the set T as its neighbors.nodes in the set T as its neighbors.

Finding a minimal VCFinding a minimal VC NP-complete problemNP-complete problem Two well-known algorithms used Two well-known algorithms used

for finding a VCfor finding a VC

Page 13: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Performance MeasuresPerformance Measures Proactive Prevention – limiting (eliminating) the Proactive Prevention – limiting (eliminating) the

number of nodes from which no spoofed IP packets number of nodes from which no spoofed IP packets can be reachedcan be reached

2(1): fraction of AS’s from which no spoofed packets coming

Reactive Traceback – A measure of the percentage of Reactive Traceback – A measure of the percentage of nodes which can – after receiving a spoofed packet nodes which can – after receiving a spoofed packet (i.e. realizing that it’s under attack) – can localize it’s (i.e. realizing that it’s under attack) – can localize it’s true source to within some minimal numbertrue source to within some minimal number

1(5): fraction of AS’s which can resolve the attack location to within 5 possible sites.

n

SVta ta

,

2

,:{)(

n

CVst ts

,

1

,:{)(

Page 14: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Performance Measures Performance Measures (cont)(cont)

Attack Volume reductionAttack Volume reduction Captures the reduction in the volume of an Captures the reduction in the volume of an

attack, such as when the source IP address is attack, such as when the source IP address is randomly selectedrandomly selected

2

,

2

,

)1(

:),,{(

)1(

:),,{(

nn

Catsa

nn

Sstsa tsta

Page 15: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Minimizing “Spoofable” Minimizing “Spoofable” AddressesAddresses

F2

Filtering at F1 and F2: S1,9={1,2}

F1

Filtering at F1: S1,9={0,1,2,3,4,5}

8

6

35

9

7

4

21

0

AttackerVictim

Routes to victim

No filtering: S1,9={0,1,2,3,4,5,6,7,8}

Page 16: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Power-Law NetworksPower-Law Networks Mathematically (PDF): P[X=x] ~ xMathematically (PDF): P[X=x] ~ x-(k+1) -(k+1) = x = x-a-a

Behaviorally. Think of it as “the rich get Behaviorally. Think of it as “the rich get richer”. If a lot of paths go through one richer”. If a lot of paths go through one node, than as more paths get added to the node, than as more paths get added to the network, they too will go through that node.network, they too will go through that node.

Like airport hubs – because we made Like airport hubs – because we made Denver, Chicago, and Atlanta major hubs, Denver, Chicago, and Atlanta major hubs, now almost all flights of any distance go now almost all flights of any distance go through one of those hubs.through one of those hubs.

Page 17: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Performance ResultsPerformance Results

Found using a lot of evaluation tools Found using a lot of evaluation tools (dpf, inet, brite)(dpf, inet, brite)

Proactive Filtering EffectProactive Filtering Effect Not viable as a “perfect” filterNot viable as a “perfect” filter Does a very good job as DDoS attack Does a very good job as DDoS attack

prevention technique (limiting which prevention technique (limiting which nodes can attack and spoof from where)nodes can attack and spoof from where)

2(1) = .88 on real Internet topologies from 97-99

Page 18: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Proactive Filtering on Proactive Filtering on DDoSDDoS

00.10.20.30.40.50.60.70.80.9

1

2

1997 1998 1999

G: 1997~1999 Internet connectivity T: VC R: Tight F: Semi-maximal

On real Internet topologies from 97-99, DPF makes 88% of internet sites “unspoofable”. This obviously hurts an attackers chances and makes them work much harder to even find valid attack nodes.

Page 19: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Attack Volume ReductionAttack Volume Reduction Randomly generated spoofed Randomly generated spoofed

addresses are filtered 99.96% of the addresses are filtered 99.96% of the time!!time!! When T=VC, When T=VC,

= 0.0004 = 0.0004

Page 20: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Reactive Performance for Reactive Performance for TracebackTraceback

1(5) = 1 for all three real Internet Topologies Means that an attack can be localized to

no more than five nodes

Page 21: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Maximal vs. Semi-maximal Maximal vs. Semi-maximal FiltersFilters

Semi-Maximal filters are almost as Semi-Maximal filters are almost as good at a fraction of the cost!!good at a fraction of the cost!! Maximal filters require VMaximal filters require V22 storage and storage and

searching for insignificant gainsearching for insignificant gain

Page 22: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Impact of Network Impact of Network TopologyTopology

The authors spent a lot of time here – I will not.The authors spent a lot of time here – I will not. Random topology (Not Power-Law Network)Random topology (Not Power-Law Network)

Really bad performance. Takes lots of filter nodes Really bad performance. Takes lots of filter nodes and still doesn’t filter a high percentage of spoofed and still doesn’t filter a high percentage of spoofed addresses. addresses.

VC = 55% of total nodes!VC = 55% of total nodes! Inet topology Inet topology

Has power-law characteristicsHas power-law characteristics VC = 32% of nodes (real Internet was 18%)VC = 32% of nodes (real Internet was 18%) Performance close to that reported for 97-99 Performance close to that reported for 97-99

InternetInternet Brite topologyBrite topology

Basically, couldn’t make it do what we want (or at Basically, couldn’t make it do what we want (or at least give us the results that we want)least give us the results that we want)

Why put this in the paper?Why put this in the paper?

Page 23: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

Other Miscellaneous Other Miscellaneous ResultsResults

All simulations were done with the All simulations were done with the “T” nodes doing Ingress Filtering“T” nodes doing Ingress Filtering 1(5) != 1 when this is not true 1(20) = 1, and 20 nodes is still

managable

Multipath Routing degrades this solution. For R=3, 1(10) = 1

Page 24: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

ConclusionConclusion Distributed Route-Based Packet Filtering Distributed Route-Based Packet Filtering

is effectiveis effective Preventative – minimizes the choices available Preventative – minimizes the choices available

to attackersto attackers Reactive – minimizes the nodes which can Reactive – minimizes the nodes which can

originate a given attackoriginate a given attack

Is it Practical?Is it Practical? Can be deployed incrementallyCan be deployed incrementally Needs protocol support to get source routing Needs protocol support to get source routing

information (i.e. BGP needs a face lift)information (i.e. BGP needs a face lift)

Page 25: On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems

ReferencesReferences Info on ICMP traceback:Info on ICMP traceback:

http://www.nwfusion.com/news/2000/0724itrace.http://www.nwfusion.com/news/2000/0724itrace.htmlhtml

Graphs:Graphs:http://www.cs.cornell.edu/People/egs/syslunch-sphttp://www.cs.cornell.edu/People/egs/syslunch-spring02/syslunchsp02/park-lee.pdfring02/syslunchsp02/park-lee.pdf

Concepts and images:Concepts and images:cosmos.kaist.ac.kr/cs540/seminar/hjlee020911.pcosmos.kaist.ac.kr/cs540/seminar/hjlee020911.pptpt

Power Law Networks:Power Law Networks:http://tisu.it.jyu.fi/cheesefactory/documents/Powehttp://tisu.it.jyu.fi/cheesefactory/documents/PowerLawNetworks.pptrLawNetworks.ppt

http://rio.ecs.umass.edu/~gao/ece697_0http://rio.ecs.umass.edu/~gao/ece697_0....../lect-03.01-properties.ppt/lect-03.01-properties.ppt