130 likes | 320 Views
DoS attacks prevention. Avital Yachin Under supervision of Gal Badishi SoftLab – June 2006. What is DoS. server. client. attacker. What is DDoS. zombie. zombie. server. zombie. zombie. zombie. zombie. Possible solutions. Firewall (specific ports) ?
E N D
DoS attacks prevention Avital Yachin Under supervision of Gal Badishi SoftLab – June 2006
What is DoS server client attacker
What is DDoS zombie zombie server zombie zombie zombie zombie
Possible solutions • Firewall (specific ports) ? • Heuristic (identifying and blocking the attacker) ? • Clients Authentication ? • At what level ?
Selected solution • Both sides authenticate the other side at the packet level. • Current implementation filters packets at the transport layer (UDP). • Can be generalized to the IP layer.
IP Data IP Header UDP Data UDP Header UDP Data UDP Header IP Data IP Header How it works Outgoing Packets Key
IP Data IP Header UDP Data UDP Header UDP Data UDP Header IP Data IP Header How it works Incoming Packets Key ? = Key
User mode Kernel mode How it works Application TCP/IP Driver NDIS Driver Network Card NDIS Hook Driver Encapsulator
Authentication Method • Hashing (SHA-1) of current time and a secret code. • Authentication token changes periodically (not for every packet much cheaper). • Clocks synchronization. • Client’s secret code is known to server.
Conclusions • There’s no simple solution to wire flood. • Packets can be filtered at lower levels thus preventing system resources abuse. • Solution is “cheaper” than IPSEC (but doesn’t handle encryption).
Future Enhancements • Filtering packets at the IP layer (solution for TCP and others). • Auto time synchronization. • Full kernel mode implementation (performance / flexibility tradeoff).