Denial-of-Service [Gligor, 84]

14
Slides mostly by Sherif Khattab 1 Denial-of-Service [Gligor, 84] ``A group of otherwise-authorized users of a specific service is said to deny service to another group of otherwise-authorized users if the former group makes the specified service unavailable to the latter group for a period of time which exceeds the intended (and advertised) waiting time”

description

Denial-of-Service [Gligor, 84]. ``A group of otherwise-authorized users of a specific service is said to deny service to another group of otherwise-authorized users if the former group makes the specified service unavailable to the latter group for - PowerPoint PPT Presentation

Transcript of Denial-of-Service [Gligor, 84]

Page 1: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 1

Denial-of-Service [Gligor, 84]

``A group of otherwise-authorized users of a specific

service is said to deny service to another group of

otherwise-authorized users if the former group makes

the specified service unavailable to the latter group for

a period of time which exceeds the intended (and

advertised) waiting time”

Page 2: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 2

DoS Attacks

DoS attacks aim at reducing legitimate utilization of network and/or server resources through: resource destruction (exploit bugs in the OS) resource exhaustion

vulnerability exploitation (e.g., SYN attack) brute-force flooding

Network-level (e.g., lots of packets as in UDP floods) Service-level (e.g., flash crowds)

Page 3: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 3

Service-level DoS

A large number of attack hosts request service from the victim server at a high rate. For instance, download files from an FTP server, or get web pages from an WWW server

Page 4: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 4

Front-ends

Front-ends form a tree with the back-ends as its logical root.

Page 5: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 5

Front-ends (contd.)

Tree level of each front-end depends on its attack tolerance

Front-ends can be the bottleneck that gets attacked. It usually can withstand a good amount of attack traffic.

To join the network (or reconfigure), a front-end performs: Parent registration Address registration

Page 6: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 6

DoS Attacks (1/4)

They also consume server resources, such as interrupt processing

capacity, operating system structures,

processing time, etc.

Legitimate packets consume network

resources, such as router buffers and link

capacity

Legitimate Client

Server

Router

Page 7: Denial-of-Service [Gligor, 84]

DoS Attacks (2/4)

Network-level DoS attacks flood network resources Service-level DoS attacks exploit vulnerabilities to

crash servers Service-level DoS attacks flood server resources,

so that legitimate clients’ packets will be dropped…

7Slides mostly by Sherif Khattab

Page 8: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 8

Our Focus: Service-level Flooding DoS

DoS AttacksDoS Attacks

Resource Destruction

Resource Destruction

ResourceExhaustion

ResourceExhaustion

Brute-forceFlooding

Brute-forceFlooding

VulnerabilityExploitation

VulnerabilityExploitation

Service-levelService-level Network-levelNetwork-level

Page 9: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 9

The DoS Problem

Distinguish attack packets/requests fromlegitimate packets/requests

quickly accurately (low false positives and false

negatives) and efficiently (small overhead)

Primary metrics Legitimate Response Time Legitimate Throughput

Page 10: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 13

Prevention Detection/

Recovery

Mitigation

Network-level Network-level puzzles

PacketScore;

RED-PD;

Heavy-hitter detection;

DCAP; Pushback;

MOVE; Capabilities;

IP Hopping

Replication;

Overlay-based

Service-level Application-level puzzles; Reservation-based Schemes

DDoS Shield; Shadow Honeypots;

Kill-Bots

Replication

State-of-the-art

Page 11: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 14

Honeypots [Spitzner][Provos]

Honeypots are: decoy resources to trap attackers useful in detecting worm-infected hosts

However, honeypots are at fixed locations separate from real servers

DoS Attackers can evade honeypots

Page 12: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 15

Roaming Honeypots [Khattab]

In roaming honeypots, the locations of

honeypots are: continuously changing unpredictable to non-compliant attackers disguised within servers

Page 13: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 16

Unique, un-spoofable user identifier(dealing with proxy servers is an open

problem)

Main Assumption

Proxy Server

Page 14: Denial-of-Service [Gligor, 84]

Slides mostly by Sherif Khattab 17

Firewall

??

Packet Filtering in firewalls

• White-list: • allow packets from certain users/Ips.• Not Scalable, because list grows with number of users

• Black list:• do not allow certain IPs or users.• More Scalable: # attackers << # users