NetFence: Preventing Internet Denial of Service from Inside Out
Xiaowei Yang (Duke University) with Xin Liu (Duke University) Yong Xia (NEC Labs China) Sigcomm 2010 Delhi, India
NetFence: Preventing Internet Denial of Service from Inside Out - - PowerPoint PPT Presentation
NetFence: Preventing Internet Denial of Service from Inside Out Xiaowei Yang (Duke University) with Xin Liu (Duke University) Yong Xia (NEC Labs China) Sigcomm 2010 Delhi, India DoS is a Formidable Threat Distributed attacks: many
Xiaowei Yang (Duke University) with Xin Liu (Duke University) Yong Xia (NEC Labs China) Sigcomm 2010 Delhi, India
Offense, FastPass, Flow-Cookies, Kill-a-Bot, LazySusan, Mayday, OverDoSe, PacketSymmetry, Phalanx, Pushback, Portcullis, SIFF, SOS, SpeakUp, StopIt, TVA…
– Enable receivers to suppress unwanted traffic – Network filters, network capabilities
A
Offense, FastPass, Flow-Cookies, Kill-a-Bot, LazySusan, Mayday, OverDoSe, PacketSymmetry, Phalanx, Pushback, Portcullis, SIFF, SOS, SpeakUp, StopIt, TVA…
– Enable receivers to suppress unwanted traffic – Network filters, network capabilities
A
Filter (A,V)
Offense, FastPass, Flow-Cookies, Kill-a-Bot, LazySusan, Mayday, OverDoSe, PacketSymmetry, Phalanx, Pushback, Portcullis, SIFF, SOS, SpeakUp, StopIt, TVA…
– Enable receivers to suppress unwanted traffic – Network filters, network capabilities
A
Filter (A,V)
Offense, FastPass, Flow-Cookies, Kill-a-Bot, LazySusan, Mayday, OverDoSe, PacketSymmetry, Phalanx, Pushback, Portcullis, SIFF, SOS, SpeakUp, StopIt, TVA…
– Enable receivers to suppress unwanted traffic – Network filters, network capabilities
A
Filter (A,V)
Victim Denial of Edge Service (DoES)
Victim Denial of Edge Service (DoES)
Victim Denial of Edge Service (DoES) Denial of Network Service (DoNS)
Victim Denial of Edge Service (DoES)
Denial of Network Service (DoNS)
ASx ASy
ASx ASy
ASx ASy
ASx ASy
x x y y y
AS Accountability
ASx ASy
x x y y y
AS Accountability
ASx ASy
x x y y y
ASx ASy
x x y y y
ASx ASy
x x y y y
ASx ASy
x x y y y
ASx ASy
x x y y y
– All traffic – Signal congestion to access router – L link, act, mon mode – = MAC (src, dst, ts, L, mon, , ) – No downstream overwrite
– All traffic – Signal congestion to access router – L link, act, mon mode – = MAC (src, dst, ts, L, mon, , ) – No downstream overwrite
– All traffic – Signal congestion to access router – L link, act, mon mode – = MAC (src, dst, ts, L, mon, , ) – No downstream overwrite
– All traffic – Signal congestion to access router – L link, act, mon mode – = MAC (src, dst, ts, L, mon, , ) – No downstream overwrite
– All traffic – Signal congestion to access router – L link, act, mon mode – = MAC (src, dst, ts, L, mon, , ) – No downstream overwrite
– All traffic – Signal congestion to access router – L link, act, mon mode – = MAC (src, dst, ts, L, mon, , ) – No downstream overwrite
– All traffic – Signal congestion to access router – L link, act, mon mode – = MAC (src, dst, ts, L, mon, , ) – No downstream overwrite
– All traffic – Signal congestion to access router – L link, act, mon mode – = MAC (src, dst, ts, L, mon, , ) – No downstream overwrite
(src, L)
(src, L)
(src, L)
(src, L)
(src, L)
(AIMD, TCP-like) for fairness and efficiency (src, L)
(AIMD, TCP-like) for fairness and efficiency (src, L)
(AIMD, TCP-like) for fairness and efficiency (src, L)
(AIMD, TCP-like) for fairness and efficiency (src, L)
(AIMD, TCP-like) for fairness and efficiency (src, L)
1
g
1
g
1
g
– Flood request packets (with no feedback) – Hide L – Evade attack detection – On/Off – …
– Low overhead – Gradual deployment – Incentive-compatible adoption
– Flood request packets (with no feedback) – Hide L – Evade attack detection – On/Off – …
– Low overhead – Gradual deployment – Incentive-compatible adoption
k
k
1
k
k
1
k
k
1
k
k-1
k
1
k
k-1
k
1
k
k-1
Bottleneck Router t1 t2 t2 + 2 Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl Access Router te te+ Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl Access Router te te+ Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl Access Router te te+ Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl Access Router te te+ Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl Access Router te te+ Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl Access Router te te+ Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl Access Router te te+ Ictrl
Bottleneck Router t1 t2 t2 + 2 Ictrl Access Router te te+ Ictrl
546 ns/pkt Regular 781 ns/pkt
Request 546 ns/pkt 492 ns/pkt Regular 1267 ns/pkt 554 ns/pkt
546 ns/pkt Regular 781 ns/pkt
Request 546 ns/pkt 492 ns/pkt Regular 1267 ns/pkt 554 ns/pkt
546 ns/pkt Regular 781 ns/pkt
Request 546 ns/pkt 492 ns/pkt Regular 1267 ns/pkt 554 ns/pkt
One AES computation Tput ~ 2mpps
546 ns/pkt Regular 781 ns/pkt
Request 546 ns/pkt 492 ns/pkt Regular 1267 ns/pkt 554 ns/pkt
One AES computation Tput ~ 2mpps
546 ns/pkt Regular 781 ns/pkt
Request 546 ns/pkt 492 ns/pkt Regular 1267 ns/pkt 554 ns/pkt
One AES computation Tput ~ 2mpps ≤ 3AES computation. Parallelizable
546 ns/pkt Regular 781 ns/pkt
Request 546 ns/pkt 492 ns/pkt Regular 1267 ns/pkt 554 ns/pkt
One AES computation Tput ~ 2mpps ≤ 3AES computation. Parallelizable
546 ns/pkt Regular 781 ns/pkt
Request 546 ns/pkt 492 ns/pkt Regular 1267 ns/pkt 554 ns/pkt
AS1 AS2
… … … AS10 10Gbps Victim
AS1 AS2
… … … AS10 10Gbps AS20 AS12 AS11
2 2
i i
2 2
i i
Victim (DoES) (DoNS)