do network layer connections solve dos
play

Do Network-layer Connections Solve DoS ? Katerina Argyraki David - PowerPoint PPT Presentation

Do Network-layer Connections Solve DoS ? Katerina Argyraki David R. Cheriton Datagrams vs. Connections Datagrams vs. Connections Connection-less network layer flexibility, simplicity best-effort service Datagrams vs. Connections


  1. Do Network-layer Connections Solve DoS ? Katerina Argyraki David R. Cheriton

  2. Datagrams vs. Connections

  3. Datagrams vs. Connections ● Connection-less network layer – flexibility, simplicity – best-effort service

  4. Datagrams vs. Connections ● Connection-less network layer – flexibility, simplicity – best-effort service ● Connection-oriented network layer – end-to-end guarantees – more mechanism in routers, connection setup

  5. Bandwidth Flooding Attacks

  6. Bandwidth Flooding Attacks G srv G

  7. Bandwidth Flooding Attacks B srv B ● Victim's link flooded with malicious traffic

  8. Bandwidth Flooding Attacks B srv B ● Victim's link flooded with malicious traffic ● Legitimate TCP clients back off

  9. Datagrams vs. Connections

  10. Datagrams vs. Connections ● Datagram approach – allow all, explicitly deny bad traffic – use filtering to block bad traffic

  11. Datagrams vs. Connections ● Datagram approach – allow all, explicitly deny bad traffic – use filtering to block bad traffic ● Connection-oriented (capability) approach – deny (or limit) all, explicitly allow good traffic – use network-layer connections to shield good traffic

  12. What about Connection Setup?

  13. What about Connection Setup? ● Must protect connection setup against DoS

  14. What about Connection Setup? ● Must protect connection setup against DoS ● Necessarily datagram traffic

  15. What about Connection Setup? ● Must protect connection setup against DoS ● Necessarily datagram traffic ● Need datagram DoS solution

  16. What about Connection Setup? ● Must protect connection setup against DoS ● Necessarily datagram traffic ● Need datagram DoS solution ● Can use to protect all datagrams

  17. What about Connection Setup? ● Must protect connection setup against DoS ● Necessarily datagram traffic ● Need datagram DoS solution ● Can use to protect all datagrams Once datagram DoS solution is deployed, connections become unnecessary

  18. The Datagram Approach B srv B

  19. The Datagram Approach B srv B ● Explicitly filter traffic from bad sources

  20. The Datagram Approach B srv B ● Explicitly filter traffic from bad sources ● Securely move filtering state close to sources – Active Internet Traffic Filtering (USENIX '05)

  21. Capabilities: Stateless Connections cli srv

  22. Capabilities: Stateless Connections marking/verification nodes cli srv

  23. Capabilities: Stateless Connections capability request cli srv

  24. Capabilities: Stateless Connections capability request cli srv capability

  25. Capabilities: Stateless Connections capability request cli srv capability ● Ticket to send n bytes within t seconds

  26. Capabilities: Stateless Connections capability request cli srv capability ● Ticket to send n bytes within t seconds ● No filtering state, no special inter-ISP relationships

  27. Capabilities: Stateless Connections capability request cli srv capability ● Ticket to send n bytes within t seconds ● No filtering state, no special inter-ISP relationships Elegant and easy to deploy

  28. DoS with Capability Requests capability requests B srv capability requests B ● Can flood victim with capability requests

  29. DoS with Capability Requests capability requests B srv capability requests B ● Can flood victim with capability requests

  30. DoS with Capability Requests capability requests B srv capability requests B ● Can flood victim with capability requests ● New client has trouble connecting to site

  31. DoS with Capability Requests capability requests B srv capability requests B ● Can flood victim with capability requests ● New client has trouble connecting to site Denial of Capability

  32. Setup vs. General Traffic

  33. Setup vs. General Traffic ● Are setup requests easier to protect ? – more resistant to loss – more predictable

  34. Setup vs. General Traffic ● Are setup requests easier to protect ? – more resistant to loss – more predictable ● Our position: Setup traffic is not different – with respect to vulnerability to DoS – and means required to protect it

  35. Is Connection Setup Resistant to Loss ?

  36. Is Connection Setup Resistant to Loss ? ● Assume victim knows good clients

  37. Is Connection Setup Resistant to Loss ? ● Assume victim knows good clients ● A single setup request must get through

  38. Is Connection Setup Resistant to Loss ? ● Assume victim knows good clients ● A single setup request must get through ● Can retransmit setup request until connected

  39. Is Connection Setup Resistant to Loss ? ● Assume victim knows good clients ● A single setup request must get through ● Can retransmit setup request until connected ● Probability of failure decreases exponentially

  40. Is Connection Setup Resistant to Loss ? 2.5 Gbps attack traffic B srv 100 Mbps B

  41. Is Connection Setup Resistant to Loss ? 2.5 Gbps attack traffic B srv 100 Mbps B ● Good client retransmits every second

  42. Is Connection Setup Resistant to Loss ? 2.5 Gbps attack traffic B srv 100 Mbps B ● Good client retransmits every second ● Expected time to connection is over 8 minutes

  43. Is Connection Setup Resistant to Loss ? 2.5 Gbps attack traffic B srv 100 Mbps B ● Good client retransmits every second ● Expected time to connection is over 8 minutes Response time suffers

  44. Is Setup Traffic Policeable ?

  45. Is Setup Traffic Policeable ? ● Attack sources send more than good sources

  46. Is Setup Traffic Policeable ? ● Attack sources send more than good sources ● Fair-queue setup requests

  47. Is Setup Traffic Policeable ? ● Attack sources send more than good sources ● Fair-queue setup requests ● Each source gets same share of receiver's bwdth

  48. Is Setup Traffic Policeable ? G srv B ● Fair-queuing per incoming interface

  49. Is Setup Traffic Policeable ? B srv B ● Fair-queuing per incoming interface ● Ineffective during highly distributed attacks

  50. Is Setup Traffic Policeable ? B srv B ● Fair-queuing per source

  51. Is Setup Traffic Policeable ? B srv B ● Fair-queuing per source ● Similar state with per-source filtering

  52. Is Setup Traffic Policeable ? B srv B ● Fair-queuing per source ● Similar state with per-source filtering At the cost of simplicity and deployability

  53. The Datagram Approach B srv B ● Explicitly filter setup requests from bad sources

  54. The Datagram Approach B srv B ● Explicitly filter setup requests from bad sources ● Explicitly filter all traffic from bad sources

  55. The Datagram Approach B srv B ● Explicitly filter setup requests from bad sources ● Explicitly filter all traffic from bad sources Connections become unnecessary

  56. Capabilities as an Optimization

  57. Capabilities as an Optimization B srv B ● At least connected clients are unaffected by attack

  58. Unless there Are Lots of Bad Guys

  59. Unless there Are Lots of Bad Guys ● Undetected bad sources acquire capabilities

  60. Unless there Are Lots of Bad Guys ● Undetected bad sources acquire capabilities ● Victim must decide how to split bandwidth

  61. Unless there Are Lots of Bad Guys ● Undetected bad sources acquire capabilities ● Victim must decide how to split bandwidth ● Randomly chooses which capabilities to renew

  62. Unless there Are Lots of Bad Guys ● Undetected bad sources acquire capabilities ● Victim must decide how to split bandwidth ● Randomly chooses which capabilities to renew ● Good clients lose to bad sources

  63. Unless there Are Lots of Bad Guys ● Undetected bad sources acquire capabilities ● Victim must decide how to split bandwidth ● Randomly chooses which capabilities to renew ● Good clients lose to bad sources Undetected bad sources can always harm good traffic

  64. Capabilities = Reservations

  65. Capabilities = Reservations ● Sender reserves receiver's bandwidth

  66. Capabilities = Reservations ● Sender reserves receiver's bandwidth ● Challenge: make the “right” reservation

  67. Capabilities = Reservations ● Sender reserves receiver's bandwidth ● Challenge: make the “right” reservation ● Large botnets: each attack source sends low rate

  68. Capabilities = Reservations ● Sender reserves receiver's bandwidth ● Challenge: make the “right” reservation ● Large botnets: each attack source sends low rate ● Less relevant to restrict per-sender bandwidth

  69. Capabilities = Reservations ● Sender reserves receiver's bandwidth ● Challenge: make the “right” reservation ● Large botnets: each attack source sends low rate ● Less relevant to restrict per-sender bandwidth ● More relevant to monitor traffic patterns

  70. Conclusions ● Connections can protect good traffic against DoS ● Connection-setup relies on datagrams – must protect datagrams against DoS ● Connections become unnecessary

  71. Conclusions ● Connections can protect good traffic against DoS ● Connection-setup relies on datagrams – must protect datagrams against DoS ● Connections become unnecessary ● Capabilities may be useful optimization – must compute the “right” capability for each source

Recommend


More recommend