1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft...

40
1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research

description

3 Understanding (D)DoS Basic structure: the attacker tries to get the target to use up resources (memory, CPU, bandwidth, etc.) dealing with DoS traffic –Succeeds when the target’s remaining resources are insufficient to handle everyone else’s traffic The target’s only strategies are: –Increasing resources enough to handle it all –Distinguishing DoS traffic, and reducing the resources expended on it E.g., identify sources of DoS traffic, and block them

Transcript of 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft...

Page 1: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

1

Blocking DDoS Attacks with AS-Based Accountability

Dan Simon Sharad Agarwal Dave Maltz

Microsoft Research

Page 2: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

2

Outline

• The Problem of DoS• Internet Accountability• Achieving accountability among a club of

members with pair-wise trust• Dealing with the world outside the club• Determining if a member of the club has gone

bad• Economics of Dos and Accountability

Page 3: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

3

Understanding (D)DoS• Basic structure: the attacker tries to get the

target to use up resources (memory, CPU, bandwidth, etc.) dealing with DoS traffic– Succeeds when the target’s remaining

resources are insufficient to handle everyone else’s traffic

• The target’s only strategies are:– Increasing resources enough to handle it all– Distinguishing DoS traffic, and reducing the

resources expended on it• E.g., identify sources of DoS traffic, and block

them

Page 4: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

4

DoS and the Internet

AS3

AS2

AS1

Company running a website

webserveraccess link

You are here

Your customers are here

Some of them want to hurt you

Page 5: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

5

Levels of DoS

Can hit the application layer or the network layer• App-layer DoS attack and defense are highly

application-dependent– The attacker can exploit bugs or costly high-

level operations – The defender can try to spot subtle

distinguishing cues in application-level traffic

AS3

AS2

AS1network stack

application (webserver)

‘bot detector

Page 6: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

6

Levels of DoS

Network-layer DoS can attack any application• Website serving a peak load of 100,000

hits/second, @5KBytes/hit, needs a 4Gbps access link ($25-$50K/month) ….

• ….Which is completely saturated by 4,000 1Mbps broadband clients (about $400/week on the ‘botnet market)

AS3

AS2

AS1network stack

application (webserver)

‘bot detector

Page 7: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

7

Levels of DoS

Observations:• If new attackers appear faster than they can be classified,

then all is lost (IP spoofing/DHCP exacerbates)• Need to shed all load from attacker once identified• ASes have long-lived relationships with each other• ASes generally have non-transient relationships with their

customers (e.g., billing information)

AS3

AS2

AS1network stack

application (webserver)

‘bot detector

Page 8: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

8

Approaches to DoS on One Slide• Ingress filtering

– Worthless until deployed everywhere, hence undeployable

• Pushback filtering– Requires PKI to authenticate requests– Requires router hardware changes– Reflection attacks render pushback useless

• Capabilities– Capability server vulnerable to DoS– Requires changing router HW and host SW

• Our solution: Leverage AS relationships for incrementally-deployable ingress filtering and pushback without router changes or a PKI

Page 9: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

9

Sidebar: Isn’t End-Host Security the “Real” Problem?

• True, compromised end hosts (“botnets”) are a major source of unwanted traffic

• But….suppose end hosts were bullet-proof– E.g., you could run “SETI@home” completely

safely• Introducing “DDoS@home”....

– Does something nice for the user (use your imagination)

– Borrows spare cycles and bandwidth in return, with which to launch DDoS attacks

– The user may or may not even know or care what it does, because….

– …The user’s computer and data are completely safe

• Conclusion: End hosts aren’t the whole problem– The solution needs to involve the network, as well

Page 10: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

10

Outline

• The Problem of DoS• Internet Accountability• Achieving accountability among a club of

members with pair-wise trust• Dealing with the world outside the club• Determining if a member of the club has gone

bad• Economics of Dos and Accountability

Page 11: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

11

What Is Accountability?Two components:• Identification: Receivers of traffic can

distinguish it by source – Must be based on some persistent attribute

• I.e., difficult/expensive for the originator to change• Think “IP address”—but something more durable is

needed• Defensibility: Receivers can choose to avoid

(block) traffic from a source with a particular persistent attribute– Requires identification, but doesn’t automatically

follow from itAllows a DoS target to distinguish DoS traffic sources

(not just IP address), and block all traffic from them

Page 12: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

12

Outline

• The Problem of DoS• Internet Accountability• Achieving accountability among a club of

members with pair-wise trust• Dealing with the world outside the club• Determining if a member of the club has gone

bad• Economics of Dos and Accountability

Page 13: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

13

Implementing Accountability on the Internet

(Among a Club with Pair-wise Trust) AS1

AS2`

E2`

E1

`

E3

HomeRouter

FRS-1

BRAS

`

CRMW1

``

FRS-2 CRM

• “Total” Ingress Filtering– Every packet is required to have an honest source address– Covers all traffic (e.g., DNS spoofing eliminated!)

• Filtering on request by source-destination pair– Requestor identifies “source” by (IP address, port, time)– Too many filters against a source leads to other measures

• Rate-limiting, offers for support upgrades, warnings, charging

Page 14: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

14

Implementing Accountability on the Internet

(Among a Club with Pair-wise Trust) AS1

AS2`

E2`

E1

`

E3

HomeRouter

FRS-1

BRAS

`

CRMW1

``

FRS-2 CRM

Both measures are best implemented at the source ISP• Can identify, distinguish and filter an individual offending

machine/user at the ingress point (even assuming DHCP, NAT, etc.)

• Downstream ASes are spared the traffic• Multiple paths aren’t a problem• Habitual offenders are more easily recognized

Page 15: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

15

Secure Relay of Filtering Requests• Assume for now:

– Peer ISPs cooperate—including ingress filtering• Basic Design:

– Every AS/ISP has a Filter Request Server (FRS)– Requestor sends a request to its local ISP’s FRS

– FRS forwards the request along a chain of FRSs

to the source’s ISP: “filter all traffic from source to requestor”

• Request does not need to follow the same path as the offending traffic

– Source’s ISP identifies the source and applies the filter

Page 16: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

16

How FRSs Work

AS4R6

AS3R5

AS2AS1

`

E2R1

R3

R2`

E1

`

E3

R4HomeRouter

FRS-1

DSLAM

`

E4

CRM

FRS-2

FRS-3

FRS-4

W1

Page 17: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

17

Attacks on the FRS System• Customer asks FRS to filter traffic to another customer

– Can’t happen – FRS only allows filters on traffic to requestor

– Ingress filtering prevents spoofing and crypto is easy

• An ISP injects spoofed Filter Requests– Means an ISP is breaking its peering agreements

• Presumably a rare, serious event– Heavy-duty investigation using sampling, logs,

cooperation• DoS on FRSs

– FRS can filter traffic to itself!– ISP can charge for right to send filter requests, and

scale FRS accordingly

Page 18: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

18

Attacks on the FRS System• Framing attacks (false, non-spoofed complaints)

– Only relevant when they accumulate, hurting a source’s reputation

• A single framer can block anyone he/she wants (and who cares?)

– Solution: delay punitive measures to allow resolution

• Gives the customer a chance to complain of framing• Overwhelm a router’s ability to filter a customer

– Apply many useless filters against a bot, so real filters don’t take

– Solution: evict the customer from the club

Page 19: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

19

Outline

• The Problem of DoS• Internet Accountability• Achieving accountability among a club of

members with pair-wise trust• Dealing with the world outside the club• Determining if a member of the club has gone

bad• Economics of Dos and Accountability

Page 20: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

20

The Solution to DoS is Already Here!

Paraphrasing the rest of the RFC:• Malicious applications MUST set the evil bit to 1• Routers/firewalls SHOULD preferentially drop

pakcets with the evil bit set

Firewalls ... and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. The problem is that making such determinations is hard. To solve this problem, we define a security flag, known as the "evil" bit, in the IPv4 header. Benign packets have this bit set to 0; those that are used for an attack will have the bit set to 1.

Network Working Group S. BellovinRequest for Comments: 3514 AT&T Labs ResearchCategory: Informational 1 April 2003

The Security Flag in the IPv4 Header

Page 21: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

21

Incremental Deployment and the “Evil Bit”

UnaccountableASAS5

AS4

UnaccountableAS

AS3

AS2

AS1

• Packets from “unaccountable” peers get “evil bit” set– Marking occurs at ingress to accountable AS– Bit stays set as the packet travels through

accountable ASes– Behavior enforced by peering agreement

Page 22: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

22

Incremental Deployment and the “Evil Bit”

• ISPs can de-prioritize “evil” traffic sent to their customers– On request, or when traffic to the customer is too heavy– DiffServ mechanisms are already available on most routers– Incentive to other ISPs to become accountable

• ISPs can also slap an “evil bit” on repeat offenders’ traffic– Cheaper than filtering out a large list of destination addresses– Incentive for the offender to stop attacks/remove malware

UnaccountableASAS5

AS4

UnaccountableAS

AS3

AS2

AS1

Page 23: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

23

Reflection Attacks• Attacker “redirects” attack packets through an innocent

“reflector”– E.g., TCP SYN with (forged) source address of the attack

target—results in an ACK sent to the target– Doesn’t magnify the attack, but helps disguise its source

attack packets can shed their “evil bit”• Reflectors are fundamental to IP architecture

– IP depends on hosts/routers replying to single packets– Path MTU Discovery, TCP RST, ICMP TTL Exceeded– Routers, hosts – all can be used as reflectors

• Only two choices– Hosts/routers reply only to packets from authenticated

sources – breaks all connectivity to hosts using different or no authentication

– Host/router software must change to reflect some characteristic of incoming packet in reply

Page 24: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

24

Reflection Attacks - Solution• Hosts need to preserve the “evil bit” setting

of incoming packets when replying to them– Requires changes to host network stacks

• But these are necessary in any event, to protect against reflection attacks—regardless of the DoS defense scheme

• Incremental deployment possible– Accountable ISPs probe customers for

reflection– Set “evil bit” on hosts not reflecting evil

bits properly

Page 25: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

25

Outline

• The Problem of DoS• Internet Accountability• Achieving accountability among a club of

members with pair-wise trust• Dealing with the world outside the club• Determining if a member of the club has gone

bad• Economics of Dos and Accountability

Page 26: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

26

What Motivates an AS to Follow the Accountablity Club Rules?

• Active malfeasance among ASes can be expected to be rare– Peering agreements are contracts = lawyers

• So long as misbehavior is observable to the world, peer pressure keeps ASes in line– Detection must be possible– Need not be automated– Failure to behave means peer ASes will set

evil bit on the offender’s traffic• BGP is a positive example

Page 27: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

27

Detecting Fraudulent “Accountable” ASes

Easiest case to detect: AS claims to install filters when requested, but doesn’t

• Request forwarded and FRS ACK received, but packets still arrive and packet have evil bit clear

• Each AS tasks the upstream AS to determine why the filter wasn’t applied, on pain of having evil bit set “getting tossed out of the accountable club”

UnaccountableAS7AS5

AS4

UnaccountableAS6

AS3

AS2

AS1

S1

D

Page 28: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

28

Detecting Fraudulent “Accountable” ASes

UnaccountableAS7AS5

AS4

UnaccountableAS6

AS3

AS2

AS1

S1

D

S1Hardest case to detect: AS claims to perform ingress

filtering, but doesn’t• Packets with evil bit clear arrive at a host• Packets don’t stop when host requests filtering• Collaboration among neighbor accountable ASes shows

packets not entering the fraudulent AS

Page 29: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

29

Outline

• The Problem of DoS• Internet Accountability• Achieving accountability among a club of

members with pair-wise trust• Dealing with the world outside the club• Determining if a member of the club has gone

bad• Economics of Dos and Accountability

Page 30: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

30

Economic JustificationSay you want to protect against 50,000 bots@128Kbps/bot....• Roll-your-own solution:

– 6.4 Gbps bandwidth (~10 OC-12s at $30K/month) + enough magic scrubber boxes ($110K/OC-12) = ~$10M over 3 years

• Scrubbing services provided by ISP:– $210K/month for 3 OC-48s’ worth of scrubbing = ~$7.5M

over 3 years• Deploying accountability:

– Hard to say how much this would cost– But we have data on the cost of two huge communication

infrastructure overhauls: number block pooling and local wireless number portability

– If accountability is comparable, it would cost about $60-230M for the whole Internet

• Bottom line: Somewhere between 6 and 30 large orgs could probably finance deployment of Internet accountability by themselves, out of their 3-year savings estimates

Page 31: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

31

Deployment Strategies• Three primary types of ISPs

– Serve end-users: Verizon, Comcast, ...– Serve servers and enterprises: SAVIS, AboveNet,

parts of ATT & Sprint, ...– Serve other networks (transit): UUNET, ATT, Sprint, ...

• Deployment realities– Deployment costs highest for ISPs serving end-users– Revenue potential greatest for ISPs serving servers– But these networks often peer directly! Now money can

flow and mutual benefit arise...• Who deploys first? Pairs of Server ISPs and User ISPs

Page 32: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

32

Deployment Over Time• DoS on the Internet slowly goes away

– A host with too many filters has evil bit set– ‘botnets become harder to build and aren’t

useful for as long– Ultimately, cost for links to DoS a server

become greater than the cost of links to connect the server

• Deploying accountability in transit network is cheap– Just need an FRS to do pass-thru– Probably not early adopters though

Page 33: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

33

Related Work• Identification

– TCP handshake for identification• No good for UDP, DNS, TCP SYN floods, transient IP addresses

– End-to-end (IPSec, HIP)• Requires PKI, DNSSec or some other global identity

infrastructure– Traceback/packet-marking

• Partial, statistical information, doesn’t help against transient IP addresses

• Highly vulnerable to reflection attacks• Defensibility

– End-host filtering (possibly with packet-marking)• End hosts still have to have enough bandwidth to handle

attacks– Capabilities

• Don’t protect the capability issuer, and require state in the network to prevent capability abuse

– “Active filtering”• Packet-marking + filtering scattered across the network (not

just at source)

Page 34: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

34

Conclusions• Network-level DDoS is a big problem on the

Internet today– It’s costing a lot of people a lot of money– Solving it will require costly changes

• Accountability actually solves the problem– DDoS traffic can be identified and blocked at

the source• Accountability is actually deployable

– Ingress and by-destination on-request filtering are technically straightforward to deploy

– The “evil bit” enables incremental deployment

• Accountability is cheaper than living with DDoS

Page 35: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

35

Questions?

Thanks!

Page 36: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

36

Sidebar 2: Computer Networking People, Please Cover Your Ears…

• There exists a large-scale, successful network today that doesn’t have a DoS problem….

• …Despite the fact that DoS attacks are breathtakingly easy on it

• The reason: Accountability– Targets know who’s attacking, and can

ask for the network to block all traffic from them

(Okay, Computer Networking folks—you can uncover your ears now….)

Page 37: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

37

Attacks• Perhaps state that our scheme is targeted at end

hosts (clients, servers). If a router is compromised, forget flooding style attacks, you've got more serious BGP attacks that can get rid of your legitimate traffic.

Page 38: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

38

Deployment• Pairings of ISPs specializing in hosting servers and ISPs

specializing in serving home users• Two tiers of filter requestors

– Big servers are stable, and pay for the right to request lots of filters (they’re the DoS targets, after all)

– Small clients rarely if ever need to request filters• ASes/ISPs can include “accountability” in their

peering agreements– Mutually agree to deploy ingress filtering and

accept filtering requests from destinations (really easy for core ASes without end-host clients)

Page 39: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

39

Our Solution in 1 Slide

• Leverage the persistence of relationships among ASes and their customers to create a working “pushback” packet filtering system

• Use the “evil” bit to deal with non-participating ASes, achieve incremental deployability, and attain scalability

• Provide techniques to discover and cope with ASes that claim to be good citizens, but actually cheat or are lazy

• Show that our infrastructure is cheaper than alternatives

Page 40: 1 Blocking DDoS Attacks with AS-Based Accountability Dan Simon Sharad Agarwal Dave Maltz Microsoft Research.

40

The Evil Bit In Action

AS5

AS4AS3

AS2

AS1