280 likes | 439 Views
MCA 2: Multi Core Architecture for Mitigating Complexity Attacks . Yaron Koral (TAU) Joint work with: Yehuda Afek (TAU), Anat Bremler-Barr (IDC), David Hay (HUJI) and Yotam Harchol (HUJI). A multicore system architecture, which is robust against complexity DDoS attacks.
E N D
MCA2: Multi Core Architecture for Mitigating Complexity Attacks Yaron Koral (TAU) Joint work with: YehudaAfek (TAU), Anat Bremler-Barr (IDC), David Hay (HUJI) and Yotam Harchol (HUJI)
A multicore system architecture, which is robust against complexity DDoS attacks
Network Intrusion Detection System • Reports or drops malicious packets • Important technique: Deep Packet Inspection (DPI) Internet IP packet
Complexity DoS Attack Over NIDS • Find a gap between average case and worst case • One may craft an input that exploits this gap • Launch a Denial of Service attack on the system Real-Life Traffic Internet Throughput
Attack on Security Elements Combined Attack:DDoS on Security Element exposed the network – theft of customers’ information
Attack on Snort • The most widely deployed IDS/IPS worldwide. Heavy Packet Traffic Max Throughput Routine Traffic
Airline Desk Example A flight ticket
Airline Desk Example Overweight!!! An isle seat near window!! Can’t find passport!! 20 min. 1 min. Three carry handbags!!! Doesn’t like food!!!
Airline Desk Example Special training Domain Properties Heavy & Light customers. Easy detection of heavy customers. Moving customers between queues is cheap. Heavy customers have special more efficient processing method. Domain Properties Heavy & Light packets. Easy detection of heavy packets Moving packets between queues is cheap. Heavy packets have special more efficient processing method. 4 min. 1 min.
Some packets are much “heavier” than others The Snort-attack experiment
Snort uses Aho-Corasick DFA • DPI mechanism is a main bottleneck in Snort • Allows single step for each input symbol • Holds transition for each alphabet symbol Fast & Huge Heavy Packet Best for normal traffic Exposed to cache-miss attack
Snort-Attack Experiment Normal Traffic Attack Scenario Cache Main Memory Cache-miss!!! Heavy Packet Traffic Max Throughput Routine Traffic Does not require many packets!!!
The General Case: Complexity Attacks Domain Properties Heavy & Light packets. Easy detection of heavy packets Moving packets between queues is cheap. Heavy packets have special more efficient processing method. • Building the packet is much cheaper than processing it.
How Do We Detect? • Normal and heavy packets differ from each other • May be classified quickly • Claim: the general case in complexity attacks!!! threshold
Domain Properties Heavy & Light packets. Easy detection of heavy packets Moving packets between queues is cheap. Heavy packets have special more efficient processing method.
System Architecture Detects heavy packets NIC Core #1 Q Core #2 Q Processor Chip Core #8 Q Dedicated Core #9 B • Routine and alert mode • Drop mode • Dynamic thread allocation model • Non blocking queue synchronization • Move packets between cores with • negligible overhead! Q Dedicated Core #10 Q B
Domain Properties Heavy & Light packets. Easy detection of heavy packets Moving packets between queues is cheap. Heavy packets have special more efficient processing method.
Domain Properties Heavy & Light packets. Easy detection of heavy packets Moving packets between queues is cheap. Heavy packets have special more efficient processing method.
Concluding Remarks • A multi-core system architecture, which is robust against complexity DDoS attacks • In this talk we focused on specific NIDS and complexity attack • Additional results show how the system fits to other cases: • Hybrid-FA • Bro Lazy-FA • We believe this approach can be generalized (outside the scope of NIDS).