sonia fahmy, roman chertov, ness b. shroff, and a group of m.s. students

17
1 Sonia Fahmy, Sonia Fahmy, Roman Chertov, Ness B. Roman Chertov, Ness B. Shroff, and a group of M.S. students Shroff, and a group of M.S. students Center for Education and Research in Information Center for Education and Research in Information Assurance and Security (CERIAS) Assurance and Security (CERIAS) and Department of Computer Science and Department of Computer Science Purdue University Purdue University http:// www.cs.purdue.edu/~fahmy/software/emist / February 1 February 1 st st , 2006 , 2006 Experiments with DETER, Experiments with DETER, Emulab, WAIL, and ns-2: A Emulab, WAIL, and ns-2: A case study with TCP- case study with TCP- targeted DoS attacks targeted DoS attacks + Topology generation + Topology generation tools tools

Upload: donat

Post on 12-Feb-2016

48 views

Category:

Documents


0 download

DESCRIPTION

Sonia Fahmy, Roman Chertov, Ness B. Shroff, and a group of M.S. students Center for Education and Research in Information Assurance and Security (CERIAS) and Department of Computer Science Purdue University http://www.cs.purdue.edu/~fahmy/software/emist/ February 1 st , 2006. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

1

Sonia Fahmy, Sonia Fahmy, Roman Chertov, Ness B. Shroff, and a group Roman Chertov, Ness B. Shroff, and a group of M.S. studentsof M.S. students

Center for Education and Research in Information Center for Education and Research in Information Assurance and Security (CERIAS) Assurance and Security (CERIAS)

and Department of Computer Scienceand Department of Computer SciencePurdue UniversityPurdue University

http://www.cs.purdue.edu/~fahmy/software/emist/February 1February 1stst, 2006, 2006

Experiments with DETER, Emulab, Experiments with DETER, Emulab, WAIL, and ns-2: A case study with WAIL, and ns-2: A case study with

TCP-targeted DoS attacksTCP-targeted DoS attacks+ Topology generation tools+ Topology generation tools

Page 2: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

2

Emulation High fidelity/scalability is a key tradeoff

Simulators cannot execute real applications/system software, and only approximate various appliances.

Emulation provides a convenient way to use real appliances and systems, but is constrained by the number of nodes, types of appliances, and difficulty in configuration/management/reproducibility.

When to use each? How to compare and interpret results? One goal of DETER/EMIST is to develop rigorous testing

methodologies, tools, and benchmarks for important classes of Internet attacks and defenses. It is crucial to understand the effectiveness of defense

mechanisms on realistic networks. Results obtained on testbeds can be used to develop

more accurate analytical, simulation, and emulation models.

Refs: Kohler and Floyd, … others.

Page 3: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

3

Tools

• Large scale experiments on an emulation testbed require (i) topology generation, (ii) extensive router configuration, (iii) automated node control with synchronization, and (iv) support sensitivity analysis.

• Hence, it is important to create an infrastructure for fast experiment creation and automation, including complex BGP/OSPF scenarios.

Page 4: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

4

Topology/Routing Tools• Many sources for AS-level topologies, e.g., RouteViews• RocketFuel/traceroute provide router-level topologies.

For intra-domain links, RocketFuel provides inferred OSPF weights

• However, no BGP policies; we infer/assign some of them by L. Gao’s inference algorithms

OR:OR:• Create a topology with a topology generator, e.g., GT-

ITM• Assign ASes to router nodes• Configure all border and non-border routers

• Working on RocketFuel, policy inference, testing, documentation

Page 5: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

5

Other Available Tools• Can be found at

http://www.cs.purdue.edu/~fahmy/software/emist/• Scriptable Event System (SES):

• Allows using a script to repeat experiments while changing parameters

• As tasks can take arbitrary time to complete, an event completion callback is required

• Software link monitor• Ref: EMIST/ISI technical notes

• Measurement and data integration tools, and other useful scripts. The data can also be displayed by ESVT upon experiment completion, allowing easy graphical examination

Page 6: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

6

TCP-Targeted Attacks Why? Easy to launch, stealthy, and potentially damaging attack

A. Kuzmanovic and E. W. Knightly. Low-rate targeted denial of service attacks. SIGCOMM 2003.

H. Sun et al. Defending against low-rate TCP attacks: Dynamic detection and protection. ICNP 2004.

M. Guirguis et al. Exploiting the transients of adaptation for RoQ attacks on Internet resources. ICNP 2004.

Studied only via simulation and limited experiments Tricky as it strongly relies on timing (phase effects) Vary: Attacker, burst length l, sleep period T-l, pkt size, RTT, bfr size Objective:

Understand attack effectiveness (damage versus effort) Qualitatively compare emulation to simulation to analysis

T-l

ll

Time

Rate

R

Page 7: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

7

Experimental Scenario• Original TCP-targeted attacks are tuned to RTO frequency

for near zero throughput• Can exploit Additive Increase Multiplicative Decrease

congestion avoidance of TCP without tuning period to RTO, and hence throttle TCP’s throughput at any predetermined level

• Simple dumbbell topology with single file transfer flow is easiest to interpret and is the worst case (most demanding for attacker)

Page 8: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

8

Experimental Setup

• Data from DETER, Emulab, WAIL, and ns-2 is compared to a simple throughput degradation analytical model

• Besides using default OS routing, routing nodes on DETER were configured with the Click modular software router [Kohler et al., ACM TOCS 2000]

Page 9: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

9

• Loss occurs during each pulse.

• Connection does not RTO.

• There is no packet loss during attack sleep periods.

Throughput Degradation

is the Cwnd growth during a sleep period

time between two loss events

Page 10: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

10

Analysis vs. Simulation

• Simulation results are closest to the analysis when the attack pulse length is equal to the flow RTT.

• Non-monotonic increase amplified by phase effects.• Adding randomization helps.

Page 11: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

11

Forward Direction

Analysis corresponds to ns-2 results when attack pulse length is greater or equal to TCP flow RTT and when buffer sizes are not too large DETER is not as affected by the attack: Why? Bus, NIC, software, settings?Experiments with WAIL show that PC routers outperform Cisco 3600s dep. on settings (consistent with results reported by several companies).Such differences are important as they allow us to identify real vulnerabilities and fundamental limits. The Internet is an evolving, heterogeneous entity with implementation errors and resource constraints, and not an approximation in a simulator

Page 12: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

12

Reverse Direction

Since ns-2 does not model CPU/bus/devices, and opposing flows do not interfere; data for ns-2 is not shown for reverse direction (Cwnd has no cuts)

Page 13: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

13

Router Nodes To avoid slowdown in the Linux kernel, the

machine can be configured to run SMP enabled Click modular router with polling drivers.

• Polling reduces CPU overhead by reducing interrupts.

• Bypassing the Linux protocol stack speeds up packet processing.

• It is important to carefully select and configure delay nodes to ensure no drops.

It is important to configure network device buffers in addition to Click buffers, since default values are unreliable.

Page 14: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

14

Results with Click

• The results indicate that device buffer size variation has a higher impact on the final results than Click buffers.

• It is important to understand device drivers so that accurate comparisons with real routers can be made.

• Differences between different routers need to be modeled!

Page 15: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

15

Challenges with WAIL

• Original topologies give access to 2 ports of each router; new topologies were created for us

• Heterogeneity of link speeds; cannot repeat identical experiments with different routers

• Configuration/reconfiguration issues• Proprietary architectural details: HOL blocking?• Preliminary results: Interesting differences due to

TCP versus UDP attacker; impact of attack packet size

• Can we use Click and device driver options as well as relative node capabilities to quickly and approximately emulate DDoS scenarios with popular routers on the Internet today, e.g., Cisco 3600s, 7000s, 12000s, Junipers, … etc?

Page 16: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

16

Summary of Results• An attack pulse length of one RTT is the most effective

while still being stealthy.• Large queue sizes can effectively dampen the attack when

the TCP flow has not reached its full transfer rate.• Results are sensitive to attack and scenario parameters• Differences between DETER, WAIL, and Emulab testbed

results with similar configurations and identical scripts are attributed to differences in the underlying hardware and system software, especially NICs, device drivers, and buses.

• Click experiments demonstrate the importance of device driver settings.

Page 17: Sonia Fahmy,  Roman Chertov, Ness B. Shroff, and a group of M.S. students

17

Ongoing/Planned Work

• Measurement-driven models of routers for higher fidelity

• RocketFuel/RouteViews/policy/tracerouteDETER tools

• GT-ITMDETER tools with link virtualization• What is the relationship between topology, routing,

and attacks?• More benchmarks; synergies with other projects• Methodology document, especially regarding (i)

fidelity and (ii) topology generation• New recorded demos for topology/routing tools