Characterizing and Defending Against DDo S Attacks Christos

  • Slides: 40
Download presentation
Characterizing and Defending Against DDo. S Attacks Christos Papadopoulos. . and many others

Characterizing and Defending Against DDo. S Attacks Christos Papadopoulos. . and many others

How Do Computers Find Each Other? Computer 1 Computer 2 Internet

How Do Computers Find Each Other? Computer 1 Computer 2 Internet

What Are the Different Kinds of Addresses? �Have domain name (e. g. , www.

What Are the Different Kinds of Addresses? �Have domain name (e. g. , www. usc. edu) �Global, human readable name �DNS translates name to IP address (e. g. 128. 125. 19. 146) �Global, understood by all networks � Finally, we need local net address �e. g. , Ethernet (08 -00 -2 c-19 -dc-45) �Local, works only on a particular network

Domain Naming System (DNS) Local DNS server Computer 1 What’s the IP address for

Domain Naming System (DNS) Local DNS server Computer 1 What’s the IP address for www. usc. edu? It is 128. 125. 19. 146 DNS address manually configured into OS

Finding Ether Address: Address Resolution (ARP) Broadcast: who knows the Ethernet address for 128.

Finding Ether Address: Address Resolution (ARP) Broadcast: who knows the Ethernet address for 128. 125. 51. 41? Ethernet Broadcast: I do, it is 08 -00 -2 c-19 -dc-45 Ethernet

Sending a Packet Through the Internet Routers send packet to next closest point H

Sending a Packet Through the Internet Routers send packet to next closest point H H H R R R R H: Hosts The Internet routes packets based on their destination! H R: Routers

Smurf Attack attacker broadcast echo request source address is spoofed to be target’s address

Smurf Attack attacker broadcast echo request source address is spoofed to be target’s address target many echo replies are received by the target, since most machines on the amplifier network respond to the broadcast amplifier network

TCP SYN Flooding - A more powerful attack SYN - ACK client (port =

TCP SYN Flooding - A more powerful attack SYN - ACK client (port = 33623/tcp) server [ACK set for remainder of session] [session proceeds] (port = 23/tcp) SPOOFED SYN - ACK FINAL ACK NEVER SENT nonexistent host target (port = 23/tcp)

So, What Is DDo. S? Distributed Denial of Service § New, more pernicious type

So, What Is DDo. S? Distributed Denial of Service § New, more pernicious type of attack § Many hosts “gang” up to attack another host § Network resource attack: § Bandwidth § State

Why Should We Care? § Successfully used to attack prominent sites in the Internet

Why Should We Care? § Successfully used to attack prominent sites in the Internet by those with a primitive understanding of internet protocols § It is relatively easy to do, but hard to detect and stop § It is only going to get worse unless we develop adequate protection mechanisms

Anatomy of an Attack § Compromise a large set of machines § Install attack

Anatomy of an Attack § Compromise a large set of machines § Install attack tools § Instruct all attack machines to initiate attack against a victim Process highly automated

Phase 1: Compromise A (stolen) account is used as repository for attack tools. A

Phase 1: Compromise A (stolen) account is used as repository for attack tools. A scan is performed to identify potential victims. A script is used to compromise the victims.

Phase 2: Install Attack Tools • An automated installation script is then run on

Phase 2: Install Attack Tools • An automated installation script is then run on the “owned” systems to download and install the attack tool(s) from the repository. • Optionally, a “root kit” is installed on the compromised systems.

Phase 3: Launch attack • Launch a coordinated DDo. S from different sites against

Phase 3: Launch attack • Launch a coordinated DDo. S from different sites against a single victim. • Network pipes of attackers can be small, but aggregated bw is far larger than victim’s pipe. • Victim’s ISP may notice elevated traffic. • DDo. S attacks are harder to track than a Do. S.

Some Known DDo. S attack tools §Trin 00 §Tribal Flood Network (TFN) §Tribal Flood

Some Known DDo. S attack tools §Trin 00 §Tribal Flood Network (TFN) §Tribal Flood Network 2000 (TFN 2 K) §Stacheldraht

Stacheldraht § Combines features of trin 00 and TFN. § Adds encryption between the

Stacheldraht § Combines features of trin 00 and TFN. § Adds encryption between the attacker and masters and automated update of agents. § Communication between attacker and masters take place on tcp port 16660. § Daemons receive commands from masters through ICMP echo replies §ICMP, UDP, SYN flood and SMURF attack.

#. /client 192. 168. 0. 1 [*] stacheldraht [*] (c) in 1999 by. .

#. /client 192. 168. 0. 1 [*] stacheldraht [*] (c) in 1999 by. . . trying to connect. . . connection established. -------------------enter the passphrase : sicken -------------------entering interactive session. *************** welcome to stacheldraht *************** type. help if you are lame stacheldraht(status: a!1 d!0)>

stacheldraht(status: a!1 d!0)>. help available commands in this version are: -------------------------. mtimer. mudp. micmp.

stacheldraht(status: a!1 d!0)>. help available commands in this version are: -------------------------. mtimer. mudp. micmp. msyn. msort. mping. madd. mlist. msadd. msrem. distro. help. setusize. setisize. mdie. sprange. mstop. killall. showdead. showalive -------------------------stacheldraht(status: a!1 d!0)>

Some Commands -------. distro user server Instructs the agent to install and run a

Some Commands -------. distro user server Instructs the agent to install and run a new copy of itself using the Berkeley "rcp" command, on the system "server", using the account "user" (e. g. , "rcp user@server: linux. bin ttymon"). madd ip 1[: ip 2[: ip. N]] Add IP addresses to list of attack victims. . mdie Sends die request to all agents.

COSSACK: Coordinated Suppression of Simultaneous Attacks Computer Networks Division ISI http: //www. isi. edu/cossack

COSSACK: Coordinated Suppression of Simultaneous Attacks Computer Networks Division ISI http: //www. isi. edu/cossack

People § Co-PIs: Christos Papadopoulos, Bob Lindell (USC/ISI) § Affiliations: Ramesh Govindan (USC/ISI) §

People § Co-PIs: Christos Papadopoulos, Bob Lindell (USC/ISI) § Affiliations: Ramesh Govindan (USC/ISI) § Staff: John Mehringer (ISI) § Students: Alefiya Hussain (USC) § DARPA synergies: § DWARD - Peter Reiher, Jelena Mirkovic (UCLA) § SAMAN - John Heidemann (USC/ISI)

Cossack Overview q. Distributed set of watchdogs at network perimeter q. Local IDS q.

Cossack Overview q. Distributed set of watchdogs at network perimeter q. Local IDS q. Group communication q. Topology information (when available) q. Fully distributed approach q. Peer-to-peer rather than master-slave q. Attack-driven dynamic grouping of watchdogs q. Attack correlation via coordination with other watchdogs q. Independent, selective deployment of countermeasures

Cossack: A Simplified View attacker watchdog W W attacker watchdog W target

Cossack: A Simplified View attacker watchdog W W attacker watchdog W target

Attacks Begin attacker W W watchdog W target

Attacks Begin attacker W W watchdog W target

Watchdogs Communicate Using YOID attacker W W YOID watchdog W target

Watchdogs Communicate Using YOID attacker W W YOID watchdog W target

Attacks Detected attacker W W YOID watchdog W target

Attacks Detected attacker W W YOID watchdog W target

Watchdogs Install Filters and Eliminate Attack attacker W W watchdog W target

Watchdogs Install Filters and Eliminate Attack attacker W W watchdog W target

Detecting Source Spoofed Attacks attacker W W YOID watchdog W target

Detecting Source Spoofed Attacks attacker W W YOID watchdog W target

Cossack Watchdog Architecture Cisco Interface Linux IPTables Router Interface Router Control Snort Other IDS

Cossack Watchdog Architecture Cisco Interface Linux IPTables Router Interface Router Control Snort Other IDS Pulsing Interface (D-WARD) Detector Event Monitor Rate Monitor Distributed Blackboard Yoid Multicast Interface YOID Multicast group

Cossack Plugin Operation Packet Averages Grouped by Destination Address Cisco Interface Linux IPTables Router

Cossack Plugin Operation Packet Averages Grouped by Destination Address Cisco Interface Linux IPTables Router Interface Router Control Packet Flow Statistics Request more stats Snort Other IDS Interface (D-WARD) Pulsing Detector Event Monitor Distributed Blackboard Yoid Multicast Interface Rate Monitor

Cossack Plugin Operation Packet Averages Grouped by Destination Address Packet Averages Grouped by Source

Cossack Plugin Operation Packet Averages Grouped by Destination Address Packet Averages Grouped by Source Address Cisco Interface Linux IPTables Router Interface Router Control Packet Flow Statistics Request for more stats Snort Other IDS Interface (D-WARD) Pulsing Detector Event Monitor Distributed Blackboard Yoid Multicast Interface Rate Monitor

Cossack Network Inspector Tool to determine detection thresholds for watchdogs � Interfaces with the

Cossack Network Inspector Tool to determine detection thresholds for watchdogs � Interfaces with the Cossack Snort Plugin � Collects aggregate level network traffic statistics �Traffic filters created using snort rules

Cossack Performance �Response time: 5 – 30 seconds �Insensitive to attack type

Cossack Performance �Response time: 5 – 30 seconds �Insensitive to attack type

Attack Capture and Analysis Goal: Capture some attacks, analyze and learn from them �Packet-level

Attack Capture and Analysis Goal: Capture some attacks, analyze and learn from them �Packet-level capture facilities in several sites: �Los Nettos �USC �CAIDA �[Telcordia, Sprint] �Spectral analysis

Tracing Infrastructure Internet Genuity Cogent Verio LA-MAE Los Nettos JPL Caltech TRW Trace Machine

Tracing Infrastructure Internet Genuity Cogent Verio LA-MAE Los Nettos JPL Caltech TRW Trace Machine 140 Mbps, 38 kpps USC Los Nettos Customers Centergate

Captured Attacks �Captured and classified about 120 attacks over several months Attack Class Count

Captured Attacks �Captured and classified about 120 attacks over several months Attack Class Count Single-source Multi-source 37 10 Reflected Unclassified 20 13 PPS 133 -1360 1600098000 1300 -3700 550 -33500 Kbps 640 -2260 13000 -46000 1700 -3000 1600 -16000

Spectral Attack Analysis F(60%) n n Single-source attack Strong higher frequencies and linear Normalized

Spectral Attack Analysis F(60%) n n Single-source attack Strong higher frequencies and linear Normalized Cumulative Spectrum (NCS) n n Multi-source attack (145 sources) Localization of power in low frequencies in NCS

Spectral Analysis Goal: identify single vs. multi -source attacks • Single-source: F(60%) mean 268

Spectral Analysis Goal: identify single vs. multi -source attacks • Single-source: F(60%) mean 268 Hz (240295 Hz) • Multi-source: F(60%) mean 172 Hz (142210 Hz) • Able to robustly categorize unclassified attacks

Conclusions q. Cossack is a fully distributed approach against DDo. S attacks q. Software

Conclusions q. Cossack is a fully distributed approach against DDo. S attacks q. Software is operational and currently undergoing Red Team testing q. We continue to capture attacks, analyze and learn from them q. Spectral analysis work very promising http: //www. isi. edu/cossack