Preventing Denial of Service Attacks

Post on 16-Jan-2016

112 views 0 download

Tags:

description

Preventing Denial of Service Attacks. by N.V.Krishna Rao (08034D0501) Under Supervision and Guidance of Dr. S.Durga Bhavani S.V.S.Hanumantha Rao (Internal Guide) (External Guide). ABSTRACT(MDAF Scheme): - PowerPoint PPT Presentation

Transcript of Preventing Denial of Service Attacks

Preventing Denial of Service Attacks

by

N.V.Krishna Rao (08034D0501)

Under Supervision and Guidance of

Dr. S.Durga Bhavani S.V.S.Hanumantha Rao

(Internal Guide) (External Guide)

ABSTRACT(MDAF Scheme):

This Project proposes a scheme for detecting and preventing the most harmful and difficult to detect DoS Attacks those that use IP address spoofing to disguise the attack flow. The scheme allows the system to configure itself based on the normal traffic of a Web server, so that the occurrence of an attack can be quickly and precisely detected. The MDAF scheme scans the marking field of all incoming packets to selectively filter-out the attack packets.

On employing this marking scheme, when a packet arrives at its destination, its marking depends only on the path it has traversed. If the source IP address of a packet is spoofed, this packet must have a marking that is different from that of a genuine packet coming from the same address. The spoofed packets can thus be easily identified and dropped by the filter, while the legitimate packets containing the correct markings are accepted.

Approaches for Defending DoS Attacks

Preventive Source Tracking Reactive Defense SolutionsProactive Server - Packet Marking Schemes Path Identifier scheme (Pi) Roaming Scheme Probabilistic Packet Marking(PPM) Pushback method

Deterministic Marking Approach(DPM) D-WARD Message Traceback Method Packet Score Logging Neighbor Stranger- Traffic Observation Method Discrimination (NSD)

Existing System:

Proposed System:

• Distinguishing the Attack Packets

• Learning Phase

• Filtering Phase

• Marking Verification

• Attack Detection

• Complete Filtering Scheme

• Route Change Consideration

• Pushback Implementation

• Distinguishing the Attack Packets • Marking Scheme:

Marking algorithm:k <- a 16-bit random number,

secretly maintained by the Router M(R) <- k XOR h(A) For each packet w { If W.ID = 0 Then w.ID <- M(R) Else { M_old <- w.ID M_new <- M(R) XOR SL(M_old) w.ID <- M_new } }

• Learning Phase The (IP-address, Marking) pairs are stored in a Filter Table, which are later used to verify each incoming packet and filter-out the spoofed ones.

• Filtering Phase To the packet from an IP address recorded in the Filter Table, it is

accepted if it has a consistent marking otherwise, it is dropped . For the packet from a new IP address, scheme accept it with probability p and put the (IP-address, Marking) pair to a Check List, so that the marking can be verified.

• Marking Verification If there is a consistent marking from unknown IP address till the

threshold value then the (IP-address, Marking) from check table is moved to Filter table.

• Attack Detection A counter known as TMC is maintained by server, it is incremented

each time packets with incorrect markings as well as packets from unknown source addresses that are not recorded if counter reaches the threshold value then attack is signaled.

• Complete Filtering Scheme:

1)If the (IP-address, Marking) pair is same with one of the records in the Filter Table, the packet is received.2) If the source IP address of the packet exists in theFilter Table, but the marking does not match, this packet is considered to be a spoofed packet and is dropped. TMC is incremented.3) If the source IP address does not appear in the Filter Table, then this packet is accepted with a probability p. TMC is incremented.4) If the TMC value exceeds the threshold, an attack is signaled.5) All echo reply messages that are received as responses to the firewall’s requests are handled by the Check List verification process. They are not passed through the filter.

• Pushback Implementation

In the Pushback method, the victim of a DoS attack sends the signatures of attack to upstream routers and ask them to help filtering out these packets.

• Route Change Consideration

SMC, to count the number of mismatching packets for any IP address A. When the value of SMCA reaches a threshold value, the entry (A, MarkingA) is copied to the Check List to test whether the route from this source has changed.

• Software Requirements:

WINDOWS/LINUX OSJ2SE 5.0MS ACCESS

• Hardware requirements:

Intel Pentium based Micro-Processor with a minimum speed of500MHz or higher

Ram memory of 256MB or higherNetwork Interface Card(NIC)

Use Case diagram

Class Diagram

Sequential diagramclient node Router server

1: sends

2: marks

3: sends

4: verifies

5: response

6: spoofs

7: sends

8: marks

9: sends

10: verifies

collaboration

client

node

Router

server

4: verifies10: verifies

2: marks8: marks

6: spoofs

5: response

1: sends

7: sends

3: sends9: sends

Scheme Topology for packet flow

Scheme Topology for packet flow in Route change consideration.

The Screens of this Project is illustrated using following tasks.

1. In Learning Phase adding the new client1 to the marking table

2. In Filtering phase handling the new client2 with verification process using check table.

3. Preventing the Attacker performing Spoofed attack with the client2’s ip address.

4. Preventing the Attacker performing Randomized attack.

5. Preventing the Attacker performing Flood attack.

6. Illustrating the attack signal and processing only legitimate user packets.

7. Showing the decrease in probability of acceptance of packets from new IP address.

8. Route change considerations of Client1 using smc table and path marking.

16/42

Learning Phase: Client 1 sending packet.

• Learning Phase: Client1 window showing the Data transmission from Client1 to router1.

Learning Phase: Router1 window showing the marking value and the details of Data Transmission to Router6.

Learning Phase: Router6 window showing the marking value and the details of Data Transmission to server

Learning Phase: Server window showing the packet acceptance details, packet details and authentication.

Learning Phase: Client 1 window showing input data and the server response message with the authentication message.

Learning Phase: Mark table reflecting the addition of Client 1 IPaddress and marking

Learning Phase: Login table showing the Client 1 authentication details

Filtering Phase: Client2 window showing sending a packet.

Filtering Phase: Client2 window showing echo message responses and adding of record to mark & login tables after the verification process in filtering phase.

Server window showing the Client 2 packet details, adding to Checklist and sending the echo packets in verification process in filtering phase.

Filtering Phase: Server window showing the Client 2 packet details, echo packets and adding record to Mark table and login table after verification process

Check table with the Client 2 path marking in Filtering Phase – verification process

Mark table reflecting the addition of Client 2 path marking in filtering phase.

Attacker window showing the Spoofing the Client2’s IP address and sending data packets (Spoofed Attack).

Router6 window showing the details of sending the spoofed data packet to Server and showing the marking value (37992) which is different from the actual value (41184).

.

Server window showing the spoofed details which has the different marking value than the actual marking value stored in the mark table for the IP address and packet details

Attacker window performing the Randomized Attack.

Server window showing packet details in Filtering phase - verification process, the IP address accepted and stored in checklist for the verification.

Server window showing the deletion of the record from Check list

Mark table showing the Fake IP address with special symbol (null) so that it can filter all the packets coming from IP address

Attacker window performing the Flood Attack.

Mark table showing the Fake IP address with special symbol (null) so that it can filter all the packets coming from IP address.

Attacker window showing the flood packets transmission

Server window showing the Attack Signal

Server window showing Push back method implementation

Router6 implementing the packet filtration after push back method implementation.

Client2 (legitimate user) window showing data packets authentication and acceptance of the packet after pushback method implementation

Router6 Forwarding only the legitimate user packers after push back implementation.

Server window showing the processing only legitimate user packets after push back method implementation.

Attacker performing Randomized attack

Router6 Forwarding only legitimate user packers and filtering the fake IP address packets.

Server window showing the processing only legitimate user packets after push back method implementation.

Client3 window showing the details of Data Transmission.

Router6 showing the filtration of the packet after push back method implementation

Server processing only legitimate user packets after push back implementation.

Client1 window showing the details of sending data packet through router5 instead of Router1.

Route change consideration: Router5 window showing the details of Data Transmission to Router6 and marking value.

Route change consideration: Server window showing the denial of packet due to the difference in the marking value that is recorded in mark table for this IP address

Route change consideration: SMC table reflecting the addition of Client 1 path marking with IP address and count.

Route change consideration: Check table reflecting the Client1 new path marking and its count in verification process

Route change consideration: Mark table reflecting the Updating of Client 1 path marking (38112 to 38768).

Route change consideration: Client1 window showing the updating of record in Mark table.

conclusion

• The MDAF scheme can distinguish the attack packets (containing spoofed source addresses) from the packets sent by legitimate users, and thus filters out most of the attack packets before they reach the victim.

• On employing this marking scheme, when a packet arrives at its destination, its marking depends only on the path it has traversed. If the source IP address of a packet is spoofed, this packet must have a marking that is different from that of a genuine packet coming from the same address. The spoofed packets can thus be easily identified and dropped by the filter, while the legitimate packets containing the correct markings are accepted.

FUTURE ENHANCEMENTS

In Future following enhancements can be done:

• Making the packet marking more effective.

• Router Intelligent systems can be implemented to identify the Route changes.

• This scheme can be implemented with Web Servers.

BIBLIOGRAPHY[1] Deital & Deital , Java How To Program, PHI, Sixth Edition,2005. [2] Grady Booch, Unified Modelling Language user guide, Addison Wesley, Second Edition, 2005. [3] Herbert Schieldt , Java2 The Complete Reference, Tata McGrawHill, Seventh Edition, 2006. [4] Elliotte Rusty Harold, Java Network Programming, O’Reilly&Associates,

SecondEdition, 2005.[5] Roger Pressman, Software Engineering,McGraw Hill,Sixth Edition,2005.[6] William Stallings, Network Security Essentials (Applications and Standards),

Pearson Education, First Edition, 2006.[7] www.en.wikipedia.org/wiki/Ipspoofing.[8] www.securityfocus.com/infocus/1674[9] www.sun.com[10] Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb El Saddik, and Amiya

Nayak,“Detecting and Preventing IP spoofed Distributed DoS Attacks” , International Journal of Network Security, Vol.7, No.1, PP.70-81, July2008.