NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks...

38
NC State / UC Davis / MCNC Protecting Protecting Network Quality of Service Network Quality of Service Against Against Denial of Service Attacks Denial of Service Attacks Douglas S. Reeves S. Felix Wu Dan Stephenson DARPA FTN PI Meeting January 17, 2001

Transcript of NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks...

Page 1: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

NC State / UC Davis / MCNC

Protecting Protecting Network Quality of Service Network Quality of Service

Against Against Denial of Service AttacksDenial of Service Attacks

Douglas S. Reeves S. Felix Wu Dan Stephenson

DARPA FTN PI Meeting January 17, 2001

Page 2: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

2

NC State / UC Davis / MCNC

Timetable and ParticipantsTimetable and Participants• Start date = August 1999

• Duration = 36 months

• Point of contact = Dr. Kevin Kwiat, AFRL, [email protected], (315) 330-1692

• No clearances

Douglas Reeves N.C. State [email protected](919) 515-2044

S. Felix Wu U.C. [email protected](530) 754-7070

Dan Stephenson MCNC

Page 3: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

3

NC State / UC Davis / MCNC

QoS - A New QoS - A New VulnerabilityVulnerability

• Guaranteeing QoS for a “flow” requires providing adequate resources– If you can't get or keep resources, your QoS is

denied

• Normal users will try to get maximum QoS without regard to others

• Malicious users will try to deny quality of service to others

Page 4: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

4

NC State / UC Davis / MCNC

The ARQOS Project:The ARQOS Project:Overview / Basic StrategiesOverview / Basic Strategies

1. Enforceable resource allocation policies, using pricing

2. Authorization and authentication to protect QoS signaling

3. Detect QoS attacks (monitor and analyze)

4. Other 8-)

Page 5: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

5

NC State / UC Davis / MCNC

1.Pricing: Pay as You Go1.Pricing: Pay as You Go

• Resources are priced, users have to “pay” to get what they want

• Policies– "fair" allocations, prioritize users, network

optimization, ...

• Steps– Measure demand– Compute prices– Distribute prices– Adjust demand

• “Appropriate" timescale / resource granularity for pricing?

Page 6: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

6

NC State / UC Davis / MCNC

(1a. Pricing) Fixed or Variable (1a. Pricing) Fixed or Variable Prices?Prices?

• Some users want lowest price (greatest resource amount)

• Some users want predictability (fixed resource amount)

• Goal: support both types of users

Page 7: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

11

NC State / UC Davis / MCNC

Combining the Two MarketsCombining the Two Markets

• Split each resource into "available" and "reservable" portions

• Users specify their preferences for price vs. predictability

• Compute prices separately for available and reservable parts

Page 8: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

12

NC State / UC Davis / MCNC

User User PreferencesPreferences

Page 9: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

13

NC State / UC Davis / MCNC

Reservation Market ExampleReservation Market Example

Page 10: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

14

NC State / UC Davis / MCNC

ResultsResults

• Ability to trade off risk (unpredictability) for reward (low prices) very flexibly– No other system combines reservations and

dynamic pricing

• Independent of the mechanism for computing reserved prices – We predicted future demand from past

demand for demonstration purposes

Page 11: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

15

NC State / UC Davis / MCNC

(1b. Pricing) Implementation(1b. Pricing) Implementation

• Conventional Resource Reservation (no pricing)

Page 12: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

16

NC State / UC Davis / MCNC

Implementation with pricing Implementation with pricing (now)(now)

Page 13: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

17

NC State / UC Davis / MCNC

Implementation with pricing Implementation with pricing and authorization (next)and authorization (next)

Page 14: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

18

NC State / UC Davis / MCNC

2. Authorizing Resource 2. Authorizing Resource AllocationAllocation

• Setting up connections– Control plane: Authenticate, authorize, and

manage requests for services– Bearer plane: Admission control and resource

reservation– These have to be coordinated!

• Who does what?– Hosts request the services– Session management servers implement the

control plane– Policy servers and routers implement the

bearer plane

Page 15: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

19

NC State / UC Davis / MCNC

Network RelationshipsNetwork Relationships

Page 16: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

20

NC State / UC Davis / MCNC

The Evolving Network ModelThe Evolving Network Model

• Bearer path (even the first hop) highly changeable– E.g., mobility

• No one institution owns the whole network any more– Multiple carriers– Multiple service providers

• Businesses will partner, but don't want to share secrets or relinquish control– E.g., reluctant to divulge network topology

information

Page 17: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

21

NC State / UC Davis / MCNC

Our SolutionOur Solution

1. Session Manager authorizes resource allocation and issues a "ticket" to the Host

2. Ticket is propagated to Policy Servers

3. Policy Server uses ticket to verify request is authorized

Page 18: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

22

NC State / UC Davis / MCNC

Solution ExampleSolution Example

Page 19: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

23

NC State / UC Davis / MCNC

Contents of the Ticket Contents of the Ticket (Example)(Example)• Originating party IP address/port #

• Terminating party IP address/port #

• Session identifier

• Media stream characteristics being authorized

• Authorization lifetime (no stockpiling of tickets!)

• Identity of Session Manager (issuing this ticket)

• Signature of Session Manager – Prevents tampering with ticket contents

Page 20: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

24

NC State / UC Davis / MCNC

Authentication of TicketAuthentication of Ticket

• Must not be possible to forge, modify, or reuse a ticket

• Assume Key Exchange Server (KES) exists and is trusted

• Signature based on Session Manager's key

• Policy Server requests key of Session Manager from Key Exchange Server for decryption– key can be cached to reduce overhead

Page 21: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

25

NC State / UC Davis / MCNC

Protocol ImpactsProtocol Impacts

• RSVP "Identity Representation"– Existing proposal for inserting authorization

objects into RSVP messages

• COPS– Already contains authorization “object”

• Session Description Protocol (SDP)– a few new fields added to SDP (carried by SIP)

Page 22: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

26

NC State / UC Davis / MCNC

DiscussionDiscussion

• Compatible with mobile IP networks, appears attractive for 3G wireless

• Session Manager oblivious to the topology of the bearer path

• Integrate authorization / authentication with allocation– Establish trust before allocating resources– Introduce "credential" methods to ensure trust

• Topic #1, BAA01-22!

Page 23: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

27

NC State / UC Davis / MCNC

ResultsResults

• Reeves and Christie (Nortel): patent application, October 2000

• Hamer and Gage (Nortel): IETF submission draft-hamer-sip-session-auth-00.txt, November 2000

• Prototypes being implemented by Nortel and N.C. State

Page 24: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

28

NC State / UC Davis / MCNC

3. Packet Dropping Attacks3. Packet Dropping Attacks

• Maliciously cause packets to be dropped– All packets? Too obvious– Some random packets– Some important packets, e.g., retransmission

packet

• Hard to detect– Packet loss might be due to normal network

congestion

Page 25: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

29

NC State / UC Davis / MCNC

Ways to Implement Dropping Ways to Implement Dropping AttacksAttacks• Compromise intermediate routers

– Easy to manipulate the victim's traffic– Hard to detect– Difficult to accomplish

• Congest intermediate routers– Hard to accurately control the dropping– Easier to detect– Easy to accomplish, e.g., Tribe Flood Network

Page 26: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

30

NC State / UC Davis / MCNC

Experiment SettingExperiment Setting

• 4 FTP Servers across the Internet

• FTP client runs Linux 2.0.36 in SHANG lab

• Size of downloaded file is 5.5MB

• Attack Agent runs on the same

host as FTP client act as a

compromised router

FTP

Internet

Divert Socket

FTP Client on Linux

xyz.zip 5.5M

FTP

Server

Attack Agent

Data Packets

Page 27: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

31

NC State / UC Davis / MCNC

Experiments over the InternetExperiments over the Internet

FTP Client

NCSU

FTP Servers

Heidelberg

NCU

SingNet

UIUC

Page 28: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

32

NC State / UC Davis / MCNC

Results: Impact on Average Results: Impact on Average Pkt. DelayPkt. Delay

5663.4 66

218.4

98.6108.2

125.8

250.9

62.6

77.186.9

260.3

23.6 26.5

44.6

183.9

0

50

100

150

200

250

300

Ses

sio

n D

elay

(s)

Heidelberg NCU SingNet UIUC

NormalRandomPeriodicalRetrans.

7 packets are dropped among more than 4000 packets in a connection

Page 29: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

33

NC State / UC Davis / MCNC

Q-Test Detection MechanismQ-Test Detection Mechanism

• Based on ideas from NIDES-STAT (SRI)– Collect data on “normal” behavior– Compare expected distribution vs observed

distribution– Is the deviation significant?

• Implementation: TDSAM

Page 30: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

35

NC State / UC Davis / MCNC

Q-Distribution for Position of Dropped Q-Distribution for Position of Dropped PacketsPackets

Heidelberg

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

0.18

0.2

0 5 10 15 20 25 30 35Q bins

Prob

abilit

y

NCU

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

0.18

0.2

0 5 10 15 20 25 30 35Q bins

Prob

abilit

y

SingNet

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

0.18

0.2

0 5 10 15 20 25 30 35Q bins

Prob

abilit

y

UIUC

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

0.18

0.2

0 5 10 15 20 25 30 35Q bins

Prob

abilit

y

Page 31: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

37

NC State / UC Davis / MCNC

ResultsResults

• Performance– False alarm rate: 1.1% ~ 5.8%– Detection rate: high on most cases except for

those causing very minor damage

• Best results: use combined metrics

Page 32: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

38

NC State / UC Davis / MCNC

Heidelberg NCU SingNet UIUC Position

nbin=5

DR MR DR MR DR MR DR MR

Normal* - 4.0% - 5.4% - 3.5% - 6.5% -

(10, 4, 5) 99.7% 0.3% 100% 0% 100% 0.0% 100% 0%

(20, 4, 5) 100% 0% 98.1% 1.9% 99.2% 0.8% 100% 0%

(40, 4, 5) 96.6% 3.4% 100% 0% 100% 0% 98.5% 1.5%

(20, 20, 5) 100% 0% 100% 0% 100% 0 % 100% 0%

(20, 100, 5) 98.9% 1.1%. 99.2% 0.8% 99.6% 0.4% 99.1% 0.9%

(20, 200, 5) 0% 100% 76.5% 23.5% 1.5% 98.5% 98.3% 1.7%

PerPD

(100, 40, 5) 0.2% 99.8% 0% 100% 0% 100% 100% 0%

RetPD (5, 5) 84.9% 15.1% 81.1% 18.9% 94.3% 5.7% 97.4% 2.6%

10 0% 100% 42.3% 57.7% 0% 100% 0% 100% RanPD

40 0% 100% 0% 100% 0% 100% 0% 100%

5 98.6% 1.4% 100% 0% 98.2% 1.8% 100% 0% Intermittent

(10, 4, 5) 50 34.1% 65.9% 11.8% 88.2% 89.4% 10.6% 94.9% 5.1%

Results: Position MeasureResults: Position Measure

Page 33: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

39

NC State / UC Davis / MCNC

Results: Delay MeasureResults: Delay Measure

Heidelberg NCU SingNet UIUC Delay

nbin=3

DR MR DR MR DR MR DR MR

Normal* - 1.6% - 7.5% - 2.1% - 7.9% -

(10, 4, 5) 97.4% 2.6% 95.2% 4.8% 94.5% 5.5% 99.2% 0.8%

(20, 4, 5) 99.2% 0.8% 98.5% 1.5% 100% 0% 100% 0%

(40, 4, 5) 100% 0% 100% 0% 100% 0% 100% 0%

(20, 20, 5) 96.3% 3.7% 100% 0% 92.6% 7.4% 98.9% 1.1%

(20, 100, 5) 100% 0% 95.3% 4.7% 98.7% 1.3% 100% 0%

(20, 200, 5) 98.6% 1.4% 99% 1% 97.1% 2.9% 100% 0%

PerPD

(100, 40, 5) 100% 0% 100% 0% 100% 0% 100% 0%

RetPD (5, 5) 100% 0% 100% 0% 100% 0% 100% 0%

10 74.5% 25.5% 26.8% 73.2% 67.9% 32.1% 99.5% 0.5% RanPD

40 100% 0% 100% 0% 100% 0% 100% 0%

5 25.6% 74.4% 0% 100% 0% 100% 97.3% 2.7% Intermittent

(10, 4, 5) 50 0% 100% 24.9% 75.1% 0% 100% 3.7% 96.3%

Page 34: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

40

NC State / UC Davis / MCNC

Results: Packet Loss Rate MeasureResults: Packet Loss Rate Measure

Heidelberg NCU SingNet UIUC NPR

nbin=2

DR MR DR MR DR MR DR MR

Normal* - 4.5% - 5.8% - 8.2% - 2.9% -

(10, 4, 5) 0% 100% 14.4% 85.6% 29.1% 70.9% 100% 0%

(20, 4, 5) 83.1% 16.9% 94.2% 5.8% 95.2% 4.8% 100% 0%

(40, 4, 5) 100% 0% 97.4% 2.6% 100% 0% 100% 0%

(20, 20, 5) 91.6% 8.4% 92% 8% 93.5% 6.5% 100% 0%

(20, 100, 5) 94.3% 5.7% 92.2% 7.8% 96.4% 3.6% 100% 0%

(20, 200, 5) 0% 100% 96.5% 3.5% 94.8% 5.2% 100% 0%

PerPD

(100, 40, 5) 100% 0% 100% 0% 100% 0% 100% 0%

RetPD (5, 5) 0% 100% 84.7% 15.3% 23.9% 76.1% 46.5% 53.5%

10 0% 100% 0% 100% 100% 0% 100% 0% RanPD

40 100% 0% 100% 0% 100% 0% 100% 0%

5 0% 100% 0% 100% 82.2% 17.8% 100% 0% Intermittent

(10, 4, 5) 50 0% 100% 1% 99% 40% 60% 64.8% 35.2%

Page 35: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

41

NC State / UC Davis / MCNC

4. Policy Consistency Checking4. Policy Consistency Checking

• IPSec policies are created by administrators to establish VPNs

• The set of policies is supposed to implement a set of high-level requirements– Ex. policy 1 + policy 2 + policy 3 = no data

transmitted in the clear between site A and site B

• How can you tell if set of policies conflicts?

Page 36: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

42

NC State / UC Davis / MCNC

H1 FW1 SW2 H2

Example of a Policy ConflictExample of a Policy Conflict

• Security policies– P1 = all packets from H1 to H2 must be

authenticated to SW2– P2 = all packets from H1 to H2 must be encrypted

from FW1 to SW2

• Result– P1 changes src/dest of packets from H1/H2 to

H1/SW2– P2 is not invoked on these packets, which are

therefore not encrypted– Security breach!

Page 37: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

43

NC State / UC Davis / MCNC

StatusStatus

Define language to specify high-level requirements

Define what consistency checking of policies means

Create polynomial algorithm to check for conflicts

Resolve policy conflicts if they are found

• Tech transfer opportunity with Nortel

Page 38: NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.

January 17, 2001 -- FTN PI Meeting

44

NC State / UC Davis / MCNC

DeliverablesDeliverables

• Accomplished– Congestion pricing system papers– Papers: iwqos, icnp (3 times), net2k, policy

2001, ...– Software: packet dropping attack analysis,

RSVP authentication– Patents, standards submissions,

implementation: tech transfer to Nortel

• Future– Software: RSVP / policy server / COPS,

Authorization, TCP with pricing, DiffServ attack analysis

– Final report