Low-Rate TCP-Targeted Denial of Service Attacks

34
Low-Rate TCP-Targeted Denial of Service Attacks Presenter: Juncao Li Authors: Aleksandar Kuzmanovic Edward W. Knightly

description

Low-Rate TCP-Targeted Denial of Service Attacks. Authors: Aleksandar Kuzmanovic Edward W. Knightly. Presenter: Juncao Li. Contributions. Present a denial of service attack – Shrew throttle TCP flows to a small fraction Show the mechanism of Shrew attacks - PowerPoint PPT Presentation

Transcript of Low-Rate TCP-Targeted Denial of Service Attacks

Page 1: Low-Rate TCP-Targeted Denial of Service Attacks

Low-Rate TCP-Targeted Denial of Service Attacks

Presenter: Juncao Li

Authors: Aleksandar Kuzmanovic Edward W. Knightly

Page 2: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 2 [email protected]

Contributions

• Present a denial of service attack – Shrew– throttle TCP flows to a small fraction

• Show the mechanism of Shrew attacks– Exploit TCP’s retransmission timeout

mechanism

• Develop several DoS traffic patterns for attacking

Page 3: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 3 [email protected]

Agenda

• TCP Congestion Control and Shrew Attacks

• Creating DoS Outages• Aggregation and Heterogeneity• Internet Experiments• Counter-DoS Techniques and

Conclusions

Page 4: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 4 [email protected]

Denial of Service

• From Wikipedia– an attempt to make a computer resource

unavailable to its intended users

• Damage– Network bandwidth– CPU cycles– Server interrupt processing capacity– Specific protocol data structures

Page 5: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 5 [email protected]

TCP Congestion Control

• To avoid or reduce the congestion• Small Round Trip Time (RTT) 10ms –

100ms– Additive-Increase Multiplicative-Decrease

(AIMD) control

• Severe congestion– Retransmission Time Out (RTO)– RTO is doubly increased when failure

happens

Page 6: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 6 [email protected]

TCP Congestion Control

• Smoothed Round-Trip Time (SRTT) • Round-Trip Time Variation (RTTVAR)

Page 7: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 7 [email protected]

TCP Retransmission Timer

Multiplicative decrease

Exponentioal backoff

1. Reduce congestion window to one

2. Doubles RTO

Package Loss

Page 8: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 8 [email protected]

Shrew Attacks

• Low-rate DoS attacks that exploit the slow-timescale dynamics of retransmission timers

• Provoke a TCP flow to repeatedly enter a retransmission timeout state– Sending high-rate, but short-duration bursts– The bursts must have RTT-scale– Repeating periodically at slower RTO timescales

• Outage: short durations of the attacker’s loss-inducing bursts

Page 9: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 9 [email protected]

Square-Wave DoS Stream

Outage

• Burst duration is long enough to induce transmission loss

• Average DoS rate is still low

Page 10: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 10 [email protected]

DoS Scenario and System Model

Bottleneck Rate

Page 11: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 11 [email protected]

DoS Model

• Given condition

• DoS TCP Throughput Model

Page 12: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 12 [email protected]

Flow Filtering

• Flow Filtering Behavior– Only TCP flow that satisfies the condition

could be influenced by the shrew attacks

Page 13: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 13 [email protected]

DoS TCP Throughput: Model and Simulation

• Depending on how well the attack can induce transmission loss

• Model does not consider the slow-start

Zero throughput

Page 14: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 14 [email protected]

Agenda

• TCP Congestion Control and Shrew Attacks

• Creating DoS Outages• Aggregation and Heterogeneity• Internet Experiments• Counter-DoS Techniques and

Conclusions

Page 15: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 15 [email protected]

Instantaneous Bottleneck Queue Behavior

• Define B as the queue size and B0 as the queue size at the start of an attack

• Time to fill the queue:

Page 16: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 16 [email protected]

Minimum Rate DoS Streams

• Double-Rate DoS Stream

Fill the queueKeep the queue full

• Use square-wave for DoS streams– Behaves the same– Simple, does not need knowledge of network params

Page 17: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 17 [email protected]

Agenda

• TCP Congestion Control and Shrew Attacks

• Creating DoS Outages• Aggregation and Heterogeneity• Internet Experiments• Counter-DoS Techniques and

Conclusions

Page 18: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 18 [email protected]

DoS and Aggregated TCP Flows

Five long-lived homogeneity TCP flows

• RTT homogeneity introduces a single vulnerable timescale

• DoS induces the synchronization of RTO

Page 19: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 19 [email protected]

RTT-Based Filtering

• 20 long-lived TCP flows on a 10 MB/s link• Range of round-trip time is 20 to 460 ms

Most short RTT TCP flows are influenced

Page 20: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 20 [email protected]

High Aggregation with Heterogeneous RTT

High-RTT flows are not influenced much

Page 21: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 21 [email protected]

Impact of DoS Burst Length

As the burst length increases, more TCP flows with high RTT are influenced

Page 22: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 22 [email protected]

Impact of DoS Peak Rate

Low peak rates are sufficient to filter the short-RTT flow

• 1 TCP Flow with RTT: 12ms to 134ms• 3 TCP Flow with RTT: 108ms to 230ms

Page 23: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 23 [email protected]

Impact on HTTP Flows

Attacks have greater impact on

larger files

Page 24: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 24 [email protected]

TCP Variants

Page 25: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 25 [email protected]

TCP Variants (Cont.)

Burst length L has a great influence on the throughput

Page 26: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 26 [email protected]

Agenda

• TCP Congestion Control and Shrew Attacks

• Creating DoS Outages• Aggregation and Heterogeneity• Internet Experiments• Counter-DoS Techniques and

Conclusions

Page 27: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 27 [email protected]

DoS Attack Scenario

Intra-LAN ScenarioInter-LAN ScenarioWAN Scenario

Page 28: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 28 [email protected]

Experiment Results

Shrew attacks can come from both remote sites or near by LANs

Page 29: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 29 [email protected]

Agenda

• TCP Congestion Control and Shrew Attacks

• Creating DoS Outages• Aggregation and Heterogeneity• Internet Experiments• Counter-DoS Techniques and

Conclusions

Page 30: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 30 [email protected]

Impact of RED and RED-PD routers

• For Router-Assisted Mechanisms: relatively long-timescale measurements are required to determine with confidence that a flow is transmitting at excessively high rate and should be dropped.

RED: Random Early DetectionRED-PD: RED with Preferential Dropping

Page 31: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 31 [email protected]

Detecting DoS Streams

Page 32: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 32 [email protected]

DoS under Randomized RTO

• Randomized minRTO shifts and smoothes TCP’s null frequencies

• It will influence the TCP performance• Helps but not very much to defend the attack

Page 33: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 33 [email protected]

Conclusions

• Low-rate DoS attacks are successful against both short- and long-lived TCP aggregates

• In a heterogeneous-RTT environment, the success of the attack is weighted towards shorter-RTT flows

• All low-rate periodic open-loop streams could be harmful

• Shrew attacks can only be mitigated, but not eliminated, it is a tradeoff between performance

Page 34: Low-Rate TCP-Targeted Denial of Service Attacks

Computer Science, Portland State University 34 [email protected]

Questions ?