Defenses Against Distributed Denial of Service Attacks: Internet Threat: Ddos Attacks
Defenses Against Distributed Denial of Service Attacks: Internet Threat: Ddos Attacks
DDoS Challenges
Challenge 1: IP source address spoofing
Attackers hide their origin by spoofing IP
source address Victim cannot filter out spoofed IP packets, wastes resources Goal: identify spoofed packets
Outline
Challenge 1: IP source address spoofing
Pi: first approach to identify IP-spoofing for
every packet IEEE Security & Privacy Symposium 2003
Traffic Filtering (Pushback) DNS Rerouting Ingress Filtering Detection of Spoofed IP address (Hopcount filter) Overprovisioning/replication (DNS root servers, Akamai) In-network detection and defense approaches (DWard)
Pi: Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
Basic Premise:
Path fingerprints
Entire fingerprint in each
packet
Incrementally
constructed by routers along path
Detect spoofing by
observing discrepancy between IP address and path fingerprint
Pi filtering
<Pi, IP> filtering Basic filter Threshold filtering
Pi Marking: Description
Marking Scheme
Routers push n bits into the MSB position of the IP Identification
field
Marking Function
Last n bits from the hash of the IP address of the current router
concatenated with the IP address of the previous-hop router [ie. MD5(IPi || IPi -1) mod 2n ]
Pi Marking
Basic WriteAhead
Solution:
Every router marks on-behalf of the next-hop router in
the path. (Write-Ahead) Every router checks to see if its markings have already been added to the packet.
Pi-IP Filter
Victim stores mapping of Pi mark and
corresponding IP networks If victim is under attack, use Pi-IP table as indicator of which source addresses are not spoofed Experiment: over 99.9% of all spoofed source address packets rejected
5,000 legitimate users, 100-10,000 attackers n = 2 bits 4 router non-marking ISP perimeter
Victim ISP marks unnecessary/undesirable
Pi Filtering - Thresholds
Problem
Single attacker packet may cause multiple
users rejections
Solution
Assume, for a particular Pi mark, i:
ai= number of attack packets ui= number of legitimate users packets Victim chooses threshold, t, such that if:
t<
ui ai + ui
10
Optimal threshold
value topt =
P U PA + PU
11
Pi Summary
Pi provides DDoS protection
After first identified attack packet Extremely low overhead at routers & endhosts Does not interfere with IP Fragmentation No need for inter-ISP cooperation Great incremental deployment properties and incentives for deployment
Outline
Challenge 1: IP source address spoofing
Pi: first solution to identify IP-spoofing for
every packet IEEE Security & Privacy Symposium 2003
12
Fundamental Problem
DDoS attacks exploit fundamental problem:
receiver has no control over who can send traffic to it We need to enable receiver to stop misbehaving senders Adkins, Lakshminarayanan, Perrig, and Stoica:
Taming IP Packet Flooding Attacks, HotNets 2003
Challenges
Need per flow state in network? Where to filter? Need trust relationships between ISPs? Routers need to authenticate receiver requests to stop flows?
13
SIFF Overview
Sufficient space in packet header
Marking Field (128 bits) Flags Field (3 bits) [Optional] Update Field (128 bits)
Packet classes
Unprivileged or best effort: signaling traffic /
legacy traffic Privileged: data traffic, displaces unprivileged traffic
14
SIFF Properties
DoS-less client/server communication
Packet receiver can stop flow if it consumes local
network resources
Limited spoofing
Equivalent to universal Ingress Filtering Lightweight at routers Small constant state/processing per packet Incremental deployment / backward compatible No trust required between ISPs, no authentication required at routers, only sender must trust receiver to receive correct capability
15
16
17
Receiver-controlled Flows
As packet flow caries on, receiver
receives updated markings If receiver wants to continue to enable sender to send privileged traffic, receiver sends updated marking as capability to sender If receiver wants to terminate malicious flow, receiver simply stops updating sender with new capability, and routers will soon stop the flow early in network
SIFF Performance I
Three parameters for SIFF
z = number of bits per router mark x = number of marks in routers window TK= time between router key changes
18
SIFF Performance II
DDoS 2: Attackers flood forged privileged traffic
Probability of fooling a SIFF router:
P(x,z) = 1 (1 1/2 z )x Probability of fooling d SIFF routers: P(x,z)d
Attacker distribution
19
IPv4 Performance
Packets drop immediately at ISPs border
(3-hops)
SIFF Issues
ISP Border Deployment
ICMP errors may reveal capability
Slight modification ICMP Flooding may occur at non-SIFF router
Path Stability
Route changes invalidate capabilities
Demote privileged to unprivileged when
verification fails
20
Related Work
Gligor: A note on the denial of service
problem, IEEE S&P 83. Gligor: Guaranteeing access in spite of service-flooding attacks, SPW 2003. Adkins, Lakshminarayanan, Perrig, and Stoica: Taming IP Packet Flooding Attacks, HotNets 2003. Anderson, Roscoe, Wetherall: Preventing Internet Denial-of-Service with Capabilities, HotNets 2003.
21
Conclusions
Changing end-hosts and routers seems
necessary to defend against DDoS threat Pi enables detection of spoofed IP address SIFF mitigates flooding attacks
22