22
Subnet Flooding Detection and DDoS Defenses Angela Cearns Lan Nguyen Mounika Namburu 1

Lan Nguyen Mounika Namburu 1. DDoS Defense Research A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

1

Subnet Flooding Detection and DDoS Defenses

Angela Cearns

Lan NguyenMounika Namburu

Page 2: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

2

DDoS Defense Research A2D2 Design

◦ Subnet Flooding Detection using Snort◦ Class -Based Queuing ◦ Multi-level Rate Limiting

A2D2 Implementation Test-bed A2D2 Test-bed Performance Results Future Works Conclusion

Overview

Page 3: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

3

DDoS Defense Research3 main research areas: Intrusion Prevention

• General security policy• Ingress & Egress filtering

Intrusion Detection• Anomaly Detection• Misuse Detection

Intrusion Response• Source Identification

Intrusion Tolerance◦ Fault Tolerance◦ Quality of Service (QoS)

Intrusion Tolerant QoS Techniques Rate Limiting Class-Based Queuing

(CBQ) Intrusion Tolerant QoS

Systems XenoService Pushback Mechanisms Cooperative Intrusion

Traceback and Response Architecture (CITRA)

Page 4: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

4

Intrusion Tolerance Techniques◦ Not autonomous◦ Time-consuming◦ Require knowledgeable staff

Intrusion Tolerance Systems◦ Expensive◦ Worldwide agreements◦ Extensive Collaboration

Intrusion ToleranceResearch Limitations

Page 5: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

5

Autonomous Anti-DDoS Network (A2D2)◦ A2D2 Target Audience

Home network, small to medium sized networks◦ Design Principles

Affordable Manageable Configurable Portable

◦ Design of A2D2 is divided into 3 main areas:1. Intrusion Detection – Snort (slides 6-10)2. Intrusion Response (slides 11-13) 3. Autonomy System (slide 14)

A2D2 Design

Research-Oriented

Page 6: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

6

Snort is the only free, open source lightweight IDS and is selected to be the detection component of A2D2

Snort can be operated in 3 modes:• a straight packet sniffer similar to tcpdump• a packet logger• a full-blown network intrusion detection system

As an IDS, Snort performs real-time protocol analysis, content searching and matching, and real-time alert

A2D2 IDS Snort Overview

IDS

Detection Engine(Rule Based)

Preprocessor(Perform logic)

Attack detection is mainly based on a signature recognition detection engine as well as a modular plugin architecture for more sophisticated behavior analysis.

Page 7: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

7

Flood threshold Flood preprocessor Initiation Flood preprocessor Data structure Subnet flood detection Flood preprocessor logic flow

A2D2 Snort Flood Preprocessor

Page 8: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

8

Subnet Flood Detection DDoS attack agent sends

attack packets with an array of randomly generated source addresses, all of them within the subnet of the attack agent

Each spoofed address is used in a limited number of packets to reduce suspicion

Page 9: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

9

A2D2 is designed to detect 3 types of generic flooding:• Individual attack host against individual victim host• Subnet attack agents against individual victim host• Subnet attack agents against victim subnet hosts

A2D2 assumes a /24 subnet flood detection A2D2 also assumes many networks implement ingress and

egress filtering

Subnet Flood Detection (cont.)

Page 10: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

10

Additional Features

◦FloodIgnoreHosts Preprocessor

◦FloodRateLimiter Preprocessor

A2D2 IDS Snort Flood Preprocessor

Page 11: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

11

Intrusion Response◦ Security policy◦ Class Based Queuing◦ Multi-level Rate Limiting

A2D2 Design (cont.)

Page 12: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

12

CBQ supports a maximum of 8 separate queues, or classes

Class-Based Queuing

70% HTTP / HTTPS

20% SMTP / POP3

5% NNTP

5% ICMP / TCP-SYN

Page 13: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

13

Multi-Level Rate-Limiting

Page 14: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

14

Autonomy System◦ Rate Limiting Configuration & Expiration: config file (defines basic

parameters based on which Rate Limiting can be automatically applied)

◦ Snort Customization – FloodRateLimiter Preprocessor (Keeps track of incoming packet rate from a “presumed” attack source. If arrival

rate continues to reach the max allowable rate, send message to firewall , apply stricter rate limiting until block level is reached)

◦ Alert Interface (Snort sends alert messages to UNIX socket. Alert message is parsed for attack host’s source IP address which Multi-level Rate Limiting is then applied to)

A2D2 Design (cont.)

Page 15: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

15

Attack

Attack Attack

Private Subnet192.168.0

Attack Network128.198.61

IP: 128.198.61.12NM: 255.255.255.128

GW: 128.198.61.1

eth0

Pluto

Titan

DMZ

Multi-LevelRate Limiting

Class-BasedQueuing(CBQ)

as Linux Router

Firewall(iptables)

Security Policy

IP: 192.168.0.1NM: 255.255.0.0

GW: 128.198.61.12

eth1

RealServer

Re

alS

erv

er

Tra

ffic

IDS

Ale

rts

tr

igg

er

Mu

lti-L

eve

lR

ate

-Lim

itin

g

IDS

70

% H

TT

P,

Re

alP

laye

r

1

5%

SM

TP

, P

OP

3

1

0%

SS

H,

SF

TP

5

% S

YN

, IC

MP

, D

NS

10 Mbps Hub

eth0

IP: 192.168.0.2NM: 255.255.0.0GW: 192.168.0.1

Public Network128.198

Internet

Alpha128.198.61.15

DDoSAgent

Gamma128.198.61.17

DDoSAgent

Beta128.198.61.16

DDoSAgent

Delta128.198.61.18

DDoSAgent

SimulatedInternet

100Mpbs Switch

Master Client& Handler

DDoS

Saturn128.198.61.11

NM: 255.255.255.128GW: 128.198.61.1

Autonomous Anti-DDoS Network(A2D2)

Client1128.198.a.195

Real Player Client

Client2128.198.b.82

Real Player Client

Client3128.198.c.31

Real Player Client

100Mpbs Switch

A2D2 Implementation Test-bed

Page 16: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

16

Attack Tool StacheldrahtV4

• stable, sophisticated, & able to launch attacks in ICMP, UDP and TCP protocols

• can be downloaded from internet for free Client Bandwidth Measurement Tools

plot.pl--->written and installed in Linux clients to capture bandwidth usage information

Drawing Tool--->gnuplot version 3.7.1

A2D2 Implementation Tools

Page 17: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

17

A2D2 Test Results

Baseline Short 1-minute attack with no mitigation strategy

Non-stop attack with no mitigation strategy Non-stop UDP attack with security policy

Page 18: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

18

A2D2 Test Results(cont.)

Non-stop ICMP attack with security policy Non-stop ICMP attack with security policy & CBQ

Non-stop TCP-SYN attack with security policy & CBQ

Non-stop TCP-SYN attack with security policy, CBQ, & autonomous multi-level rate-limiting

Page 19: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

19

TCP – SYN Attack Firewall Processing Speed Alternate Routing Scalability Anomaly Detection Fault Tolerant

Future Works

Page 20: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

20

Intrusion Tolerance A2D2 effectively combines firewall policy, CBQ,

multi-level rate-limiting and DDoS flood detection in an autonomous architecture

A2D2 Clients Enjoy QoS during Various Types of Attack

Conclusion

Page 21: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

21

http://www.cs.uccs.edu/~gsc/pub/master/acearns/doc http://www.cs.uccs.edu/~gsc/pub/master/acearns/src David Moore, Geoffrey M. Voelker and Stefan Savage.

Inferring Internet Denial-of-Service Activity. 2001 http://www.cs.ucsd.edu/~savage/papers/UsenixSec01.pdf.

ITWorld.com. CERT hit by DDoS attack for a third day. May 24, 2001. http://www.itworld.com/Sec/3834/IDG010524CERT2/

Steve Bellovin, Marcus Leech, and Tom Taylor. ICMP Traceback Messages. Internet Draft: draft-ieft-itrace-01.txt. Expires April 2002

References

Page 22: Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate

22

Questions?