56
SENSS Against Volumetric DDoS Attacks Sivaram Ramanathan 1 , Jelena Mirkovic 1 , Minlan Yu 2 and Ying Zhang 3 1 University of Southern California/Information Sciences Institute 2 Harvard University 3 Facebook 1

SENSS Against Volumetric DDoS Attacks

  • Upload
    others

  • View
    15

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SENSS Against Volumetric DDoS Attacks

SENSS Against Volumetric DDoS Attacks

Sivaram Ramanathan1, Jelena Mirkovic1, Minlan Yu2 and Ying Zhang3

1University of Southern California/Information Sciences Institute2Harvard University

3Facebook

1

Page 2: SENSS Against Volumetric DDoS Attacks

DDoS attacks

• Volumetric DDoS can overwhelm networks• Such attacks are hard to mitigate by

victim• Volume is too high for victim to handle –

need help of upstream ISPs• Legit traffic mixed with attack traffic –

need help to place imperfect filters near attack sources to minimize collateral damage

• Need collaborative, distributed response• But today’s internet lacks the

infrastructure for victim to ask peers or remote networks for help

2*Figure taken from Arbor Networks worldwide infrastructure security report, 2016

Page 3: SENSS Against Volumetric DDoS Attacks

Existing solutions at victim

Victim

Attacker

Attacker

Attacker

Attacker

• Solutions such as Bro and Arbor APS deployed at victim• Filters traffic based on

inspection and rules• Large attacks cannot be filtered

as the origin of attack is upstream from victim

BroArbor APS

3

Page 4: SENSS Against Volumetric DDoS Attacks

Existing solutions at first hop ISP

Victim

Attacker

Attacker

Attacker

Attacker

First hop ISP

• Collaboration with ISP via human channels which are error prone and slow• Crude filtering such as remotely-

triggered blackhole saves ISP from attack but cuts victim from internet• Bohatei uses SDN + NFV to scale

defense on demand• Provides a fine grained traffic

control but is resource intensive

RTBHBohatei

4

Page 5: SENSS Against Volumetric DDoS Attacks

Victim

Attacker

Attacker

Attacker

Attacker

Cloud Providers

Existing solutions at cloud

• Cloud solutions are effective by diverting all victim’s traffic towards themselves during an attack• Apply scrubbing algorithms to

remove attack traffic, send the rest to victim• Ability to handle heavy attacks

depends on extent of geo-replication, which is costlyCloudflare

Akamai

5

Page 6: SENSS Against Volumetric DDoS Attacks

What do we provide?

• SENSS is a collaborative framework which allows victim under attack to communicate with peers or remote networks• Design is simple• SENSS keeps the intelligence at the victim and has simple functionalities at ISP

which can be easily implemented in current ISP infrastructure• Victim drives decisions to monitor and taking necessary actions to mitigate

attacks• Victims can create versatile, evolvable and customizable defense for different

types of DDoS flavors

6

Page 7: SENSS Against Volumetric DDoS Attacks

Overview

• Introduction• SENSS• Architecture• SENSS API

• SENSS client programs• Security and robustness• Evaluation• Conclusion

7

Page 8: SENSS Against Volumetric DDoS Attacks

SENSS: Components

8

Attacker SENSS client

SENSS server

SENSS server

Victim

Page 9: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

9

SENSS client

SENSS server

SENSS serverAttacker

Victim

Page 10: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

10

SENSS client

SENSS server

SENSS serverAttacker

Victim

SENSS directory

Page 11: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

11

Traffic Monitor request

Traffic Monitor request

SENSS client

SENSS server

SENSS serverAttacker

Victim

Page 12: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

$

$

12

SENSS serverauthenticates requests SENSS

clientAttacker

Victim

Page 13: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

$

$

13

SENSS servercharges client

SENSS clientAttacker

Victim

Page 14: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

Gather traffic stats

Gather traffic stats

14

SENSS clientAttacker

Victim

Page 15: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

15

Return monitoring stats

SENSS client

SENSS server

SENSS serverAttacker

Victim

Page 16: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

16

Devise mitigation strategy

SENSS server

SENSS serverAttacker

Victim

Page 17: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

17

Traffic control request

SENSS clientSENSS serverAttacker

Victim

Page 18: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

$

18

SENSS serverauthenticates requests SENSS

clientAttacker

Victim

Page 19: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

$

19

SENSS servercharges client

SENSS clientAttacker

Victim

Page 20: SENSS Against Volumetric DDoS Attacks

SENSS: Attack scenario

Apply controlrequest

20

SENSS clientAttacker

Victim

Page 21: SENSS Against Volumetric DDoS Attacks

SENSS: Attack blocked

Attack trafficblocked!

21

SENSS clientAttacker

Victim

Page 22: SENSS Against Volumetric DDoS Attacks

SENSS: Labor division

22

Intelligence at victim

Page 23: SENSS Against Volumetric DDoS Attacks

SENSS: Incentives for ISPs

$

$ With incentives!

23

Simple implementation at ISP

Page 24: SENSS Against Volumetric DDoS Attacks

SENSS: Secure

24

Queries only on client’s owned prefixes

SENSS server verifies prefix ownership

Communication secured by TLS

Page 25: SENSS Against Volumetric DDoS Attacks

SENSS API

Type Response from SENSS serverTraffic Query Traffic stats matching predicates

25

Page 26: SENSS Against Volumetric DDoS Attacks

SENSS API

Type Response from SENSS serverTraffic Query Traffic stats matching predicatesRoute Query AS paths from SENSS server to prefix

26

Page 27: SENSS Against Volumetric DDoS Attacks

SENSS API

Type Response from SENSS serverTraffic Query Traffic stats matching predicatesRoute Query AS paths from SENSS server to prefix Traffic filter Adds filter matching predicate

27

Page 28: SENSS Against Volumetric DDoS Attacks

SENSS API

Type Response from SENSS serverTraffic Query Traffic stats matching predicatesRoute Query AS paths from SENSS server to prefix Traffic filter Adds filter matching predicateRoute demote Demotes AS path from SENSS server to prefix with

certain path segment

28

Page 29: SENSS Against Volumetric DDoS Attacks

SENSS API

Type Response from SENSS serverTraffic Query Traffic stats matching predicates

Route Query AS paths from SENSS server to prefix Traffic filter Adds filter matching predicate

Route demote Demotes AS path from SENSS server to prefix with certain path segment

29

Each traffic query/control consists of a predicate matching flow(s)• Supports various packet header fields• Different packet header fields can be combined using negation,

conjunction, disjunction and wildcard

Page 30: SENSS Against Volumetric DDoS Attacks

SENSS Server Implementation

• Queries to SENSS server can be implemented using Openflow or Netflow+ACL• SENSS server receives requests

from clients, authenticates and sends appropriate replies • SENSS server also co-ordinates

with various border routers within the same ISP and gathers statistics

SENSS ServerSENSS ISP

30

Page 31: SENSS Against Volumetric DDoS Attacks

Overview

• Introduction• SENSS• Architecture• SENSS API

• SENSS client programs• Security and robustness• Evaluation• Conclusion

31

Page 32: SENSS Against Volumetric DDoS Attacks

V

S1

S2

S3

L1

L2

A

B

C

D

DDoS without signature attack

32

Legit traffic from L1 and L2

Page 33: SENSS Against Volumetric DDoS Attacks

V

S1

S2

S3

L1

L2

A

B

C

D

DDoS without signature attack

33

Periodic traffic query to S1, S2 and S3

Page 34: SENSS Against Volumetric DDoS Attacks

V

S1

S2

S3

L1

L2

A

B

C

D

DDoS without signature attack

34

RepliesS1: 1000 MbpsS2: 0 MbpsS3: 400 Mbps

Page 35: SENSS Against Volumetric DDoS Attacks

V

S1

S2

S3

L1

L2

A

B

C

D

DDoS without signature attack

35

Attack from A

Page 36: SENSS Against Volumetric DDoS Attacks

V

S1

S2

S3

L1

L2

A

B

C

D

DDoS without signature attack

36

More attack from B, C and D

Page 37: SENSS Against Volumetric DDoS Attacks

V

S1

S2

S3

L1

L2

A

B

C

D

DDoS without signature attack

37

Periodic traffic query to S1, S2 and S3

Page 38: SENSS Against Volumetric DDoS Attacks

V

S1

S2

S3

L1

L2

A

B

C

D

DDoS without signature attack

38

RepliesS1: 1000 MbpsS2: 500 MbpsS3: 750 Mbps

Page 39: SENSS Against Volumetric DDoS Attacks

V

S1

S2

S3

L1

L2

A

B

C

D

DDoS without signature attack

39

RepliesS1: 1000 MbpsS2: 500 MbpsS3: 750 Mbps

RepliesS1: 1000 MbpsS2: 0 MbpsS3: 400 Mbps

Page 40: SENSS Against Volumetric DDoS Attacks

V

S1

S2

S3

L1

L2

A

B

C

D

DDoS without signature attack

40

RepliesS1: 1000 MbpsS2: 500 MbpsS3: 750 Mbps

Unusual traffic from S2 and S3

RepliesS1: 1000 MbpsS2: 0 MbpsS3: 400 Mbps

Page 41: SENSS Against Volumetric DDoS Attacks

V

S1

S2

S3

L1

L2

A

B

C

D

DDoS without signature attack

41

Traffic filter at S3

Traffic filter at S2

Page 42: SENSS Against Volumetric DDoS Attacks

V

S1

S2

S3

L1

L2

A

B

C

D

DDoS without signature attack

42

Attack stopped at S2 and S3!

Page 43: SENSS Against Volumetric DDoS Attacks

Overview

• Introduction• SENSS• Architecture• SENSS API

• SENSS client programs• Security and robustness• Evaluation• Conclusion

43

Page 44: SENSS Against Volumetric DDoS Attacks

Securing communication

• SENSS allows client to issue requests only to its own prefixes• SENSS client binds a proof of ownership certificate with every request

• Proof can be created using RPKI Route Origin Authorization (ROA) certificates• Alternatively we can issue custom certificates

• Communication between SENSS client and SENSS server is secured using TLS and occurs over HTTPS• If the privacy of key is compromised, SENSS server can purge all existing client

requests

44

Page 45: SENSS Against Volumetric DDoS Attacks

Challenges

• Router’s TCAM space is limited• Coarse rules are enough to mitigate large volumetric attack• Finer rules can be prevented by SENSS ISP’s or discourage users by charging

higher prices

• ISP’s privacy concerns• Traffic replies can contain anonymized ID’s to cover neighboring peers

• ISP is in control• Can reject demote requests which may not be optimal

45

Page 46: SENSS Against Volumetric DDoS Attacks

Handling misbehavior

• SENSS clients have low incentive to misbehave• Excessive requests are unlikely as clients need to pay for each request• Requests can be made only for their own prefixes

• SENSS servers could lie about observations and/or fail to implement control actions• Legacy: Lie about client’s traffic and make it look smaller, increasing the cost

of client but does not drop traffic• Dropper: Lie about client’s traffic and make it look larger causing client to

issue traffic control to drop traffic• But dropper liars are already on the path of traffic, SENSS does not make it worst

46

Page 47: SENSS Against Volumetric DDoS Attacks

Overview

• Introduction• SENSS• Architecture• SENSS API

• SENSS client programs• Security and robustness• Evaluation• Conclusion

47

Page 48: SENSS Against Volumetric DDoS Attacks

Evaluation objectives

• Extent of SENSS adoption by ISP required for effective protection?• 0.7—3.8% deployment of SENSS in large ISPs can protect most customers

• How will different customers benefit from SENSS adoption?• All direct single homed customers of SENSS ISPs are protected from direct

floods and reflector attacks• 90% of direct multi homed or remote customers are protected from floods

without signature and reflector attacks with just 1—3.8% of SENSS adoption• SENSS comparison with existing cloud solutions• SENSS outperforms all after 0.4% of top transit deployment

48

Page 49: SENSS Against Volumetric DDoS Attacks

Evaluation objectives

• Extent of SENSS adoption by ISP required for effective protection?• 0.7—3.8% deployment of SENSS in large ISPs can protect most customers

• How will different customers benefit from SENSS adoption?• All direct single homed customers of SENSS ISPs are protected from direct

floods and reflector attacks• 90% of direct multi homed or remote customers are protected from floods

without signature and reflector attacks with just 1—3.8% of SENSS adoption• SENSS comparison with existing cloud solutions• SENSS outperforms all after 0.4% of top transit deployment

49

Page 50: SENSS Against Volumetric DDoS Attacks

Evaluation objectives

• Extent of SENSS adoption by ISP required for effective protection?• 0.7—3.8% deployment of SENSS in large ISPs can protect most customers

• How will different customers benefit from SENSS adoption?• All direct single homed customers of SENSS ISPs are protected from direct

floods and reflector attacks• 90% of direct multi homed or remote customers are protected from floods

without signature and reflector attacks with just 1—3.8% of SENSS adoption• SENSS comparison with existing cloud solutions• SENSS outperforms all after 0.4% of top transit deployment

50

Page 51: SENSS Against Volumetric DDoS Attacks

Evaluation objectives

• Extent of SENSS adoption by ISP required for effective protection?• 0.7—3.8% deployment of SENSS in large ISPs can protect most customers

• How will different customers benefit from SENSS adoption?• All direct single homed customers of SENSS ISPs are protected from direct

floods and reflector attacks• 90% of direct multi homed or remote customers are protected from floods

without signature and reflector attacks with just 1—3.8% of SENSS adoption• SENSS comparison with existing cloud solutions• SENSS outperforms all after 0.4% of top transit deployment

51

Page 52: SENSS Against Volumetric DDoS Attacks

Evaluation

• Conducted emulation and simulation over AS-level topology • Used two strategy for SENSS server deployment• Top: SENSS is deployed in top N ASes ordered in decreasing customer size• Random: SENSS is randomly deployed in N Ases

• Two types of traffic • Uniform: Attack traffic are equally distributed among random ASes• Realistic: Attack traffic from only from residential network hosting Mirai

botnet

52

Page 53: SENSS Against Volumetric DDoS Attacks

DDoS without signature

• SENSS is very effective in sparse deployment• Deployment of 1.5% of top ASes

achieves 90% for direct/single homed customer• Deployment of 3.8% of top ASes

achieves 90% of multi homed customers and remote customers

0

20

40

60

80

100

0.01 0.1 1 10

%attack

fltered

% transit ASes deploying SENSS

uni-dir-singlereal-dir-single

uni-dir-multireal-dir-multi

uni-remotereal-remote

53

Page 54: SENSS Against Volumetric DDoS Attacks

Comparison of SENSS with cloud deployments

• Estimate saved bandwidth by SENSS and cloud deployment strategies• Saved bandwidth is the difference

between bandwidth consumed with and without defense strategy• Ideal solution would have 100% saved

bandwidth• Existing solution save 13—46%• For 10% deployment, SENSS saves

60% of bandwidth, 1.5—8 times more bandwidth than others

��

��

��

��

���

����� ���� ��� � �� ���

�������

��������������

� ������� ���� ��������� �����

����������������

�������������

��������������

54

Page 55: SENSS Against Volumetric DDoS Attacks

Overview

• Introduction• SENSS• Architecture• SENSS API

• SENSS client programs• Security and robustness• Evaluation• Conclusion

55

Page 56: SENSS Against Volumetric DDoS Attacks

Conclusion

• SENSS is a collaborative defense where victims under volumetric DDoS attacks can request help from upstream ISPs• SENSS API provides building blocks for clients to build custom defense

to mitigate attacks• SENSS servers are simple to deploy with monitory incentives to ISPs• SENSS is effective in sparse deployment • SENSS is more effective in saving bandwidth than other existing cloud

based defense

56