presentation on:- a dos limiting network architecture xiaowei yang david wetherall thomas anderson...

47
Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Upload: edward-spencer

Post on 14-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Presentation On:-

A DoS Limiting Network Architecture

Xiaowei Yang David Wetherall Thomas Anderson

Presented by-Saurabh Lalwani

Page 2: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

This Presentation covers:

Design of Traffic Validation Architecture to limit the impact of DoS.

The TVA Protocol. Full range of attacks have been addressed. Simulations results for TVA are shown proving it better than

others. Deployment of the architecture. Pros and Cons of this mechanism.

Page 3: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

What is DoS? A denial-of-service attack (DoS attack) is an attempt to

make a computer resource unavailable to its intended users.

Generally, the purpose of DoS attacks is to prevent an Internet site from functioning efficiently or at all, temporarily or indefinitely.

One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable.

Page 4: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Introduction

DoS attacks have been of major concern considering the reliability of internet.

Proposed defense mechanisms.o Ingress Filteringo Overlay Filtering o Tracebacko Pushback of Traffic Filterso SIFF

The above mentioned mechanisms did not provide complete solution. Hence, a better mechanism was required.

Page 5: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Ingress Filtering (RFC 2827) Is a technique used to make sure that incoming packets are

actually from the networks that they claim to be from. Packets coming into the network are filtered using ISP if

originating from an unknown network.

Limitation – Works Only with edge routers. The destination needs to know which IP addresses of each of the

networks to which it is communicating.

Page 6: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Traceback Determines the origin of the attack. Requires privileged access to routers. Uses routers to create tables to reconstruct the path of

unwanted traffic.

Limitation – Destination becomes aware of it only if attack sustains for long. Fails if the attacking frequency is varied. Attacking from multiple hosts.

Page 7: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

PushbackA mechanism in which the congested router asks the upstream routers to limit the amount of traffic during the time of severe congestion which can be due to flash crowd or denial of service attack.

Limitation – No way of distinguishing between flash crowd, i.e, requests from good clients, and DoS attacks.

Page 8: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

SIFF (Stateless Internet Flow Filter) Privileged Communication is established by providing clients

with capability token via handshake protocol.

Privilege Token

Limitation – Short capability length (2 bits).

Page 9: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

The Solution : Traffic Validation Architecture (TVA)

Covers the shortcomings of previously discussed mechanisms.

Counters attacks that:o Flood the setup channelo Exhaust router stateo Consume network bandwidth

Allows destination to control the number of packets it receives.

Page 10: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

TVA Design Overview

Packets with Capabilities Bootstrapping Capabilities Destination Policies Unforgeable Capabilities Fine-Grained Capabilities Bound Router State Efficient Capabilities Router Changes and Failures Balancing Authorized Traffic Short, Slow or Asymmetric Flows

Page 11: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

TVA Design Overview

Capabilities

A piece of information authorizing a packet. Must be unforgeable. Cannot traverse readily across senders or destinations (valid

only between a specific source and a specific destination). Routers must be able to verify capabilities explicitly. Each packet carries unique stamp which is necessary for its

validation. Must expire to cut-off unneeded sender.

Page 12: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

TVA Design Overview

Bootstrapping Issues

Acquiring capabilities without having capabilities by sending request packets.

Once capabilities are obtained, the communication is bootstrapped.

Fair queuing combined with path identifiers prevents overwhelming requests from legitimate clients.

Page 13: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

TVA Design Overview

Destination Policies

Policies depend on the role destination plays in the network. That is, a client and a public server

A client establishes contact with the server and is not contacted otherwise.

A public server can temporarily block a misbehaving client.

Page 14: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

TVA Design Overview

Unforgeable Capabilities Capabilities should not be forgeable. Each router generates its pre-capability and attaches it with

the outgoing packet.

Router verifies the hash using its secret. Router changes its secret at twice the rate of timestamp

rollover. Destination receives these pre-capabilities, preventing

spoofed attacks.

Page 15: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

TVA Design Overview

Fine-Grained Capabilities

Designed to tackle with false authorizations which can cause the DoS until capability expires.

Limits the amount of data and period of validity. Two hashes are required now instead of one.

Page 16: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

TVA Design Overview

Bound Router State

Router memory can get exhausted if the attacker creates authorized connections across a target link.

Router state is maintained only for flows with valid capabilities and send faster than N/T.

For newly arriving packets, router begins a byte count and associates a minimal time-to-live with the state.

TTL = L*(N/T) ; L Length of the packet

Page 17: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

TVA Design Overview

Consider the router creates a capability at time “ts” valid uptil “ts + T”, then it allows data till the ttl field is decremented to zero, after which the router state is reclaimed.

Page 18: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

TVA Design Overview

Efficient Capabilities

Long key length ensures security and short key length expedites the communication.

To increase the efficiency, we use long capabilities to ensure security and cache capabilities at routers so that they can subsequently be omitted for bandwidth efficiency.

Necessary condition for proper working – senders must know when routers will evict their capabilities from the cache.

If capabilities are not found in the router’s cache, the packets will be demoted to legacy packets.

Page 19: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Reduced Packet Overhead

No separate packet is needed to obtain capabilities.

Capability Header adds 8 bytes to packet header for each router on path.

Furthermore, router’s cache entry also helps in reducing the overhead.

Page 20: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Impact of Router Changes

Route change invalidate capabilities causing packets to traverse through different path.

Packets are demoted and forwarded as legacy traffic.

When destination receives it, it marks a bit in the return packet, informing sender to request new capabilities.

Consequent packets are sent as request packets again.

Page 21: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

TVA Design Overview

Balancing Authorized Traffic

Balancing of the authorized traffic is done by fair-queuing based on the authorizing destination IP address.

To limit the number of queues, a bounded policy is used which only queues those flows that send faster than N/T.

Low-rate flows receive FIFO service.

For Low-rate flows fairness is not guaranteed but FIFO prevents starvation.

Page 22: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

TVA Design Overview

Short, Slow or Asymmetric Flows

TVA is designed to run efficiently for long, fast flows.

For short or slow connections can be inefficient.

Overall impact is small assuming maximum traffic to be of long flows.

Page 23: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

The TVA Protocol

Consists of three elements

Packets that carry capability information.

Hosts that act as senders and destinations.

Routers that process capability information.

Page 24: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

The TVA Protocol

Packets with Capabilities

Capabilities are piggybacked rather than using separate packets.

There are two types of packets Request Packet Regular Packet

Both the packets share an identifying capability header.

Page 25: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Common Header Is the opening tag of both request and regular packets. The “type” field gives important information about the

outgoing packet.

Page 26: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

The TVA Protocol

Request Packet Carry a list of blank capabilities and path

identifiers, that are filled in by routers.

Page 27: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

The TVA Protocol

Regular Packet Have two formats:

o Carry both flow nonce and a list of valid capabilities.o Carry only a flow nonce.

A regular packet with a list of capabilities may be used to request new set of capabilities

Page 28: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

The TVA Protocol

Senders and Destinations

A sender first sends a request piggybacked on the first packet.

If the destination chooses to authorize, it sends a response with TCP SYN/ACK, else sends TCP RST.

Page 29: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

The TVA Protocol

Routers

Process packets according to the capability information and forwards them.

Shares the capacity of each outgoing link with three classes of traffic:

o Request Packetso Regular Packetso Legacy Traffic

Add pre-capabilities and even a path identifier (if it is at the trust boundary)

Page 30: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

The TVA Protocol

Routers (Contd.) The cache entry stores the:

o Valid capabilityo Flow nonceo Authorized bytes to sendo Valid timeo TTLo Byte Count

Various checks are done to know the type of incoming packet.

The packet is demoted to be of legacy traffic if neither its nonce nor its capabilities are valid.

Page 31: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Simulation Setup Bottleneck link is shared by:

10 legitimate users each sending a file of 20KB thousand times using TCP (efficiency is 53.3%).

1-100 attackers One legitimate destination and one colluder at the far end.

TVA is changed to rate-limit capacity requests to 1% of link capacity.

Attack intensity is varied by changing the number of attackers.

The timeout for TCP SYN is fixed at one second with up to eight transmissions being performed.

Page 32: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Simulation

The data exchange aborts connection if its retransmission timeout for a regular packet exceeds 64 seconds or the frame has been retransmitted more than 10 times.

Page 33: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Simulation

First Scenario Legacy Packet Floods Legacy Traffic is considered to be 1Mbps. The result of the simulation is shown below:

Page 34: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Simulation

Legacy Packet Flood (Contd.) With TVA, almost 100% completion is present because TVA

treats legacy traffic with lower priority than request traffic. Performance of SIFF degrades slowly because it treats both

legacy and request packets equally. Pushback performs well until the number of attackers is

increased, after which it performs poorly. The reason being that it is unable to differentiate between attack traffic and legitimate traffic.

With the Internet, the legitimate and attack traffic are considered alike and hence the probability for a successful file transfer decreases exponentially.

Page 35: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Simulation

Second ScenarioRequest Packet Floods

Attacker is flooding the destination with request packets at 1 Mbps.

Assumption the destination was able to differentiate between requests from legitimate users and attackers.

Page 36: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Simulation

Request Packet Flood (Contd.)

With TVA, requests from attackers and legitimate users are queued separately so that excessive packets from the attackers will be dropped off.

Behavior of SIFF is similar to the previous case as it treats both legacy and request packets as same.

Pushback and Internet also treat them as the regular data traffic.

Page 37: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Simulation

Third ScenarioAuthorized Packet Floods TVA still completes the transfer although time taken

increases.

Page 38: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Simulation

Authorized Packet Flood (Contd.) TVA allocates bandwidth equally among all users, allowing

colluder and destination to have bandwidth fairly allocated. As the number of colluders increase, although the bandwidth

allocated to each of them decreases but no one starves, consequently increasing the transfer time.

With SIFF, legitimate users are completely starved when the intensity of the attack increases because the request packets are treated with lower priority.

Internet and Pushback behave in the same manner described in the previous two scenarios.

Page 39: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Simulation

Scenario 4Imprecise Authorization Policies

Even if the attacker gets the authorization and starts flooding the destination, TVA capabilities will expire after sometime hindering further inflow of packets.

Once the destination realizes that a sender is misbehaving, it stops renewing the capabilities.

In SIFF, the expiration of capabilities depend on changing the router secret.

Page 40: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Simulation

Imprecise Authorization Policies (Contd.)

Page 41: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Implementation

The TVA was prototyped using Linux netfilter framework. AES-hash is used as the first hashing function and SHA 1 as

the second. A kernel packet generator was used to generate different

packets and send them through the router to check the behavior of TVA.

The average number of instruction cycles for the router to process each type of packet was recorded.

Page 42: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani
Page 43: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Security Analysis

The security of TVA depends on ability of the attacker to obtain capabilities for router.

Use of cryptographic hash functions is made having a sufficient amount of key which changes every 128 seconds making it practically impossible to break.

Since the IP source and destination addresses are included, an attacker who steals the packets cannot use them unless he know the router’s secret.

Page 44: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Deployment

The design requires both routers and hosts to be upgraded.

Routers can be upgraded incrementally, at trust boundaries and locations of congestion.

Hosts must also be upgraded by setting proxies at the edges of customer networks.

Page 45: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Pros Overhead is reduced since no separate request packet is

required to acquire capabilities. Secured transmission with the help of capabilities. Request Traffic is prioritized ahead of the legacy traffic. Resistant to infrequent router failures. Making use of router’s cache entry to expedite the

communication. Rate-limiting the bandwidth helps in minimizing the effect of

bad authorizations.

Page 46: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Cons

All the routers need to be synchronized in time, a condition difficult to achieve.

Little protection if a router gets compromised. High bandwidth is needed for short, slow or asymmetric flows. The assumption that the destination can differentiate between

request packets from attackers and legitimate senders is weak. After capabilities are validated for each router, packets must

follow the same path or be demoted as legacy traffic.

Page 47: Presentation On:- A DoS Limiting Network Architecture Xiaowei Yang David Wetherall Thomas Anderson Presented by- Saurabh Lalwani

Conclusion

The TVA makes effective communication possible between any two hosts despite a large number of attackers.

Simulation results show that the performance of TVA is better than existing mechanisms.

The implementation of TVA in the Linux kernel showed that TVA can run at gigabit speeds on commodity PCs.