270 likes | 288 Views
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. Yan Gao , Zhichun Li, Yan Chen. Lab for Internet and Security Technology (LIST) Northwestern University. Outline. Motivation Background on sketches Design of the HiFIND system Evaluation Conclusion.
E N D
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks Yan Gao, Zhichun Li, Yan Chen Lab for Internet and Security Technology (LIST) Northwestern University
Outline • Motivation • Background on sketches • Design of the HiFIND system • Evaluation • Conclusion
Existing Network IDSes Insufficient • Signature based IDS cannot recognize unknown or polymorphic intrusions • Statistical IDSes for rescue, but • Flow-level detection: unscalable • Vulnerable to DoS attacks e.g. TRW [IEEE SSP 04], TRW-AC [ USENIX Security Symposium 04], Superspreader [NDSS 05] for port scan detection • Overall traffic based detection: inaccurate, high false positives e.g. Change Point Monitoring for flooding attack detection [IEEE Trans. on DSC 04] • Key features missing • Distinguish SYN flooding and various port scans for effective mitigation • Aggregated detection over multiple vantage points
Our Solution: HiFIND System Goal: accurate High-speed Flow-level INtrusion Detection (HiFIND) system • Leverage our data streaming techniques: reversible sketches • Select an optimal small set of metrics from TCP/IP headers for monitoring and detection • Design efficient two-dimensional sketches to distinguish different types of attacks • Aggregate compact sketches from multiple routers for distributed detection
HiFIND system HiFIND system Internet scan port Internet LAN Internet LAN HiFIND system LAN Switch Switch Splitter Switch Splitter Router Router Switch Switch Router scan port LAN LAN Switch LAN (a) HiFIND system (b) (c) Deployment of HiFIND • Attached to a router/switch as a black box • Edge network detection particularly powerful Monitor each port separately Monitor aggregated traffic from all ports Original configuration
Outline • Motivation • Background on sketches • Design of the HiFIND system • Evaluation • Conclusion
h1(k) … 0 1 K-1 1 … hj(k) j + = hH(k) … a b H k-ary sketch The first to monitor and detect flow-level heavy changes in massive data streams at network traffic speeds [IMC 03] Update (k, v): Tj [ hj(k)] += v (for all j) Estimate v(S, k): sum of updates for key k S=Combine(a,S1,b,S2):
Reversible Sketch • Report keys with heavy changes • Significantly improve its usage [IMC 2004, INFOCOM 2006, ACM/IEEE ToN to appear] • Efficient data recording For the worst case traffic, all 40-byte packet streams • Software: 526Mbps on a P4 3.2Ghz PC • Hardware: 16 Gbps on a single FPGA broad INFERENCE(S,t) ? ?
Outline • Motivation • Background on sketches • Design of the HiFIND system • Architecture • Sketch-based intrusion detection • Intrusion classification with 2D sketches • Feature analysis • Evaluation • Conclusion
Architecture of the HiFIND system • Threat model • TCP SYN flooding (DoS attack) • Port scan • Horizontal scan • Vertical scan • Block scan • Forecast methods • EWMA • Holt-Winter Forecasting Algorithm
Sketch-based Detection Algorithm • RS({DIP, Dport}, #SYN - #SYN/ACK) • Detect SYN flooding attacks • RS({SIP, DIP}, #SYN - #SYN/ACK) • Detect any intruder trying to attack a particular IP address • RS({SIP, Dport}, #SYN - #SYN/ACK) • Detect any source IP which causes a large number of uncompleted connections to a particular destination port
Intrusion Classification • Major challenge • Can not completely differentiate different types of attacks • E.g., if destination port distribution unknown, it is hard to distinguish non-Spoofing SYN flooding attacks from vertical scans by RS({SIP, DIP}, #SYN - #SYN/ACK) • Bi-modal distribution SYN floodings SYN floodings Vertical scans Vertical scans
Two-dimensional (2D) Sketch For example: differentiate vertical scan from SYN flooding attack • The two-dimensional k-ary sketches • An example of UPDATE operation • Accuracy analysis Examples: 5 hash tables, 3.2MB memory consumption • Vertical scan detected at least 99.56% • SYN attack classified correctly at least 99.99%
DoS Resilience Analysis HiFIND system is resilient to various DoS attacks as follows • Send source spoofed SYN packets to a fixed destination • Detected as SYN flooding attack • Send source spoofed packet to random destinations • Evenly distributed in the buckets of each hash table, no false positives • Reverse-engineer the hash functions to create collisions • Difficult to reverse engineering of hash functions • Unknown hash output of each hash function • Multiple hash tables and different hash functions • Even know the hash functions of sketches • Very hard to find collisions through exhaustive search • E.g. given 6 hash functions, the probability of a collision of two random keys in 5 hash functions is 5.2×10-18
Distributed Intrusion Detection SYN/ACK2 SYN2 SYN1 SYN/ACK1 • Naive solution: Transport all the packet traces or connection states to the central site • HiFIND: Summarize the traffic with compact sketches at each edge router, and deliver them to the central site
Outline • Motivation • Background on sketches • Design of the HiFIND system • Evaluation • Conclusion
Evaluation Methodology • Router traffic traces • Lawrence Berkeley National Laboratory • One-day trace with ~900M netflow records • Northwestern University • One day experiment in May 2005 with 239M netflow records, 1.8TB traffic and 1:1 packet samples • Evaluation metrics • Detection accuracy • Online performance: • Speed • Memory consumption • Memory access per packet
Detection Validation • SYN flooding • Backscatter [USENIX Security Symposium 2001] • Hscans and Vscans • The knowledge of port number e.g. 5 major scenarios of the top 10 Hscans e.g. 5 major scenarios of the bottom 10 Hscans
Online performance evaluation • Small memory access per packet • 16 memory accesses per packet with parallel recording • Small memory consumption • Recording speed • Worst case: recording 239M items in 20.6 seconds i.e., 11M insertions/sec • Detection speed • Detection on 1430 minute intervals • Average detection time: 0.34 seconds • Maximum detection time: 12.91 seconds • Stress experiments in each hour interval • Detecting top 100 anomalies with average 35.61 seconds and maximum 46.90 seconds
Conclusion Proposed the first online DoS resilient flow-level IDS for high-speed networks • Scalable to high–speed networks • Highly accurate • DoS attack resilient • Distinguish SYN flooding and various port scans • Aggregate detection over multiple vantage points
Thank You ! Questions? For more info: http://list.cs.northwestern.edu
h1(k) … 0 1 K-1 Estimate v(S, k): sum of updates for key k 1 … hj(k) j + = hH(k) … a b H K-ary Sketch Online data recording & estimation [IMC 2003] Update (k, u): Tj [ hj(k)] += u (for all j) S=COMBINE(a,S1,b,S2):
Two-dimensional (2D) Sketch • Accuracy analysis • Given a key k of a vertical scan, the majority of the H hash matrices will classify k as a vertical scan attack with probability at least , where . ( ) • Given a key k of a SYN flooding, the majority of the H hash matrices will classify k as a SYN flooding attack with probability at least , where .
Related work • Threshold Random Walk (TRW) for port scan detection [J. Jung et al. 2004] • Not DoS resilient • TRW with approximate caches (TRW-AC) [N. Weaver et al. 2004] • High false negatives under DoS attack • Change Point Monitoring (CPM) [H. Wang et al. 2002] • Detecting port scans as SYN floodings • Backscatter [D. Moore et al. 2001] • Only targeting randomly spoofed DoS attacks • Superspreader [S. Venkataraman et al. 2005] • High false positives with P2P traffic • Partial Completion Filters (PCF) [R. Kompella et al. 2004] • Not reversible