D-WARD: DDoS Network Attack Recognition and Defense

0
0
1892 days ago, 742 views
PowerPoint PPT Presentation

Presentation Transcript

Slide 1

D-WARD: DDoS Network Attack Recognition and Defense PhD Qualifying Exam Jelena Mirković PhD Advisor: Peter Reiher 01/23/2002

Slide 2

Design and execute DDoS protection framework situated at source organize independently recognizes and quits assaulting streams does not influence genuine streams 2/39

Slide 3

Overview Problem Statement Related Work Desirable Characteristics D-WARD Thesis Goals Conclusion 3/39

Slide 4

What is a DoS Attack? 4/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 5

What is a DDoS Attack? 5/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 6

DDoS Defense Problem Large number of unwitting members No basic qualities of DDoS streams No managerial area collaboration Automated apparatuses Hidden personality of members Persistent security gaps on the Internet 6/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 7

DDoS Prevention Compromise aversion security patches infection location programs interruption discovery frameworks (IDS) High organization can't be implemented 7/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 8

DDoS Defense INTERMEDIATE NETWORK VICTIM NETWORK SOURCE NETWORK 8/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 9

Victim Network Intrusion Detection Systems On-off control approach Router checking instruments (CISCO) + Victim can effectively recognize the assault - Victim is powerless if: attack comprises of real bundles or attack is of huge volume 9/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 10

Intermediate Network WATCHERS Traceback Pushback Spoofing counteractive action + Routers can viably oblige/follow the assault - Possible execution debasement - Interdomain legislative issues of disengagement - Attack recognition is hard - Communication must be secured 10/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 11

Source Network MULTOPS + Source switches can adequately compel/follow the assault + Internet assets are safeguarded - Attack identification is hard - Many arrangement focuses required for high viability 11/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 12

Desirable Characteristics High security Reliable assault identification Independent location and reaction Low execution cost Incremental advantage with incremental sending Handle repeating assaults Traceback Cooperation REQUIRED OPTIONAL 12/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 13

D-WARD DDoS guard framework in Source Network Source Router distinguishes assault and reacts Monitors the two-way activity Suspect streams are rate-restricted Further perceptions prompt to reduction or increment of rate-utmost 13/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 14

OBSERVATION COMPONENT CLASSIFICATION TRAFFIC STATISTICS SOURCE ROUTER INTERNET STATISTICS CACHE MODEL CACHE NORMAL TRANSIENT ATTACK RATE LIMIT RULES SOURCE NETWORK THROTTLING COMPONENT System Architecture 14/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 15

Statistics Gathering Statistics find troubles Only IP header information is utilized Statistics ordered per peer IP address Statistics reserve size is restricted and the store is cleansed occasionally: Records for typical streams erased Records for transient and assault streams reset 15/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 16

Traffic Models TCP requires corresponding converse stream Non-TCP movement requires NO turn around stream Non-TCP servers more often than not send consistent measure of parcels/Bytes every second to a given associate 16/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 17

Traffic Models Model of ordinary TCP movement: low proportion of number of sent/number of got bundles Model of typical non-TCP movement: mean and standard deviation of number of sent parcels/Bytes for certain goal Non-TCP models made in preparing stage 17/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 18

Flow Classification Comparison with models of ordinary movement agreeable - inside cutoff points of the model assault - outside of model breaking points Well carried on or not ordinary - very much acted agreeable streams transient - non all around acted agreeable streams 18/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 19

Throttling Component ATTACK: Exponential decline TRANSIENT: Slow recuperation, straight increment NORMAL: Fast recuperation, exponential increment 19/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 20

Experiment 1 CLIENT ATTACKER ROUTER VICTIM ATTACKER 20/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 21

assault begins assault stops 21/39

Slide 22

assault begins assault stops 22/39

Slide 23

Experiment 2 CLIENT ATTACKER ROUTER VICTIM ATTACKER 23/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 24

authentic activity begins assault begins assault stops 24/39

Slide 25

Legitimate movement begins assault stops assault begins FTP begins 25/39

Slide 26

Experiment 3 CLIENT ATTACKER ROUTER VICTIM ATTACKER 26/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 27

Legitimate movement begins FTP begins assault stops assault begins 27/39

Slide 28

assault begins assault stops 28/39

Slide 29

Experiment 4 CLIENT ATTACKER ROUTER VICTIM ATTACKER 29/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 30

assault begins assault stops 30/39

Slide 31

assault begins assault stops 31/39

Slide 32

Summary of Results D-WARD effectively identifies and prevents assaults Legitimate customers from different spaces advantage extraordinarily System is amicable to non-TCP activity Legitimate TCP associations from source system are backed off There is no reasonableness certification to ordinary streams 32/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 33

Attack Detection Choice of checked parameters: unwavering quality versus execution isolating real from assault streams Creation and upgrade of models Cooperation with other Source Routers Cooperation with the casualty Recurring assaults 33/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 34

Attack Response Effectiveness versus decency of reaction forcefulness ought to rely on upon dependability of characterization outline of criticism instrument Traceback of the assault Interaction of various DDoS resistance frameworks 34/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 35

Security Attackers take after advancements in security Attackers could endeavor to maintain a strategic distance from identification: beating assaults producing reverse bundles bit by bit go through casualty's assets mistrain models Attackers could endeavor to abuse the framework: drop honest to goodness parcels Attackers may DDoS Source Router 35/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 36

Partial Deployment Effectiveness relies on upon level of organization Does not ensure conveying system so inspiration is low Legal elements could help Additional impetus: insignificant changes to existing switches ease great execution 36/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 37

Deployment on Core Routers Large scope with less arrangement focuses Router execution must not be corrupted Rate restrain has affect on expansive segment of streams  couple of false positives an absolute necessity 37/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 38

Timeline Year1 Year2 Jan Apr Jul Oct Jan Apr Jul Oct 7 10 1 9 12 3 5 8 2 11 4 6 38/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

Slide 39

Conclusions DDoS assaults are a genuine risk A plan of viable location and reaction technique is an unquestionable requirement D-WARD effectively distinguishes and imperatives the assaults yet has undesired effect on true blue streams Further research expected to refine the framework and devise organization procedure 39/39 Problem Statement  Related Work  Desirable Characteristics  D-WARD  Thesis Goals  Conclusion

SPONSORS