1 / 20

Mitigating DDoS Attacks

Mitigating DDoS Attacks. ------ An Overview. Zhang Fu zhafu@chalmers.se. Outline. What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence Some noticeable solutions Crux issues Discussion The “battle” is going on. DDoS Attacks.

corine
Download Presentation

Mitigating DDoS Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MitigatingDDoS Attacks ------ An Overview Zhang Fu zhafu@chalmers.se

  2. Outline • What is DDoS ? How it can be done? • Different types of DDoS attacks. • Reactive VS Proactive Defence • Some noticeable solutions • Crux issues • Discussion • The “battle” is going on.

  3. DDoS Attacks • A Denial of Service (DoS) attack is an attempt by the attacker to prevent the legitimate users of a service from using that service. • If the attack is launched from multiple compromised machines, then it is a Distributed Denial of Service (DDoS) attack. • Basic Types of DDoS attacks: • Sending malformed packets to confuse systems (protocol or application). Can be also called semantic attack. • Example: SYN-flooding, Teardrop Attacks • Flooding packets to the victim to depleting key resources (bandwidth). Can be also called brute-force attack. • Example: DNS request flooding, Smurf attack.

  4. DDoS Attacks (cont.) • What makes DDoS possible? • End-to-End paradigm : intermediate network provides best-effort packets delivery service. • Different networks do not have effective cooperation. • Victim’s security relies on the rest of the network • End hosts can not control the bandwidth allocation or queuing mechanism of the network • Control is distributed. Zhang Fu zhafu@chalmers.se

  5. Steps of launching DDoSattacks • Recruiting and Exploit. • Propagation. • Launching attacks. attack order

  6. Victim Types • Application • Target on a given application. If the resource is not completely consumed, other application maybe still available. • The attack traffic volume is usually small, and seems to be normal packets. E.g. signature attack. • Host • Overwhelming the host’s communication mechanism. Or make the host crash/reboot. • The attack traffic is usually big. The host can not solve the problem alone. • Resource Attack • Attack some critical entities in the victim’s network, such as DNS server. • Congest some critical links of the network. • The attack traffic is big and easy to detect. But need cooperation to defense.

  7. Victim Types (cont.) • Infrastructure • Aim to disable the critical service of the whole Internet, such as root DNS server, core network, certificate server. • The attack can aggregate a huge volume of traffic with in a very short time period. • Need cooperation to defend against this attack.

  8. Impact of the attack • Disruptive: completely disable the victim’s service. • The victim can recover automatically after the attack. Some may need human to be involved. And some may be not recoverable. • Degrading: consume some portion of the victim’s resource. • Success depends on the service. QoS plays an important role. • Not easy to detect. • Tradeoff between deploying a defense mechanism and losing market caused by the degradation.

  9. Summary of DDoS attacks • What is a DoS / DDoS attack? • Why DDoS attacks can be launched successfully? • DDoS attacks target both in application layer and network layer. • Some DDoS attacks aims to completely deplete the resource of the victim, while others aims to degrade the quality of the victim’s service.

  10. Challenges for defense mechanisms • DDoS is a problem in distributed manner. It needs to be solved in a distributed way. However, assumption of global deployment would be rather strong. • Some attacks can be hardly defined. Many factors may be involved, such as number of compromised machines, attack rate, attack duration, impact of the attack. • Lack of universal benchmark. • Lack of test platforms for large scale network.

  11. Principles for counter measures • Security • The attacker can hardly break the secrets used in the system. Or find a semantic flaw to attack the system. • Accuracy • The system should filter out the malicious traffic as much as possible and affect the legitimate traffic as little as possible. • Efficiency • Keep the overhead within a acceptable threshold • Safe Failure • When the system is fail, the situation can not be worse than that before the deployment.

  12. Which way to go? Proactive VS Reactive • Proactive solutions aim at prevent the DDoS attacks from beginning. Or the victim’s service is not denied during the attacks. • How to prevent DDoS attacks? Secure the hosts, Build DDoS-resilient protocol. We need both police and doctor! • How to make system tolerate DDoS attacks? Resource accounting, provide more resource. • Examples of proactive solutions: puzzle based solutions, network capability, secure overlay.

  13. Proactive VS Reactive (cont.) • Reactive solutions aims at mitigate DDoS attacks when the victim suffers those attacks, or some DDoS attacks are detected. • Need some detection mechanisms. Less overhead in the normal situation. • The problem is how to identify DDoS attacks, what are the proper responses for different kinds of attacks? • Use models of attacks to detect. We can also define abnormal behaviors for detection, But have to be careful with false positive. • Block identified zombies, or rate limiting /filtering.

  14. Network Layer Defense • Network Capability • Choose a path from source to the destination • Capability Establishment (Sending Request and getting Capability) • Sending Packets with Capability • Capability Refreshing Internet

  15. Packet Marking (Trace back) • Packets will be marked by the routers along the path. • When DDoS attacks occur, the victim will identify the attacking sources. • Victim will also send control command to the router which is near to the sources to limit the malicious traffic. What’re the advantages and disadvantages?

  16. SOS: Secure Overlay Service

  17. Application Layer Defense • How can network-based applications defend by themselves? • Solutions inspired by Frequency Hopping. • ACK-based port hopping (Badishi et al. 2005) • Port hopping with bounded clock offset (Lee and Ting 2004) • Hopping authentication code (Srivatsa et al 2006) • Port hopping in the presence of clock drifts. (Zhang et al.2008)

  18. Crux Issues • IP spoofing. • Network topology dependency. • Refreshing secrets. • Feedback mechanisms. • Space efficiency. We can hardly solve DDoS problem completely. The ideal solution could be very complicated. We might need an integrated solution. However, it’s unclear about the optimal integration.

  19. Summary • What is DDoS • Why it is possible • What is the main category of defence mechanisms • We want secure, robust, efficient solutions for the problem. Zhang Fu zhafu@chalmers.se

  20. The EndThank You

More Related