Subnet Flooding Detection and DDoS Defenses Angela Cearns

22
Subnet Flooding Detection and DDoS Defenses Angela Cearns Lan Nguyen Mounika Namburu 1

description

Subnet Flooding Detection and DDoS Defenses Angela Cearns. Lan Nguyen Mounika Namburu. Overview. DDoS Defense Research A2D2 Design Subnet Flooding Detection using Snort Class -Based Queuing Multi-level Rate Limiting A2D2 Implementation Test-bed - PowerPoint PPT Presentation

Transcript of Subnet Flooding Detection and DDoS Defenses Angela Cearns

Page 1: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

1

Subnet Flooding Detection and DDoS Defenses

Angela Cearns

Lan NguyenMounika Namburu

Page 2: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

2

DDoS Defense Research A2D2 Design

◦ Subnet Flooding Detection using Snort◦ Class -Based Queuing ◦ Multi-level Rate Limiting

A2D2 Implementation Test-bed A2D2 Test-bed Performance Results Future Works Conclusion

Overview

Page 3: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

3

DDoS Defense Research3 main research areas: Intrusion Prevention

• General security policy• Ingress & Egress filtering

Intrusion Detection• Anomaly Detection• Misuse Detection

Intrusion Response• Source Identification

Intrusion Tolerance◦ Fault Tolerance◦ Quality of Service (QoS)

Intrusion Tolerant QoS Techniques Rate Limiting Class-Based Queuing

(CBQ) Intrusion Tolerant QoS

Systems XenoService Pushback Mechanisms Cooperative Intrusion

Traceback and Response Architecture (CITRA)

Page 4: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

4

Intrusion Tolerance Techniques◦ Not autonomous◦ Time-consuming◦ Require knowledgeable staff

Intrusion Tolerance Systems◦ Expensive◦ Worldwide agreements◦ Extensive Collaboration

Intrusion ToleranceResearch Limitations

Page 5: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

5

Autonomous Anti-DDoS Network (A2D2)◦ A2D2 Target Audience

Home network, small to medium sized networks◦ Design Principles

Affordable Manageable Configurable Portable

◦ Design of A2D2 is divided into 3 main areas:1. Intrusion Detection – Snort (slides 6-10)2. Intrusion Response (slides 11-13) 3. Autonomy System (slide 14)

A2D2 Design

Research-Oriented

Page 6: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

6

Snort is the only free, open source lightweight IDS and is selected to be the detection component of A2D2

Snort can be operated in 3 modes:• a straight packet sniffer similar to tcpdump• a packet logger• a full-blown network intrusion detection system

As an IDS, Snort performs real-time protocol analysis, content searching and matching, and real-time alert

A2D2 IDS Snort Overview

IDS

Detection Engine(Rule Based)

Preprocessor(Perform logic)

Attack detection is mainly based on a signature recognition detection engine as well as a modular plugin architecture for more sophisticated behavior analysis.

Page 7: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

7

Flood threshold Flood preprocessor Initiation Flood preprocessor Data structure Subnet flood detection Flood preprocessor logic flow

A2D2 Snort Flood Preprocessor

Page 8: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

8

Subnet Flood Detection DDoS attack agent sends

attack packets with an array of randomly generated source addresses, all of them within the subnet of the attack agent

Each spoofed address is used in a limited number of packets to reduce suspicion

Page 9: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

9

A2D2 is designed to detect 3 types of generic flooding:• Individual attack host against individual victim host• Subnet attack agents against individual victim host• Subnet attack agents against victim subnet hosts

A2D2 assumes a /24 subnet flood detection A2D2 also assumes many networks implement ingress and

egress filtering

Subnet Flood Detection (cont.)

Page 10: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

10

Additional Features

◦FloodIgnoreHosts Preprocessor

◦FloodRateLimiter Preprocessor

A2D2 IDS Snort Flood Preprocessor

Page 11: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

11

Intrusion Response◦ Security policy◦ Class Based Queuing◦ Multi-level Rate Limiting

A2D2 Design (cont.)

Page 12: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

12

CBQ supports a maximum of 8 separate queues, or classes

Class-Based Queuing

70% HTTP / HTTPS

20% SMTP / POP3

5% NNTP

5% ICMP / TCP-SYN

Page 13: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

13

Multi-Level Rate-Limiting

Page 14: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

14

Autonomy System◦ Rate Limiting Configuration & Expiration: config file (defines basic

parameters based on which Rate Limiting can be automatically applied)

◦ Snort Customization – FloodRateLimiter Preprocessor (Keeps track of incoming packet rate from a “presumed” attack source. If arrival

rate continues to reach the max allowable rate, send message to firewall , apply stricter rate limiting until block level is reached)

◦ Alert Interface (Snort sends alert messages to UNIX socket. Alert message is parsed for attack host’s source IP address which Multi-level Rate Limiting is then applied to)

A2D2 Design (cont.)

Page 15: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

15

Attack

Attack Attack

Private Subnet192.168.0

Attack Network128.198.61

IP: 128.198.61.12NM: 255.255.255.128

GW: 128.198.61.1

eth0

Pluto

Titan

DMZ

Multi-LevelRate Limiting

Class-BasedQueuing(CBQ)

as Linux Router

Firewall(iptables)

Security Policy

IP: 192.168.0.1NM: 255.255.0.0

GW: 128.198.61.12

eth1

RealServer

Rea

lSer

ver

Tra

ffic

IDS

Ale

rts

tr

igge

r M

ulti-

Leve

lR

ate-

Lim

iting

IDS

70

% H

TT

P,

Re

alP

laye

r

1

5%

SM

TP

, PO

P3

10

% S

SH

, S

FT

P

5%

SY

N,

ICM

P,

DN

S

10 Mbps Hub

eth0

IP: 192.168.0.2NM: 255.255.0.0GW: 192.168.0.1Public Network

128.198

Internet

Alpha128.198.61.15

DDoSAgent

Gamma128.198.61.17

DDoSAgent

Beta128.198.61.16

DDoSAgent

Delta128.198.61.18

DDoSAgent

SimulatedInternet

100Mpbs Switch

Master Client& Handler

DDoS

Saturn128.198.61.11

NM: 255.255.255.128GW: 128.198.61.1

Autonomous Anti-DDoS Network(A2D2)

Client1128.198.a.195

Real Player Client

Client2128.198.b.82

Real Player Client

Client3128.198.c.31

Real Player Client

100Mpbs Switch

A2D2 Implementation Test-bed

Page 16: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

16

Attack Tool StacheldrahtV4

• stable, sophisticated, & able to launch attacks in ICMP, UDP and TCP protocols

• can be downloaded from internet for free Client Bandwidth Measurement Tools

plot.pl--->written and installed in Linux clients to capture bandwidth usage information

Drawing Tool--->gnuplot version 3.7.1

A2D2 Implementation Tools

Page 17: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

17

A2D2 Test Results

Baseline Short 1-minute attack with no mitigation strategy

Non-stop attack with no mitigation strategy Non-stop UDP attack with security policy

Page 18: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

18

A2D2 Test Results(cont.)

Non-stop ICMP attack with security policy Non-stop ICMP attack with security policy & CBQ

Non-stop TCP-SYN attack with security policy & CBQ

Non-stop TCP-SYN attack with security policy, CBQ, & autonomous multi-level rate-limiting

Page 19: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

19

TCP – SYN Attack Firewall Processing Speed Alternate Routing Scalability Anomaly Detection Fault Tolerant

Future Works

Page 20: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

20

Intrusion Tolerance A2D2 effectively combines firewall policy, CBQ,

multi-level rate-limiting and DDoS flood detection in an autonomous architecture

A2D2 Clients Enjoy QoS during Various Types of Attack

Conclusion

Page 21: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

21

http://www.cs.uccs.edu/~gsc/pub/master/acearns/doc http://www.cs.uccs.edu/~gsc/pub/master/acearns/src David Moore, Geoffrey M. Voelker and Stefan Savage.

Inferring Internet Denial-of-Service Activity. 2001 http://www.cs.ucsd.edu/~savage/papers/UsenixSec01.pdf.

ITWorld.com. CERT hit by DDoS attack for a third day. May 24, 2001. http://www.itworld.com/Sec/3834/IDG010524CERT2/

Steve Bellovin, Marcus Leech, and Tom Taylor. ICMP Traceback Messages. Internet Draft: draft-ieft-itrace-01.txt. Expires April 2002

References

Page 22: Subnet Flooding Detection  and  DDoS  Defenses                                Angela  Cearns

22

Questions?