31
Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya Bethala Network Systems Lab Department of Computer Sciences Purdue University Team: Ali Selcuk, Humayun Khan, Heejo Lee

Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Scalable Denial of Service Attack Prevention on the Internet

Kihong Park Hyojeong Kim Bhagya BethalaNetwork Systems Lab

Department of Computer SciencesPurdue University

Team: Ali Selcuk, Humayun Khan, Heejo Lee

Page 2: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Outline

Background & set-up [Kihong Park]

Proactive & reactive protection performance [Bhagya Bethala]

Network security tools [Hyojeong Kim]

Page 3: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Network Security Projects at NSL

Scalable defenses for:Distributed denial of service (DDoS) attack prevention

Virus/worm attack prevention

Supported by:

Page 4: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Distributed DoS Attack

Source localization or traceback

Internet

e.g., TCP SYN flooding

serverbandwidth

...

→ spoofing: forge IP source address

→ hinders source localization & delays reactive response

→ more and more against network infrastructure

Page 5: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Virus/Worm Attack

0

20000

40000

60000

80000

100000

120000

0 5 10 15 20Hours

# of

infe

cted

hos

ts

Code Red

Sapphire

David Moore ([email protected])

Page 6: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Solution Approach

DDoS: route-based filtering

Virus/worm: content-based filtering

Where are you coming from? “unde venis”

→ if the packet lies, discard

Where are you headed? “quo vadis”

→ if the packet contains worm/virus, discard

router

Page 7: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Objective

Containment DDoS: prevent attack packets from reaching their targets in the first placeWorm/virus: stop spreading in its tracks→ proactive protection

TracebackDDoS: when infeasible to do so, locate attack sourceWorm/virus: adapt to new viruses→ reactive protection

Page 8: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Key Issue

Partial deployment & effective placement

Internet topology

→ distributed filtering vs. local filtering (aka firewall)

Page 9: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Performance Evaluation

Page 10: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Internet Connectivity: Power-law Nature

Key features exploited by placement strategyBias toward high degree nodes→ locally star-like topology→ efficiency→ simple

Page 11: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Power-law Connectivity

Power-law vs. random graph

kkx −≈= 2])Pr[deg(α−≈= kkx ])Pr[deg(

Page 12: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Demo: DDoS Attack Configuration attacker

victim

filter

Page 13: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Demo: Without DPF - Snapshot 1 lowmedhigh

Page 14: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Demo: Without DPF - Snapshot 2 lowmedhigh

Page 15: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Demo: With DPF - Snapshot lowmedhigh

Page 16: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Results: DDoS Attack

Protection Traceback~99%

4 or less

Page 17: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Worm Attack: Containment Pockets

Containment Pocket: Definition

Locally ContainedPocketFilter

Infected Node

Page 18: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Worm Attack: Containment Pockets

Page 19: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Worm Attack: Containment Pockets

Page 20: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Worm Attack: Containment Pockets

Page 21: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Results: Worm Attack

Page 22: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Tools and System Building

Page 23: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Dynamic DPF Simulator

Built using DaSSFNetDaSSF

Scalable simulation on workstation clusters

DaSSFNetC++ SSFNet with improved synchronization

Parallel DML support

Collaborative effort with David Nicol (DaSSF PI)

Page 24: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Dynamic DPF SimulatorKey Extensions

Protocol stack:DPF-lookup, IP, TCP, UDPBGP-4, DPF-updateAttack configuration, traffic generation suiteMeasurement subsystem

Meta-DMLAutomatic DML script generation

Topology-aware partitioning scheme

Trace-driven visualization tool

Page 25: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Dynamic DPF Simulator: Architecture

{attackers, traffic generators, fault generators, …}

CBR, Poisson, self-similar, MMPP, file transfer

Link Layer

DPF Lookup

IP

TCP UDP

Socket API

BGP DPF Update

Applications

DaSSF Kernel

MPI

DML

Protocol Stack

Meta-DMLTopology

Protocol Stack

Attack Configuration

Network Partition

Page 26: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Dynamic DPF Simulator: Demo

without DPF

Network Topology300-node subgraph of 1997 Internet AS topology

DDoS Attack Configuration106 attackers / 1 victimIP source address spoofing

Filter deployment15 nodes (5%)

TimelineSetup: BGP & DPF convergenceSynchronized AttackAttack Duration: 4.0 sec

with DPF

Page 27: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Memory and Speed-up Benchmarks

Workstation clusterx86 PCs, 2 GHz, 1 GB, Linux 2.4+DaSSFNet, MPI

Page 28: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Memory and Speed-up Benchmarks

Nov. 1997, 3023-node Internet AS topology10 machines

Page 29: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Memory and Speed-up Benchmarks

Nov. 1997, 3023-node Internet AS topology10 machines

Page 30: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Network Processor Prototyping

7-node Intel IXP1200 NP testbedTeja development environment

Abilene/Internet2 Connectivity

Page 31: Scalable Denial of Service Attack Prevention on the Internet › news_and_events › ...Scalable Denial of Service Attack Prevention on the Internet Kihong Park Hyojeong Kim Bhagya

Conclusion

DDoS attack/Internet Worm attack constrained by Internet connectivity

Distributed Packet Filteringexploits Internet connectivity

Effective performance with strategic/partial placementScalable simulation tool for evaluating time dynamicsNetwork processor based prototype system

http://www.cs.purdue.edu/nsl