200 likes | 208 Views
This article explores network trust issues related to TCP congestion control, IP source spoofing, wireless transmission, and denial of service attacks. It discusses TCP-SYN, name servers, DDoS (DNS), and DNS amplification attacks. The content is in English.
E N D
Network Trust Issues • TCP Congestion control • IP Src Spoofing • Wireless transmission • Denial of Service Attacks • TCP-SYN • Name Servers • DDoS (DNS) • DNS Amplification attack
The Gullible Network • A lot of network protocols assume people are well intentioned • TCP: Congestion Control • Wireless: Transmit power • BGP Route-advertisements
x A B y D E Cheating TCP D Increases by 1 Increases by 5 A Increases by 1 Increases by 5 (x, y) • Too aggressive • Losses • Throughput falls Individual incentives: cheating pays Social incentives: better off without cheating Classic Prisoner Dilemma: resolution depends on accountability
Cheating Wireless B A C 10X Power Normal power 10X Power Normal power Individual incentives: cheating pays Social incentives: better off without cheating Classic Prisoner Dilemma: resolution depends on accountability
Origin: IP Address Ownership and Hijacking • Who can advertise a prefix with BGP? • By the AS who owns the prefix • … or, by its upstream provider(s) in its behalf • Implicit trust between upstream & downstream providers • However, what’s to stop someone else? • Prefix hijacking: another AS originates the prefix • BGP does not verify that the AS is authorized
4 3 5 2 6 7 1 Prefix Hijacking: full or partial control • Consequences for the affected ASes • Blackhole: data traffic is discarded • Snooping: data traffic is inspected, and then redirected • Impersonation: data traffic is sent to bogus destinations 12.34.0.0/16 12.34.0.0/16
Denial of Service Attack • Prevent other people from using a service: • A server • A link in a network • High level idea • Sent a lot of packets and ensure 100% utilization • No one else can use it.
DNS: Denial Of Service • Flood DNS servers with requests until they fail • What was the effect? • … users may not even notice • Caching is almost everywhere • More targeted attacks can be effective • Local DNS server cannot access DNS • Authoritative server cannot access domain
TCP: Denial Of Service (SYN Flood) • Send a bunch of SYN Packets to a server • Server allocates buffer and TCP sockets • You allocate nothing • Eventually the server runs out of space. • How to solve this problem?
SYN SYN/ACK Recall: TCP Handshake • No allocations • No resource committed A Server • Server allocates: • Allocates data structures • E.g buffer space
TCP: Denial Of Service (SYN Flood) • Send a bunch of SYN Packets to a server • Server allocates buffer and TCP sockets • Server responds with ‘SYN/ACK’ • You allocate nothing • Eventually Server runs out of space. • How to solve this problem? • SYN Cookies: server stores nothing and instead responds with a special cookie • If cookie is returned in subsequent packet, then server allocates space • Assumption: If you come back then you aren’t a bad person
Problems with DoS • One person attacks one server/link • Easy to figure out who …. • Easy to block …. • Takes a while for the attack to work…..
Distributed Denial of Service Attack • Take over a number of machines • Use a BotNet • Use all machines to conduct a DoS on a server • Much more effective than regular DoS • Harder to stop and shutdown
DNS QuerySrcIP: DoS Target (60 bytes) EDNS Reponse (3000 bytes) DNS Amplification Attack DNS Amplification attack: ( 40 amplification ) DNSServer DoSSource DoSTarget 580,000 open resolvers on Internet (Kaminsky-Shiffman’06)
Solutions ip spoofed packets open amplifier attacker replies prevent ip spoofing disable open amplifiers victim
DDOS BotNet DNS Requests Name Server DNS Responses victim