180 likes | 289 Views
Design and Operational Characteristics of a Distributed Cooperative Infrastructure against DDoS Attacks. Georgios Koutepas, Fotis Stamatelopoulos, Vasilios Hatziyannakis, and Basil Maglaris National Technical University of Athens, Greece ECIW 2003 July 1, 2003. What is " Denial of Service "?.
E N D
Design and Operational Characteristics of a Distributed Cooperative Infrastructureagainst DDoS Attacks Georgios Koutepas, Fotis Stamatelopoulos, Vasilios Hatziyannakis, and Basil Maglaris National Technical University of Athens, Greece ECIW 2003 July 1, 2003
What is "Denial of Service"? • An attack to suspend the availability of a service • Until recently the "bad guys" tried to enter our systems. Now it’s: "If not us, then Nobody" • No break-in attempts, no information stealing, although they can be combined with other attacks to confuse Intrusion Detection Systems. • DoS: single correctly made malicious packets against the target machine • Distributed DoS: traffic flows from various sources to exhaust network or computing resources • No easy solutions! DoS is still mostly a research issue A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
Main Characteristics of DoS • Variable targets: • Single hosts or whole domains • Computer systems or networks • Important: Active network components (e.g. routers) also vulnerable and possible targets! • Variable uses & effects: • Hacker "turf" wars • High profile commercial targets (or just competitors…). • Useful in cyber-warfare, terrorism etc. • February 7-11 2000: Big commercial sites (CNN, Yahoo, E-Bay) are taken down by flooding of their networks. • October 2002: attack against the Root DNS servers A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
Pirated machines Domain A 2. Commanding the attack 1. Taking Control "zombies" Pirated machines Domain B Distributed DoS Target domain Attacker X A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
A DDoS Attack Domain-wise Sources of the attack Attack Transit Domains Innocent Domains, but their connectivity is affected Target Domain A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
Reaction to DDoS • Incoming traffic has to be controlled, outside the victim’s domain, at the upstream providers • Usually source IPs spoofed on attack packets • The malicious flows have to be determined. • The attack characteristics have to be communicated upstream. This usually is done manually and is an uncertain and time-consuming procedure. • Filters that will block attack traffic must be set up and maintained. Their effectiveness must be verified. • The bandwidth penalty is still present throughout all the affected networks. Actions are required on all the networks along the attack path A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
Our Solution: An Inter-Domain Cooperative Infrastructure
Inter-Domain Cooperative Framework Cooperative Counter-DDoS Entity Activation of filters and reaction according to local Policies Participating Domain Non-participating Domain Notification Propagation (Multicast) The Cooperative Counter-DDoS Entities constitute an Overlay Network A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
The Entities • The Entities compose the infrastructure • They are the trusted points for the domain to participate in the Infrastracture • They manage all communications and reaction within the domain • They are on the top of the local IDS hierarchy, thus combine the local picture with the one from peers • They are controlled locally according to the choices and policies of the administrator • Communications by multicast methods • They can implement reaction filters to routers, BUT: • Their duration is controlled, the admin is aware of them and it’s possible to adjust to shifting attack patterns A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
Main Design Characteristics: Entity Implementation • Lightweight and Modular software architecture, different components performing the various tasks • Java Management Extensions (JMX) framework for control and configuration • Using the Intrusion Detection Message Exchange Format (IDMEF) in all messages achieves compatibility with standards and inter-operability with installed IDS infrastructure • Multicast advantages: • Stealthy presence • Independence from specific installation host • Possible parallel operation of backup Entities A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
Entity State Transition A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
Internal Entity Architecture A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
! What happens during an Attack Message DB of the Entity at domain B W X Y A Path Cases for domain B Z B C E D A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
Policy Entries • Match Event Characteristics with actions taken against the attack • Attack type • Attack destination (target domain) • Path positioning case • Custom made actions to match the specific attack • Reaction for a certain time A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
Additional Concepts • Security • The messages are encrypted against eavesdropping BUT by symmetric cryptography • Additionally there are timestamps and digital signatures on the messages to avoid repetition attacks • It is possible to create “communities” of Entities by multicast and distribute the notifications only within. • Geographically (by the TTL on the packets) • According to common interests etc. (by different multicast groups) A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
Current Status • Finished prototype • Putting a WAN emulation facility (Dummynet) between the Entities for testing behavior during attacks • Test the accuracy in setting up the right filters, at the right points • Determine the effects on non-attack traffic, thus choose the right configuration parameters, duration of filters • Testing the effectiveness of a peer-2-peer communications scheme in addition to multicast • Developing the Hot-Spare concepts • Introducing the usage of advanced inference algorithms and/or expert systems • Plans to deploy it in the Greek Academic Network A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003
Conclusions • It's not an IDS, but rather a “message management system” independent of the underlying detection technologies • Distributed framework that uses a Cooperative Inter-Domain approach • Trusted partners, each deploying a local software Entity • Entities exchange security information so that positioning in the attack path is detected locally and without requiring traceback procedures • Reaction is activated in parallel, controlled at each domain by local policies A Distributed Cooperative Infrastructure against DDoS Attacks – ECIW 2003