1 / 20

Using Routing and Tunnelling to Combat DoS Attacks

Using Routing and Tunnelling to Combat DoS Attacks. Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London. http://nrg.cs.ucl.ac.uk/mjh/servernets.pdf. Background: Using Addressing to Combat DoS Attacks.

Download Presentation

Using Routing and Tunnelling to Combat DoS Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London http://nrg.cs.ucl.ac.uk/mjh/servernets.pdf

  2. Background:Using Addressing to Combat DoS Attacks • In previous work, we suggested that many of unwanted modes of operation of the Internet could be prevented by simple changes to the addressing architecture. http://www.cs.ucl.ac.uk/staff/M.Handley/papers/dos-arch.pdf • Unfortunately these changes would be hard to deploy in practice. • Needs IPv6, HIP, large-scale agreement on the solution.

  3. Towards deployable solutions. • To be deployable in the near term, a solution needs to satisfy the following criteria: • Feasible with IPv4. • Use off-the-shelf hardware. • No changes to most Internet hosts. • No changes to most Internet routers. • Use existing routing protocols.

  4. Towards evolvable solutions • It is important that in providing short-term solutions we don’t sacrifice the future evolution of the Internet. • Anything that goes in the middle of the network should be: • Application independent. • Impose minimal dependencies on transport protocols.

  5. Goals • Defend servers against DoS attacks. • Opt-in. Servers have to choose to be defended. • Shut down unwanted traffic in the network as close to the source of that traffic as possible. • Server decides certain traffic is unwanted. • Requests traffic is shut down. • Network filters traffic. Only network filtering can defend against link-flooding attacks.

  6. Very Simple Architectural Overview • Place control points in the network that are capable of performing IP-level filtering. • Cause unwanted traffic to our servers to traverse these control points. • Provide a signalling mechanism to allow the servers to request certain traffic is filtered. Problem 1: How to determine which control point can shut down certain traffic? Problem 2: How to ensure that only the recipient of unwanted traffic can request its filtering.

  7. Revised Architectural Overview • Place control points in the network. • Cause all traffic to server subnets to traverse at least one control point. • Control points mark the traffic with their identity. • Receivers can see which control points are on the path from sender. • Can request correct control point to install filter.

  8. Constraints • To provide a protocol-independent solution, we must primarily work at the IP layer. • The main IP-layer tools available to us are: • Addressing • Routing • Encapsulaton

  9. Using these tools... Addressing • To identify server subnets. Routing • To limit and control the paths to the server subnets. • To direct traffic through control points near to the source of the traffic. Encapsulation • To record information about the control points traversed on the path from client to server.

  10. Incremental Deployment • First we’ll sketch out how servernets might be deployed in a single ISP. • Can only push back as far as ISP border. • Useful for large ISPs with many peering points, as attack has not yet fully converged. • Next we’ll explain how cooperating ISPs can deploy multi-ISP servernets. • Greater benefits as pushback can be much closer to attack source.

  11. Traffic Source Normal ISP Routing E-BGP E-BGP 1 2 Border Router I-BGP + OSPF 3 E-BGP Local Router Server S ISP Network

  12. Traffic Source Request Filter Monitor Encapsulation E-BGP: Advertise S 1 2 I-BGP 3 E-BGP Advertise S Server S ISP Network

  13. E-BGP Net S Nexthop E1 E-BGP Net S Nexthop E2 Routing Key Points: Only route from outside to S is via an encapsulator. Net D is not externally advertised at all. S not advertised 1 2 E1 E2 I-BGP Net S Nexthop D, “servernet” “no export” 3 D Server S ISP Network

  14. OSPF: Net S via E1 OSPF: Net S via E2 Local DoS attack? Routing for Internal Clients 1 E1 I-BGP Net S Nexthop D, “servernet” “no export” E2 3 D Server Client S C

  15. E-BGP Net S, R1 “servernet” “no export” I-BGP Net S Nexthop R1, “servernet” “servernet-transit” “no export” I-BGP Net S Nexthop R1, “servernet” “servernet-transit” “no export” To rest of world (external clients) Multi-ISP Servernets D1 I-BGP Net S Nexthop D, “servernet” “no export” R1 Server S R2

  16. Client Multi-ISP Servernets D1 R1 Server S R2 I-BGP Net S Nexthop R1, “servernet” “servernet-transit” “no export”

  17. Protection • Provide defense against non-spoofed traffic for servers that opt-in. • Automatic mechanism reduces costs for ISP. • Lower collateral damage for ISP. • Assumes a detection mechanism exists that can identify bad traffic sources. • What about spoofed traffic?

  18. Attack landscape • Currently most DoS attacks are not spoofed. • No need to! • Servernets change the landscape. Attackers will then need to: • Spoof source addresses. • Disguise their attack traffic to fly below the detection threshold.

  19. Spoofing • The existence of servernets would provide stronger motivation for deployment of ingress filtering. • Currently there’s limited gain from doing so. • Servernet encapsulators are a natural place to perform source address validation. • Only current ways to do this are hacks, but future extensions to protocol stack could provide simple address authentication. • Eg. ICMP nonce-exchange. • This is a longer-term solution.

  20. Future work • Implement and test the scheme in the lab. • Software implementation on fast PC hardware. • Goal is to encap/decap and firewall at 1Gb/s. • Already in progress (3 to 6 months). • Deploy the scheme in the wild. • Industrial collaborators are most welcome.

More Related