Exploring DDoS Defense Mechanisms Patrick Holl Seminar Future - - PowerPoint PPT Presentation

exploring ddos defense mechanisms
SMART_READER_LITE
LIVE PREVIEW

Exploring DDoS Defense Mechanisms Patrick Holl Seminar Future - - PowerPoint PPT Presentation

Lehrstuhl Netzarchitekturen und Netzdienste Institut fr Informatik Technische Universitt Mnchen Exploring DDoS Defense Mechanisms Patrick Holl Seminar Future Internet SS14-WS14/15 Lehrstuhl Netzarchitekturen und Netzdienste Fakultt


slide-1
SLIDE 1

Lehrstuhl Netzarchitekturen und Netzdienste

Institut für Informatik Technische Universität München

Exploring DDoS Defense Mechanisms

Patrick Holl

Seminar Future Internet SS14-WS14/15 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität München

slide-2
SLIDE 2

Exploring DDoS Defense Mechanisms

2

Overview  Defining DoS and DDoS

  • DoS vs. DDoS
  • DDoS classification

 DDoS Defense Mechanisms

  • Proactive
  • Reactive
  • Rule based
  • Model based

 Future of DDoS defense

  • Software-defined networking (SDN)

 Conclusion

slide-3
SLIDE 3

Exploring DDoS Defense Mechanisms

3

Overview  Defining DoS and DDoS

  • DoS vs. DDoS
  • DDoS classification

 DDoS Defense Mechanisms

  • Proactive
  • Reactive
  • Rule based
  • Model based

 Future of DDoS defense

  • Software-defined networking (SDN)

 Conclusion

slide-4
SLIDE 4

Exploring DDoS Defense Mechanisms

4

Defining (Distributed) Denial-of-Service

Denial-of-service (DoS) = attempt to make a machine or network unavailable to its intended users

slide-5
SLIDE 5

Exploring DDoS Defense Mechanisms

5

DDoS attacks can target different layers…

 Transport Layer Attacks (e.g. TCP SYN Flooding)

Legit TCP 3-Way Handshake

Imag age Sourc urce: : http:// p://de de.w .wik ikipe pedia dia.o .org/w /wik iki/SY i/SYN-Flo lood

slide-6
SLIDE 6

Exploring DDoS Defense Mechanisms

6

DDoS attacks can target different layers…

 Transport Layer Attacks (e.g. TCP SYN Flooding)

TCP SYN Flooding attack

Imag age Sourc urce: : http:// p://de de.w .wik ikipe pedia dia.o .org/w /wik iki/SY i/SYN-Flo lood

slide-7
SLIDE 7

Exploring DDoS Defense Mechanisms

7

Not only the transport layer is vulnerable to DDoS attacks

 Transport Layer Attacks (e.g. TCP SYN Flooding)  Application Layer Attacks (e.g. Apache2 web server attacks like

Slowloris)

Imag age Sourc urce: : http://e p://en.w .wik ikipe pedia dia.o .org/w /wik iki/Slo i/Slow_lo loris

slide-8
SLIDE 8

Exploring DDoS Defense Mechanisms

8

Overview  Defining DoS and DDoS

  • DoS vs. DDoS
  • DDoS classification

 DDoS Defense Mechanisms

  • Proactive
  • Reactive
  • Rule based
  • Model based

 Future of DDoS defense

  • Software-defined networking (SDN)

 Conclusion

slide-9
SLIDE 9

Exploring DDoS Defense Mechanisms

9

How can we achieve this?

Imag age Sourc urce: : http://w p://www.n .neust ustar.bi .biz/re z/resourc urces/produ /product-li literat ature ure/n /neust ustar-ddo ddos-miti itigat atio ion-pro profe fessio ional-servi vices

slide-10
SLIDE 10

Exploring DDoS Defense Mechanisms

10

There are various approaches to handle an attack

 Proactive defense

  • Built your infrastructure in a way that it will survive a DDoS attack
  • Rely on a scalable infrastructure (e.g. cloud hosting)
  • Utilize resources when necessary
  • There is a good chance to survive Zero-Day DDoS attacks
  • Infrastructure can be expensive
slide-11
SLIDE 11

Exploring DDoS Defense Mechanisms

11

There are various approaches to handle an attack

 Reactive defense

  • Mitigate or block a DDoS attack when it happens
  • Install an IDS and feed it with certain attack patterns
  • There are attacks which are easier to detect (TCP SYN Flooding) and ones

which are much harder (flash crowd imitation)

  • Zero-Day DDoS attacks are in most cases not detectable

It’s either or…

slide-12
SLIDE 12

Exploring DDoS Defense Mechanisms

12

Which approach is the best?

 There is no best approach, why?

  • Depending on the concrete scenario, one approach can outperform the
  • ther
  • Not everybody can afford the resources to build an infrastructure which are

able to survive large DDoS attacks

  • Reactive approaches are usually cheaper
  • Proactive and reactive approaches are often combined for multiple lines
  • f defense

Imag age Sourc urce: : http:// ://pa pas-wor

  • rdpre

press-media dia.s3.am .amazo zonaws.com

  • m/c

/content nt/up uplo loads ds/2014/0 /08/Pr Proactive ve-v. v.-Reactive ive.pn .png

slide-13
SLIDE 13

Exploring DDoS Defense Mechanisms

13

What can we actually do to defend our servers?

slide-14
SLIDE 14

Exploring DDoS Defense Mechanisms

14

Overview  Defining DoS and DDoS

  • DoS vs. DDoS
  • DDoS classification

 DDoS Defense Mechanisms

  • Proactive
  • Reactive
  • Rule based
  • Model based

 Future of DDoS defense

  • Software-defined networking (SDN)

 Conclusion

slide-15
SLIDE 15

Exploring DDoS Defense Mechanisms

15

Selective Blackholing [Snijders, 2014]

 Consider the following scenario:

  • A German online shop where 95% of its customers are Germans
  • One day, 95% of all incoming traffic originate from China
  • Wow, my internationalization strategy must really work!?
slide-16
SLIDE 16

Exploring DDoS Defense Mechanisms

16

We don’t want to ship to China!

 Some facts about large Botnets:

  • Most bots are hijacked via automated routines
  • Agents are distributed globally

 How can we provide a service to its main target group?

  • If the incoming packets exceed the servers resources, block all outside the

scope of the main target group.

  • In this example => Block all traffic outside from Germany
slide-17
SLIDE 17

Exploring DDoS Defense Mechanisms

17

How does this work?

Country based filter as proposed by Snijders

slide-18
SLIDE 18

Exploring DDoS Defense Mechanisms

18

Overview  Defining DoS and DDoS

  • DoS vs. DDoS
  • DDoS classification

 DDoS Defense Mechanisms

  • Proactive
  • Reactive
  • Rule based
  • Model based

 Future of DDoS defense

  • Software-defined networking (SDN)

 Conclusion

slide-19
SLIDE 19

Exploring DDoS Defense Mechanisms

19

Statistical Approaches

 Statistical approaches are based on the assumption that DDoS attack

traffic shows anomalies in the entropy and frequency of selected packet attributes.

 For instance, the packets source address distribution:

129.122.23.2 131.87.32.33 87.23.22.111 91.11.111.23

Regular traffic flow:

129.122.23.2 129.122.23.2 129.122.23.2 129.122.23.2

DoS attack:

slide-20
SLIDE 20

Exploring DDoS Defense Mechanisms

20

We have to build a model first

 Incoming packets are classified by a model that represents the default

(legit) state

 Calculate to entropy of consecutive packets  Use the entropy to find the normal source address distribution  Changes in the entropy can give a hint for an attack

slide-21
SLIDE 21

Exploring DDoS Defense Mechanisms

21

Which defense mechanism is the best?

slide-22
SLIDE 22

Exploring DDoS Defense Mechanisms

22

Both have advantages and shortcomings

Rule based + Advantages

  • Low start-up time
  • 100% detection rate for known

attacks (where rules exist)

  • Low false-positive rate
  • Maintenance
  • Scalable

Model based + Advantages

  • Can give protection against Zero-

Day DDoS attacks

  • Abnormal packet streams can be

flagged for further analysis

+ Shortcomings + Shortcomings

  • Works only well if a suitable model

exists

  • Model has to be built first
  • Model has to be constantly

updated

  • Not able to detect Zero-Day or
  • ther kinds of unknown DDoS

attacks

  • Nowadays, attackers attack

different layers concurrently

slide-23
SLIDE 23

Exploring DDoS Defense Mechanisms

23

A combination of multiple techniques is possible

 Rule based:

  • Selective blackholing
  • Good for known attacks
  • Block traffic outside main target group

 Model based:

  • Find suspicious packet stream
  • Detect attacks inside the geographical location of the main target group

 As a result:

  • Bots outside the geographical location of the target user group cannot

attack the service

  • Bots within the location radius of the main target group can attack but,

depending on the number of available bots, are heavily mitigated

slide-24
SLIDE 24

Exploring DDoS Defense Mechanisms

24

Overview  Defining DoS and DDoS

  • DoS vs. DDoS
  • DDoS classification

 DDoS Defense Mechanisms

  • Proactive
  • Reactive
  • Rule based
  • Model based

 Future of DDoS defense

  • Software-defined networking (SDN)

 Conclusion

slide-25
SLIDE 25

Exploring DDoS Defense Mechanisms

25

Whats next?

 Software-Defined Networking (SDN) are (maybe) the next big thing!  Traffic is separated into flows  Central point of knowledge (SDN Controller)  Once a DDoS attack flow is identified, the whole flow can be

blackholed

slide-26
SLIDE 26

Exploring DDoS Defense Mechanisms

26

Overview  Defining DoS and DDoS

  • DoS vs. DDoS
  • DDoS classification

 DDoS Defense Mechanisms

  • Proactive
  • Reactive
  • Rule based
  • Model based

 Future of DDoS defense

  • Software-defined networking (SDN)

 Conclusion

slide-27
SLIDE 27

Exploring DDoS Defense Mechanisms

27

Conclusion

 DDoS mitigation and defense is a game of cat-and-mouse with the bad

guys

 Rule based

  • Selective blackholing

 Model based:

  • Source address distribution

 Model an rule based approaches can be combined  It is hard to test DDoS defense mechanisms in a realistic scenario  DDoS attacks can target different layers

slide-28
SLIDE 28

Exploring DDoS Defense Mechanisms

28

Conclusion

 DDoS mitigation and defense is a game of cat-and-mouse with the bad

guys

 We have seen rule based approaches like selective blackholing and

model based ones like the source address distribution

 Various defense mechanisms can be combined to achieve multiple

lines of defense

 It is hard to test DDoS defense mechanisms in a realistic scenario  There are many different kinds of DDoS attacks which target different

layers

slide-29
SLIDE 29

Exploring DDoS Defense Mechanisms

29

Conclusion

 DDoS mitigation and defense is a game of cat-and-mouse with the bad

guys

 We have seen rule based approaches like selective blackholing and

model based ones like the source address distribution

 Various defense mechanisms can be combined to achieve multiple

lines of defense

 It is hard to test DDoS defense mechanisms in a realistic scenario  There are many different kinds of DDoS attacks which target different

layers