optimal allocation of filters against ddos attacks

74
Optimal Allocation of Filters against DDoS Attacks Advisor: Frank, Y.S. Lin Present by C.Y. Hsu 1

Upload: hanzila

Post on 08-Feb-2016

44 views

Category:

Documents


0 download

DESCRIPTION

Optimal Allocation of Filters against DDoS Attacks. Advisor: Frank, Y.S. Lin Present by C.Y. Hsu. Optimal Allocation of Filters against DDoS Attacks. Author: El Defrawy , K.; Markopoulou , A.; Argyraki , K. Univ. of California, Irvine - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Optimal Allocation of Filters against  DDoS  Attacks

Optimal Allocation of Filters against DDoS Attacks

Advisor: Frank, Y.S. Lin

Present by C.Y. Hsu

1

Page 2: Optimal Allocation of Filters against  DDoS  Attacks

Optimal Allocation of Filters against DDoS Attacks Author:

El Defrawy, K.; Markopoulou, A.; Argyraki, K. Univ. of California, Irvine

Source: Information Theory and Applications Workshop, 2007

2

Page 3: Optimal Allocation of Filters against  DDoS  Attacks

Agenda Introduction Formulation of Optimal Allocation of Filters

General Discussion Single-Tier Filter Allocation Two-Tier Filter Allocation

Simulations Conclusion

3

Page 4: Optimal Allocation of Filters against  DDoS  Attacks

Agenda Introduction Formulation of Optimal Allocation of Filters

General Discussion Single-Tier Filter Allocation Two-Tier Filter Allocation

Simulations Conclusion

4

Page 5: Optimal Allocation of Filters against  DDoS  Attacks

Introduction

5

DDoS attacks are one of the most severe and hard to solve problems on the Internet today.

They can result in severe financial loss or in a political or reputation cost.

Several approaches and mechanisms have been proposed to deal with DDoS attacks.

This work focuses on filtering mechanisms, which are a necessary component in the anti-DDoS solution.

Page 6: Optimal Allocation of Filters against  DDoS  Attacks

Introduction(Cont.)

6

DDoS attacks may focus on network bandwidth.

Or may focus on processing power of the victims (not considered in this paper).

A flooding attack is very easy to launch as it only requires sending a certain amount of traffic that overwhelms the link connecting the victim to the Internet.

Page 7: Optimal Allocation of Filters against  DDoS  Attacks

Introduction(Cont.)

7

This work considers the scenario of a bandwidth flooding attack, during which the bottleneck link to the victim is flooded with undesired traffic.

To defend against such an attack, the victim must identify undesired traffic (using some identification mechanism which is not the focus of this work).

And request from its ISP/gateway to block it before it enters the victim's access link and causes damage to legitimate traffic.

Page 8: Optimal Allocation of Filters against  DDoS  Attacks

Introduction(Cont.)

8

The number of attack sources in DDoS attacks is much larger than the number of filters at the routers.

The victim cannot afford to block every attack source, but instead may have to block entire domains.

Blocking domains will result in filtering legitimate traffic from the same domain.

Page 9: Optimal Allocation of Filters against  DDoS  Attacks

Introduction(Cont.)

9

This paper considers a single router with a limited number of available filters.

The goal is to optimally allocate filters to attack sources, or domains of attack sources.

So as to maximize the amount of good traffic preserved, under a constraint on the number of filters.

Page 10: Optimal Allocation of Filters against  DDoS  Attacks

Introduction(Cont.)

10

An example of flooding attack is shown:

Page 11: Optimal Allocation of Filters against  DDoS  Attacks

Agenda Introduction Formulation of Optimal Allocation of Filters

General Discussion Single-Tier Filter Allocation Two-Tier Filter Allocation

Simulations Conclusion

11

Page 12: Optimal Allocation of Filters against  DDoS  Attacks

General Discussion

12

In principle, one might consider allocating filters at any level of the attack graph.

There is clearly a trade-off between filtering granularity (to maximize goodput) and the number of filters.

If there were no constraints on the number of filters, the maximum throughput of good traffic (goodput) would be achieved by allocating filters as close to individual attackers as possible.

Page 13: Optimal Allocation of Filters against  DDoS  Attacks

General Discussion(Cont.)

13

But filters are scarce, expensive resources. Each client can typically claim from a few

hundred to a few thousand filters. Not enough to block all the attackers in DDoS

attacks.

Page 14: Optimal Allocation of Filters against  DDoS  Attacks

General Discussion(Cont.)

14

Page 15: Optimal Allocation of Filters against  DDoS  Attacks

General Discussion(Cont.)

15

Lacking of filters, a solution is to aggregate attack sources into a single filter at the gateway.

In practice, there are enough filters available to filter at that granularity.

However, there is also legitimate traffic coming from each domain.

Filtering at the granularity of attack gateway-tier causes "collateral" damage to legitimate traffic.

Page 16: Optimal Allocation of Filters against  DDoS  Attacks

General Discussion(Cont.)

16

Page 17: Optimal Allocation of Filters against  DDoS  Attacks

General Discussion(Cont.)

17

In practice, there are more filters than attack gateways, but less filters than individual attackers.

Filtering at the gateway level is feasible but causes the collateral damage discussed above, due to its coarse granularity.

Filtering at the attacker's level would preserve the maximum possible throughput but it is not realistic (due to the high number of attackers as well as due to spoofing).

But it is still an upper bound for performance.

Page 18: Optimal Allocation of Filters against  DDoS  Attacks

General Discussion(Cont.)

18

A practical and effective compromise between the two extremes can be the two-tier filtering.

In the two-tier filtering, we can choose to filter either at gateways’granularity or at attackers' granularity.

The optimal allocation of filters to individual attack sources, or to entire attack gateways, depends on the characteristics of the attack (distribution and intensity) as well as on the number of available filters.

Page 19: Optimal Allocation of Filters against  DDoS  Attacks

General Discussion(Cont.)

19

Page 20: Optimal Allocation of Filters against  DDoS  Attacks

Agenda Introduction Formulation of Optimal Allocation of Filters

General Discussion Single-Tier Filter Allocation Two-Tier Filter Allocation

Simulations Conclusion

20

Page 21: Optimal Allocation of Filters against  DDoS  Attacks

Single-Tier Filter Allocation

21

Page 22: Optimal Allocation of Filters against  DDoS  Attacks

Single-Tier Filter Allocation(Cont.)

22

There are attacking gateways, each generating both good ( ) and bad ( ) traffic toward the victim.

The total traffic toward the victim exceeds its capacity .

Gateway GW-V allocates filters to block the attack traffic towards V.

There are enough filters to allocate to the gateways.

iG iB

C

N

N

Page 23: Optimal Allocation of Filters against  DDoS  Attacks

Single-Tier Filter Allocation(Cont.)

23

The objective is to allocate filters to limit the total traffic below the available capacity, so as to maximize the amount of legitimate traffic that is getting through to the victim.

Use and to indicate whether we allow or block all traffic from gateway .

1ix 0ixi

Page 24: Optimal Allocation of Filters against  DDoS  Attacks

Single-Tier Filter Allocation(Cont.)

24

The problem of optimal allocation of filters is to choose .

We noticed that the filter allocation problem is essentially a 0-1 knapsack problem.

Niix }{

Page 25: Optimal Allocation of Filters against  DDoS  Attacks

Single-Tier Filter Allocation(Cont.)

25

In the knapsack problem, we choose some among objects, each with profit and a weight , so as to maximize the total profit, subject to a total weight constraint.

In our case, the objects are the attacking nodes with profits and weights and respectively.

And there is a constraint on the victim's bandwidth.

This is well-known to be a computationally hard problem.

N

iv iw

iG ii BG

C

Page 26: Optimal Allocation of Filters against  DDoS  Attacks

Single-Tier Filter Allocation(Cont.)

26

The continuous relaxation of the problem ( is no longer binary, but instead ) can be interpreted as placing rate-limiters.

We allow ratio of the traffic coming from node to get to the victim.

This corresponds to the fractional knapsack problem, which can be solved optimally using a greedy algorithm.

10 ix

ixi

x

Page 27: Optimal Allocation of Filters against  DDoS  Attacks

Single-Tier Filter Allocation(Cont.)

27

This requires steps for sorting. And for filer/rate-limiters allocation.

)log( nnO)(nO

Page 28: Optimal Allocation of Filters against  DDoS  Attacks

Agenda Introduction Formulation of Optimal Allocation of Filters

General Discussion Single-Tier Filter Allocation Two-Tier Filter Allocation

Simulations Conclusion

28

Page 29: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation

29

Page 30: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

30

Consider attack gateways and attack hosts behind attack gateway .

Each attacker contributes both good ( ) and bad traffic ( ), .

depending on whether we allocate a filter to attack host behind gateway .

depending on whether we allocate a filter to attack-gateway .

If , then all traffic originating behind GW-i is blocked, and there is no need to allocate additional filters to attackers

N iMi

ijG

ijB iMjNi ...2,1....2,1 1,0ijx

j i1,0ix

i0ix

iMjji ,...,2,1),,(

Page 31: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

31

The problem is how to choose , given the constraints on the victim's capacity and the available number of filters .

sxi}'{ sxij}'{C

F

Page 32: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

32

The two-tier problem is a variation of the cardinality-constrained knapsack, and the optimal solution cannot be found efficiently.

This paper formulates the problem using dynamic programming and compute its optimal solution as a baseline for comparison.

However, the dynamic programming algorithm is computationally expensive and cannot be used in real time.

Page 33: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

33

Dynamic Programming 範例:

Page 34: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

34

Page 35: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

35

Page 36: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

36

Reformulate the problem. There are gateways. A gateway generates

legitimate traffic , and also attack traffic from attack sources.

Notice that for simplicity we consider that attacker generates only bad traffic .

Instead we consider that the total goodput , comes from different hosts behind gateway .

N n

nG

nM

ij ijB

nGn

Page 37: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

37

Consider that the attack sources are ordered from worst to best: .

Therefore, each gateway generates total traffic .

Before filtering, the total traffic exceeds the victim's access bandwidth .

We are interested in placing filters across the gateways, so as to bring the total traffic below , while maximizing the total goodput after filtering .

),(...)1,( nMnbnb

nM

inn inbGC1

),(

CCN

n n 1

NC

),( FCTN

F

Page 38: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

38

,can be computed recursively. The recursion proceeds considering one more

gateway at a time; the order in which gateways are considered is not important.

),(* FCTN

Page 39: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

39

In step n, we consider gateway n together with the previous gateways {1, 2, ..n-1}.

The f available filters are split among two groups of gateways: {1, 2, ..n-1} and {n}.

x < f filters are assigned to gateway n and the remaining f-x filters are assigned to the previous gateways {1, 2, ..n-1}.

Page 40: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

40

The x filters assigned to gateway n are used to block the x worst attackers.

Therefore, bad traffic is blocked and the remaining traffic goes through, consuming part of the total capacity c.

The remaining f-x filters are optimally assigned to gateways 1,2,...n-1.

x

jjnb

0),(

nM

xj

x

j n jnbGjnbnC10

),(),()(

Page 41: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

41

Recall that we have previously obtained and stored the optimal solutions considering only gateways {1,2,...n-1}, for all c and f.

Then we are able to compute the optimal solution using dynamic programming (DP) because the problem exhibits the optimal substructure property.

),(*1 fcTn

Page 42: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

42

We compared the two-tier with the attack-tier-only and the gateway-tier-only filtering.

Let be the maximum goodput achieved by the optimal placement of f filters across N gateways, considering two-tier placement, single-tier placement at gateways and single attackers respectively.

),(),,(),,( fCAfCGfCT NNN

Page 43: Optimal Allocation of Filters against  DDoS  Attacks

Two-Tier Filter Allocation(Cont.)

43

For the same attack scenario we have:

As ↑, converges to , the optimal solution for attacker's single tier, without a constraint on .

),(),( and ),(),( fCGfCTfCAfCT NNNN

filters. ofnumber on the

constraint a havenot does filteringtier -Single filtering.

attack (single) optimal theis andgateway (single)

for filtering optimal theis where*

***

A

GATG

f T *A

f

Page 44: Optimal Allocation of Filters against  DDoS  Attacks

Agenda Introduction Formulation of Optimal Allocation of Filters

General Discussion Single-Tier Filter Allocation Two-Tier Filter Allocation

Simulations Conclusion

44

Page 45: Optimal Allocation of Filters against  DDoS  Attacks

Simulations

45

Single-Tier Artificially Generated Scenarios Compare optimal filtering to 3 benchmark

policies: Uniform rate limiting Random filtering Max-min rate limiting

Vary the number of attackers and allocate filters to individual attackers (attackers' one tier problem).

We are interested not only in the % of good traffic preserved, but also in the number of filters required.

Page 46: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

46

Page 47: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

47

Page 48: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

48

In above simulations, the number of attackers varies from 1000 to 50000 and we allocate filters to individual attackers.

We can see that optimal filtering clearly outperforms the other policies.

However, the number of filters increases linearly with the number of attackers, which clearly does not scale for a large number of attackers.

Page 49: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

49

To deal with this scalability issue, we solve the one-tier problem at the gateway level.

Consider again an increasing number of attackers (from 1000 to 50000), but this time attackers are evenly spread behind n = 1000 gateways.

And we allocate filters to gateways, not to individual attackers.

Page 50: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

50

Page 51: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

51

Page 52: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

52

Realistic Attack Scenarios Use data from the analysis of two worms, Code-

Red and Slammer to construct realistic attack distributions as in the single-tier section.

Another source of data used for the attack traffic distribution is Zombie Report.

Assume that if a victim is under attack that traffic would come from ten countries.

We consider the ten first countries and assume that they are behind ten different gateways.

Page 53: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

53

Page 54: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

54

Page 55: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

55

Page 56: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

56

We consider a typical victim - a web-server with 10OMbps access link.

Also consider that each country is in a different AS, thus is behind a different gateway.

Then use the number of attack and user sources per gateway above.

Consider that both attackers and legitimate users send at the same rate (32kbps, 64kbps or 128kbps), corresponding to upstream dialup/dsl.

Page 57: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

57

Results for Single-Tier We simulated the Code-Red I scenario, for a

number of legitimate users N from 1000 to 10000 and attackers M from 1000 to 10000.

Compared the amount of good traffic preserved without any filtering and with optimal filtering.

The results are shown in 32Kbps sending rate. (The results for 64kbps and 128kbps show similar trends and are omitted here).

Page 58: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

58

Page 59: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

59

Page 60: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

60

From above we simulated the Code-Red I scenario, and found the improvement achieved was moderate.

This is because all gateways had both good and bad traffic.

If there are gateways that carry only good or bad traffic, then filtering would be able to better separate good from bad traffic and further improve performance.

To demonstrate this, we modify the distributions of good and bad traffic per gateway, as shown in scenario Code Red II.

Page 61: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

61

Page 62: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

62

Page 63: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

63

Results for Tow-Tiers The performance of optimal two-tier filtering are

shown for the Code-Red scenario, Slammer and Zombie scenario respectively.

In all three cases, we increase the number of attackers and we look at how well filtering can handle the increasing attack traffic.

The performance metrics of interest are The % goodput preserved after filtering the number of filters used in the process

As a baseline for comparison, we also show the performance of the optimal single-tier filtering at gateway and attack level.

Page 64: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

64

Page 65: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

65

Page 66: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

66

Page 67: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

67

Page 68: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

68

Page 69: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

69

Page 70: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

70

In all three figures, the optimal solution performs similarly, although they are based on different distributions of good and bad traffic.

As expected, filtering at attackers' level (plain red line) gives the upper bound for the preserved goodput.

One can preserved 100% of the good traffic by filtering out each individual attacker but requires as many filters as the number of attackers, which is impractical.

Page 71: Optimal Allocation of Filters against  DDoS  Attacks

Simulations(Cont.)

71

Filtering at the gateway level (shown in dashed green line) provides a lower bound to the preserved goodput but uses a small number of filters.

Two-tier filtering lies in the middle (blue curves): it provides a graceful degradation of preserved goodput using a small number of filters.

The larger the number of filters available to multi-tier filtering, the closer the preserved goodput to the upper bound.

Page 72: Optimal Allocation of Filters against  DDoS  Attacks

Agenda Introduction Formulation of Optimal Allocation of Filters

General Discussion Single-Tier Filter Allocation Two-Tier Filter Allocation

Simulations Conclusion

72

Page 73: Optimal Allocation of Filters against  DDoS  Attacks

Conclusion

73

This paper formulated the optimal allocation of filters against DDoS attacks.

They formulated the single-tier allocation as a knapsack problem and the two-tier problem using dynamic programming.

And simulated the optimal solution using realistic attack scenarios.

There are several issues to work on: efficient heuristics to achieve near optimal

performance at lower complexity filter allocation under uncertainty in the

identification.

Page 74: Optimal Allocation of Filters against  DDoS  Attacks

Thank you for your listening

74