1 / 40

The “Evil Bit” Revisited: Blocking DDoS Attacks with AS-Based Accountability

The “Evil Bit” Revisited: Blocking DDoS Attacks with AS-Based Accountability. Dan Simon Sharad Agarwal Dave Maltz Trustworthy Computing April 8, 2006. The Solution to DoS is Already Here!. Network Working Group S. Bellovin

gada
Download Presentation

The “Evil Bit” Revisited: Blocking DDoS Attacks with AS-Based Accountability

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The “Evil Bit” Revisited: Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Trustworthy Computing April 8, 2006

  2. The Solution to DoS is Already Here! Network Working Group S. Bellovin Request for Comments: 3514 AT&T Labs Research Category: Informational 1 April 2003 The Security Flag in the IPv4 Header Paraphrasing the rest of the RFC: • Malicious applications MUST set the evil bit to 1 • Routers/firewalls SHOULD preferentially drop pakcets with the evil bit set Firewalls ... and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. The problem is that making such determinations is hard. To solve this problem, we define a security flag, known as the "evil" bit, in the IPv4 header. Benign packets have this bit set to 0; those that are used for an attack will have the bit set to 1.

  3. Approaches to DoS on One Slide • Ingress filtering • Worthless until deployed everywhere, hence undeployable • Pushback filtering • Requires PKI to authenticate requests • Requires router hardware changes • Reflection attacks render pushback useless • Capabilities • Capability server vulnerable to DoS • Requires changing router HW and host SW • Our solution: Leverage AS relationships and the evil bit for incrementally-deployable ingress filtering and pushback without router changes or a PKI

  4. Outline • The Problem of DoS • Internet Accountability • Achieving accountability among a club of members with pair-wise trust • Dealing with the world outside the club • Determining if a member of the club has gone bad • Economics of Dos and Accountability

  5. Understanding (D)DoS • Basic structure: the attacker tries to get the target to use up resources (memory, CPU, bandwidth, etc.) dealing with DoS traffic • Succeeds when the target’s remaining resources are insufficient to handle everyone else’s traffic • The target’s only strategies are: • Increasing resources enough to handle it all • Distinguishing DoS traffic, and reducing the resources expended on it • E.g., identify sources of DoS traffic, and block them

  6. DoS and the Internet webserver access link Company running a website You are here Your customers are here Some of them want to hurt you

  7. Levels of DoS Can hit the application layer or the network layer • App-layer DoS attack and defense are highly application-dependent • The attacker can exploit bugs or costly high-level operations • The defender can try to spot subtle distinguishing cues in application-level traffic

  8. Levels of DoS Network-layer DoS can attack any application • Website serving a peak load of 100,000 hits/second, @5KBytes/hit, needs a 4Gbps access link ($25-$50K/month) …. • ….Which is completely saturated by 4,000 1Mbps broadband clients (about $400/week on the ‘botnet market)

  9. Levels of DoS Observations: • If new attackers appear faster than they can be classified, then all is lost (IP spoofing/DHCP exacerbates) • Need to shed all load from attacker once identified • ASes have long-lived relationships with each other • ASes generally have non-transient relationships with their customers (e.g., billing information)

  10. Sidebar: Isn’t End-Host Security the “Real” Problem? • True, compromised end hosts (“botnets”) are a major source of unwanted traffic • But….suppose end hosts were bullet-proof • E.g., you could run “SETI@home” completely safely • Introducing “DDoS@home”.... • Does something nice for the user (use your imagination) • Borrows spare cycles and bandwidth in return, with which to launch DDoS attacks • The user may or may not even know or care what it does, because…. • …The user’s computer and data are completely safe • Conclusion: End hosts aren’t the whole problem • The solution needs to involve the network, as well

  11. Outline • The Problem of DoS • Internet Accountability • Achieving accountability among a club of members with pair-wise trust • Dealing with the world outside the club • Determining if a member of the club has gone bad • Economics of Dos and Accountability

  12. What Is Accountability? Two components: • Identification: Receivers of traffic can distinguish it by source • Must be based on some persistent attribute • I.e., difficult/expensive for the originator to change • Think “IP address”—but something more durable is needed • Defensibility: Receivers can choose to avoid (block) traffic from a source with a particular persistent attribute • Requires identification, but doesn’t automatically follow from it Allows a DoS target to distinguish DoS traffic sources (not just IP address), and block all traffic from them

  13. Outline • The Problem of DoS • Internet Accountability • Achieving accountability among a club of members with pair-wise trust • Dealing with the world outside the club • Determining if a member of the club has gone bad • Economics of Dos and Accountability

  14. Implementing Accountability on the Internet(Among a Club with Pair-wise Trust) • “Total” Ingress Filtering • Every packet is required to have an honest source address • Covers all traffic (e.g., DNS spoofing eliminated!) • Filtering on request by source-destination pair • Requestor identifies “source” by (IP address, port, time) • Too many filters against a source leads to other measures • Rate-limiting, offers for support upgrades, warnings, charging

  15. Implementing Accountability on the Internet(Among a Club with Pair-wise Trust) Both measures are best implemented at the source ISP • Can identify, distinguish and filter an individual offending machine/user at the ingress point (even assuming DHCP, NAT, etc.) • Downstream ASes are spared the traffic • Multiple paths aren’t a problem • Habitual offenders are more easily recognized

  16. Secure Relay of Filtering Requests • Assume for now: • Peer ISPs cooperate—including ingress filtering • Basic Design: • Every AS/ISP has a Filter Request Server (FRS) • Requestor sends a request to its local ISP’s FRS • FRS forwards the request along a chain of FRSs to the source’s ISP: “filter all traffic from source to requestor” • Request does notneed to follow the same path as the offending traffic • Source’s ISP identifies the source and applies the filter

  17. How FRSs Work

  18. Attacks on the FRS System • Customer asks FRS to filter traffic to another customer • Can’t happen – FRS only allows filters on traffic to requestor • Ingress filtering prevents spoofing and crypto is easy • An ISP injects spoofed Filter Requests • Means an ISP is breaking its peering agreements • Presumably a rare, serious event • Heavy-duty investigation using sampling, logs, cooperation • DoS on FRSs • FRS can filter traffic to itself! • ISP can charge for right to send filter requests, and scale FRS accordingly

  19. Attacks on the FRS System • Framing attacks (false, non-spoofed complaints) • Only relevant when they accumulate, hurting a source’s reputation • A single framer can block anyone he/she wants (and who cares?) • Solution: delay punitive measures to allow resolution • Gives the customer a chance to complain of framing • Overwhelm a router’s ability to filter a customer • Apply many useless filters against a bot, so real filters don’t take • Solution: evict the customer from the club

  20. Outline • The Problem of DoS • Internet Accountability • Achieving accountability among a club of members with pair-wise trust • Dealing with the world outside the club • Determining if a member of the club has gone bad • Economics of Dos and Accountability

  21. Incremental Deployment and the “Evil Bit” • Packets from “unaccountable” peers get “evil bit” set • Marking occurs at ingress to accountable AS • Bit stays set as the packet travels through accountable ASes • Behavior enforced by peering agreement

  22. Incremental Deployment and the “Evil Bit” • ISPs can de-prioritize “evil” traffic sent to their customers • On request, or when traffic to the customer is too heavy • DiffServ mechanisms are already available on most routers • Incentive to other ISPs to become accountable • ISPs can also slap an “evil bit” on repeat offenders’ traffic • Cheaper than filtering out a large list of destination addresses • Incentive for the offender to stop attacks/remove malware

  23. Reflection Attacks • Attacker “redirects” attack packets through an innocent “reflector” • E.g., TCP SYN with (forged) source address of the attack target—results in an ACK sent to the target • Doesn’t magnify the attack, but helps disguise its source attack packets can shed their “evil bit” • Reflectors are fundamental to IP architecture • IP depends on hosts/routers replying to single packets • Path MTU Discovery, TCP RST, ICMP TTL Exceeded • Routers, hosts – all can be used as reflectors • Only two choices • Hosts/routers reply only to packets from authenticated sources – breaks all connectivity to hosts using different or no authentication • Host/router software must change to reflect some characteristic of incoming packet in reply

  24. Reflection Attacks - Solution • Hosts need to preserve the “evil bit” setting of incoming packets when replying to them • Requires changes to host network stacks • But these are necessary in any event, to protect against reflection attacks—regardless of the DoS defense scheme • Incremental deployment possible • Accountable ISPs probe customers for reflection • Set “evil bit” on hosts not reflecting evil bits properly

  25. Outline • The Problem of DoS • Internet Accountability • Achieving accountability among a club of members with pair-wise trust • Dealing with the world outside the club • Determining if a member of the club has gone bad • Economics of Dos and Accountability

  26. What Motivates an AS to Follow the Accountablity Club Rules? • Active malfeasance among ASes can be expected to be rare • Peering agreements are contracts = lawyers • So long as misbehavior is observable to the world, peer pressure keeps ASes in line • Detection must be possible • Need not be automated • Failure to behave means peer ASes will set evil bit on the offender’s traffic • BGP is a positive example

  27. Detecting Fraudulent “Accountable” ASes Easiest case to detect: AS claims to install filters when requested, but doesn’t • Request forwarded and FRS ACK received, but packets still arrive and packet have evil bit clear • Each AS tasks the upstream AS to determine why the filter wasn’t applied, on pain of having evil bit set “getting tossed out of the accountable club”

  28. Detecting Fraudulent “Accountable” ASes Hardest case to detect: AS claims to perform ingress filtering, but doesn’t • Packets with evil bit clear arrive at a host • Packets don’t stop when host requests filtering • Collaboration among neighbor accountable ASes shows packets not entering the fraudulent AS

  29. Outline • The Problem of DoS • Internet Accountability • Achieving accountability among a club of members with pair-wise trust • Dealing with the world outside the club • Determining if a member of the club has gone bad • Economics of Dos and Accountability

  30. Economic Justification Say you want to protect against 50,000 bots@128Kbps/bot.... • Roll-your-own solution: • 6.4 Gbps bandwidth (~10 OC-12s at $30K/month) + enough magic scrubber boxes ($110K/OC-12) = ~$10M over 3 years • Scrubbing services provided by ISP: • $210K/month for 3 OC-48s’ worth of scrubbing = ~$7.5M over 3 years • Deploying accountability: • Hard to say how much this would cost • But we have data on the cost of two huge communication infrastructure overhauls: number block pooling and local wireless number portability • If accountability is comparable, it would cost about $60-230M for the whole Internet • Bottom line: Somewhere between 6 and 30 large orgs could probably finance deployment of Internet accountability by themselves, out of their 3-year savings estimates

  31. Deployment Strategies • Three primary types of ISPs • Serve end-users: Verizon, Comcast, ... • Serve servers and enterprises: SAVIS, AboveNet, parts of ATT & Sprint, ... • Serve other networks (transit): UUNET, ATT, Sprint, ... • Deployment realities • Deployment costs highest for ISPs serving end-users • Revenue potential greatest for ISPs serving servers • But these networks often peer directly! Now money can flow and mutual benefit arise... • Who deploys first? Pairs of Server ISPs and User ISPs

  32. Deployment Over Time • DoS on the Internet slowly goes away • A host with too many filters has evil bit set • ‘botnets become harder to build and aren’t useful for as long • Ultimately, cost for links to DoS a server become greater than the cost of links to connect the server • Deploying accountability in transit network is cheap • Just need an FRS to do pass-thru • Probably not early adopters though

  33. Related Work • Identification • TCP handshake for identification • No good for UDP, DNS, TCP SYN floods, transient IP addresses • End-to-end (IPSec, HIP) • Requires PKI, DNSSec or some other global identity infrastructure • Traceback/packet-marking • Partial, statistical information, doesn’t help against transient IP addresses • Highly vulnerable to reflection attacks • Defensibility • End-host filtering (possibly with packet-marking) • End hosts still have to have enough bandwidth to handle attacks • Capabilities • Don’t protect the capability issuer, and require state in the network to prevent capability abuse • “Active filtering” • Packet-marking + filtering scattered across the network (not just at source)

  34. Conclusions • Network-level DDoS is a big problem on the Internet today • It’s costing a lot of people a lot of money • Solving it will require costly changes • Accountability actually solves the problem • DDoS traffic can be identified and blocked at the source • Accountability is actually deployable • Ingress and by-destination on-request filtering are technically straightforward to deploy • The “evil bit” enables incremental deployment • Accountability is cheaper than living with DDoS

  35. Questions? Thanks!

  36. Our Solution in 1 Slide • Leverage the persistence of relationships among ASes and their customers to create a working “pushback” packet filtering system • Use the “evil” bit to deal with non-participating ASes, achieve incremental deployability, and attain scalability • Provide techniques to discover and cope with ASes that claim to be good citizens, but actually cheat or are lazy • Show that our infrastructure is cheaper than alternatives

  37. Sidebar 2: Computer Networking People, Please Cover Your Ears… • There exists a large-scale, successful network today that doesn’t have a DoS problem…. • …Despite the fact that DoS attacks are breathtakingly easy on it • The reason: Accountability • Targets know who’s attacking, and can ask for the network to block all traffic from them (Okay, Computer Networking folks—you can uncover your ears now….)

  38. Attacks • Perhaps state that our scheme is targeted at end hosts (clients, servers). If a router is compromised, forget flooding style attacks, you've got more serious BGP attacks that can get rid of your legitimate traffic.

  39. Deployment • Pairings of ISPs specializing in hosting servers and ISPs specializing in serving home users • Two tiers of filter requestors • Big servers are stable, and pay for the right to request lots of filters (they’re the DoS targets, after all) • Small clients rarely if ever need to request filters • ASes/ISPs can include “accountability” in their peering agreements • Mutually agree to deploy ingress filtering and accept filtering requests from destinations (really easy for core ASes without end-host clients)

  40. The Evil Bit In Action

More Related