Defending Against DDoS Attacks Using Maxmin Fair Server Centric Router Throttles

About This Presentation
Title:

Defending Against DDoS Attacks Using Maxmin Fair Server Centric Router Throttles

Description:

... Concepts ... Operating System Concepts. Motivations. Internet is an open and ... Operating System Concepts. Network Denial-of-service Attacks. Some ... –

Number of Views:193
Avg rating:1.0/5.0
Slides: 48
Provided by: davi84
Category:

less

Transcript and Presenter's Notes

Title: Defending Against DDoS Attacks Using Maxmin Fair Server Centric Router Throttles


1
Defending Against DDoS Attacks Using Max-min Fair
Server Centric Router Throttles
  • David K.Y. Yau John C.S. Lu
  • CS Dept, Purdue University CSE Dept,CUHK

2
Motivations
  • Internet is an open and democratic environment
  • increasingly used for mission-critical work and
    commercial applications.
  • Many security threats are present or appearing
  • Easy to launch, even for naïve users.
  • need effective and flexible defenses to
    detect/trace/counter attacks
  • Goals
  • protect innocent users
  • prosecute criminals

Ambitious goals
3
Network Denial-of-service Attacks
  • Some attacks quite subtle
  • securing protocols and intrusion detection (e.g.,
    BGP, TCP-syn attack)
  • at routing infrastructure, malicious dropping of
    packets, etc (low-rate TCP)
  • Others by brute force
  • - flooding (e.g., UDP, valid Web Request)
  • Cripples victim
  • - precludes any sophisticated defense at
    victim site
  • Philosophical question what is an attacker?
  • Viewed as resource management problem

4
Flooding Attack
Server
5
Server-centric Router Throttle
  • Installed by server when under stress, at a set
    deployment routers
  • can be sent by multicast
  • Specifies leaky bucket rate at which router can
    forward traffic to the server
  • aggressive traffic for server dropped before
    reaching server
  • rate determined by a feedbak control algorithm

Issues (1) Which set of routers? (2)
What is the proper dropping rate?
6
Router Throttle
Aggressive flow
To S
Deployment router
C Each victim has a leaky bucket for rate limit.
Small memory and computationoverhead!
7
Key Design Problems
  • Resource allocation who is entitled to what?
  • need to keep server operating within load limits
  • notion of fairness, and how to achieve it?
  • Need global, rather than router-local, fairness
  • How to respond to network and user dynamics
    (e.g., fluctuation of traffic)?
  • Feedback control strategy is needed

8
What is being fair?
  • Baseline approach of dropping a fraction f, say
    ½, of traffic for each flow wont work well
  • a flow can cause more damage to other flows
    simply by being more aggressive!
  • Rather, no flow should get a higher rate than
    another flow that has unmet demands
  • this way, we penalize aggressive flows only,
    but protect the well-behaving ones

9
Fairness Notion
  • Since we proactively drop packets ahead of
    congestion point, we need a global fairness
    notion
  • max-min fairness among level-k routing points,
    R(k), i.e., routers about k hops away from
    destination

Standard knowledge we learn
Deployment points
10
Level-k Deployment Points
  • Deployment points parameterized by an integer k
  • R(k) -- set of routers that are either k hops
    away from server S, or less than k hops away from
    S but are directly connected to a host
  • Fairness across global routing points R(k)

11
Level-3 Deployment
Server
12
Feedback Control Strategy
  • Hysteresis control
  • high and low water marks for server load, to
    strengthen or relax router throttle
  • Additive increase/multiplicative decrease rate
    adjustment
  • increases when server load exceeds US, and
    decreases when server load falls below LS
  • throttle removed when a relaxed rate does not
    result in significant server load increase

13
Fairness Definition
  • A resource control algorithm achieves level-k
    max-min fairness among the routers R(k) if the
    allowed forwarding rate of traffic for S at each
    router is the routers max-min fair share of some
    rate r satisfying LS r US

14
Fair Throttle Algorithm
15
Example Max-min Rates (L18, H22)
Server
16
Interesting Questions
  • Can we preferentially drop attacker traffic over
    good user traffic?
  • Can we successfully keep server operating within
    design limits, so that good user traffic that
    makes it gets acceptable service?
  • How stable is such a control algorithm? How does
    it converge?

17
Algorithm Evaluation
  • Control-theoretic analysis (fluid analysis)
  • algorithm stability and convergence under
    different system parameters
  • Packet network simulations (packet level
    analysis)
  • Test under UDP and TCP traffic. Also test with
    Web traces
  • System implementation (the real thing, baby !!!)
  • deployment costs

18
Control-theoretic Model
Throttle signal from victim
Step size
Adjusted traffic from source i
When throttle signal is high, server is
underloaded. When throttle signal is low, server
is overloaded.
ANALOGY!!!
19
Feedback Control Model (Us1750Ls1650)
Constant Source of 20
Constant Source of 30
Constant Source of 25
Constant Source of 4000
Constant Source of 2800
20
Output for good traffic (total from source 1)
21
Output for attack traffic (total from source 5)
22
Output for attack traffic (total from source 6)
23
Total traffic to server (Us1750Ls1650)
24
Case 2 variable attack traffic (Us1750,Ls1650)
Square Pulse
25
Output of attack traffic 1
26
Output of attack traffic 2
27
Total traffic to server (Us1750Ls1650)
28
Feedback Control Model(sources and server)
29
Feedback Control Model (server throttle signal)
30
Feedback Control Model (sources process throttle)
31
Throttle Rate (L900 U1100)
32
Server Load (L 900 U 1100)
33
Throttle Rate (U 1100)
34
Server Load (U 1100)
35
Throttle Rate (L1050U1100)
36
Server Load (L1050 U1100)
37
NS2 UDP Simulation Experiments
  • Global network topology reconstructed from real
    traceroute data
  • ATT Internet mapping project 709,310 traceroute
    paths, single source to 103,402 other
    destinations
  • randomly select 5,000 paths, with 135,821 nodes
    of which 3879 are hosts
  • Randomly select x of hosts to be attackers
  • good users send at rate 0,r, attackers at rate
    0,R

38
20 Evenly Distributed Aggressive (101) Attackers
39
40 Evenly Distributed Aggressive (51) Attackers
40
Evenly Distributed meek Attackers
41
Deployment Extent
42
NS2 TCP Simulation Experiment
  • Clients access web server via HTTP 1.0 over TCP
    Reno
  • Simulated network subset of ATT traceroute
    topology
  • 85 hosts, 20 attackers
  • Web clients make request probabilistically with
    empirical document size and inter-request time
    distributions

43
Web Server Protection
44
Web Server Traffic Control
45
System Implementation
  • On Linux router
  • loadable kernel module
  • CPU resource reservation
  • Deployment platform
  • Pentium 4/2G Hz PC
  • multiple 10/100 Mb/s Ethernet interfaces

46
System Implementation cont
  • OPERA An Open-Source Extensible Router
    Architecture
  • http//www.cse.cuhk.edu.hk/cslui/ANSRlab/softw
    are/opera/
  • A Linux-based package for implementing a software
    programmable router architecture with the aim to
    facilitate networking experiments for the
    research community. Using this architecture, one
    can dynamically load new extension and services
    into the programmable router. Some interesting
    extensions include QoS support and traceback of
    DDoS attacks.)
  • Dynamic module loading
  • Resource reservation
  • General extension framework
  • Secured Communication

47
Network Architecture
Web code server
ISP
client
48
Future Work
  • Offered load-aware control algorithm for
    computing throttle rate
  • impact on convergence and stability
  • Policy-based notion of fairness
  • heterogeneous network regions, by size,
    susceptibility to attacks, tariff payment
  • Selective deployment issues
  • Impact on real user applications
  • Defense for other forms of DDoS like the
    reflector attack, BGP cascading failure..etc.

49
Conclusions
  • Extensible routers can help improve network
    health
  • Presented a server-centric router throttle
    mechanism for DDoS flooding attacks
  • can better protect good user traffic from
    aggressive attacker traffic
  • can keep server operational under an ongoing
    attack
  • has efficient implementation

50
Existing Networks
ISP
server
router simple forwarding
client
51
Level-3 Deployment
Server
52
Routers Forwarding Paths
Function dispatcher
Input queues
Resource allocation manager
Output network queues
Packet classifier
53
Level-3 Deployment
54
Example Level-k Max-min Fair Rates (L18, H22)
55
Routing Infrastructure
  • Router software critical to network health
  • patches for security bugs
  • new defenses against new attacks
  • Scalable distribution of router software to many
    routing points
  • minimal disruptions to existing services
  • little human intervention
  • Exploit software-programmable router technology
Write a Comment
User Comments (0)
About PowerShow.com