Poster: LEADER (Low-Rate Denial-of-Service Attacks Defense) · Examples of LRD attacks are: (1)...

3
Poster: LEADER (Low-Rate Denial-of-Service Attacks Defense) Rajat Tandon, Haoda Wang, Nicolaas Weideman, Christophe Hauser, Jelena Mirkovic Information Sciences Institute, University of Southern California tandon, haodawa, nweidema, hauser, sunshine @isi.edu Abstract—Low-rate denial-of-service(LRD) attacks are often hard to detect at the network level as they consume little bandwidth. Both the legitimate traffic and the attack traffic look alike. Moreover, the attack traffic often appears to comply with transport protocol, and application protocol semantics. It is the intricacies in the payloads and the dynamics of the attack traffic that induces denial-of-service on servers when processed by specific hardware and software. We introduce Leader, a hybrid approach for application- agnostic and attack-agnostic detection and mitigation of LRD attacks. Leader operates by learning normal patterns of network, application and system-level resources when processing legitimate external requests. It relies on a novel combination of runtime, system and network monitoring and offline binary program analysis. I. I NTRODUCTION Low-rate denial-of-service attacks deny service at the device level (server, router, switch), and stay well below the network bandwidths limit. These attacks use a specific basic mechanism to deny service. They deplete some limited resource at the application, the operating system or the firmware of a device. This makes the device unable to process legitimate clients’ traffic. Examples of LRD attacks are: (1) Connection depletion attacks (e.g., TCP SYN flood [3] or SIP flood [2], which deplete a connectiontable space for a given service by keep- ing many half-open connections, (2) Application/System-level depletion attacks ((e.g., ZIP bombs [6]), which deplete CPU through expensive and never-ending computation operations). Leader protects the deploying server against every variant of LRD attack. The novel aspect of leader is it’s hybrid detection approach combining network security mechanisms with OS and program-level aspects. Leader operates by learning, during baseline operation, a normal pattern of an applications and the devices use of system resources, when serving external requests. Leader detects attacks as cases of resource overload that impairs some services quality. It then runs diagnostics, compares the observed and the expected resource usage pat- terns, and checks for anomalies. This helps it diagnose the attack type, and select the best remediation actions. Another novel aspect of Leader lies in the structures it uses to capture sequences of resource-use events in a temporal and relational manner per each incoming service request. These sequences are known as connection life stages. They are built from multiple, complementary observations collected at the (1) network level, (2) OS level and (3) application level. The connection life stages are then clustered into typical resource- use patterns, or profiles for applications and for users. We use these profiles to detect anomalous use and characterize LRD attacks. We also design mitigation actions that remove attack traffic, or increase systems robustness to the specific attack with the aid of these profiles. II. METHODOLOGY Figure 1(a) shows a high-level view of the abstraction levels at which Leader operates. It also illustrates the trade-offs between accuracy of semantic reasoning on one side, and monitoring cost and delay on another side. Semantic reasoning is accurately understanding and attributing resource usage to a given application and network connection. Better accuracy implies more monitoring, which incurs higher cost and higher delay. We qualify as black box observation the process of characterizing the behavior of an application based on the sole observation of its inputs and outputs. OS-level instrumentation allows an observer to gain more insights about the applications semantics and program analysis offers the highest level of semantic reasoning. Figure 1(b) gives the system overview. LRD attacks usually involve one or several incoming service requests arriving at the server that are expensive or slow processing leading to resource depletion. This causes a state where the service or the global system is unable to gracefully handle new requests and denial of service occurs. The defense mechanisms in Leader comprises the following operational steps unified into the three main modules: (1) Behavior profiling, (2) Attack detection (and characterization), and (3) Attack mitigation. A. Behavior profiling LEADER relies on the collection of measures and statistics of system resources usage for successful attack detection. These measures are collected per each incoming service request and comprise observations at the network, system and application level. Leader captures the connection, client, application and whole-device profiles at all times. During normal operation, Leader performs profiling to learn the le- gitimate behavior of the connections, applications, clients and the device where it is deployed. B. Attack detection Another novel aspect of leader is that it uses a hybrid detection approach combining network security mechanisms

Transcript of Poster: LEADER (Low-Rate Denial-of-Service Attacks Defense) · Examples of LRD attacks are: (1)...

Page 1: Poster: LEADER (Low-Rate Denial-of-Service Attacks Defense) · Examples of LRD attacks are: (1) Connection depletion attacks (e.g., TCP SYN flood [3] or SIP flood [2], which deplete

Poster: LEADER (Low-Rate Denial-of-ServiceAttacks Defense)

Rajat Tandon, Haoda Wang, Nicolaas Weideman, Christophe Hauser, Jelena MirkovicInformation Sciences Institute, University of Southern California

tandon, haodawa, nweidema, hauser, sunshine @isi.edu

Abstract—Low-rate denial-of-service(LRD) attacks are oftenhard to detect at the network level as they consume littlebandwidth. Both the legitimate traffic and the attack trafficlook alike. Moreover, the attack traffic often appears to complywith transport protocol, and application protocol semantics. Itis the intricacies in the payloads and the dynamics of the attacktraffic that induces denial-of-service on servers when processedby specific hardware and software.

We introduce Leader, a hybrid approach for application-agnostic and attack-agnostic detection and mitigation of LRDattacks. Leader operates by learning normal patterns of network,application and system-level resources when processing legitimateexternal requests. It relies on a novel combination of runtime,system and network monitoring and offline binary programanalysis.

I. INTRODUCTION

Low-rate denial-of-service attacks deny service at the devicelevel (server, router, switch), and stay well below the networkbandwidths limit. These attacks use a specific basic mechanismto deny service. They deplete some limited resource at theapplication, the operating system or the firmware of a device.This makes the device unable to process legitimate clients’traffic. Examples of LRD attacks are: (1) Connection depletionattacks (e.g., TCP SYN flood [3] or SIP flood [2], whichdeplete a connectiontable space for a given service by keep-ing many half-open connections, (2) Application/System-leveldepletion attacks ((e.g., ZIP bombs [6]), which deplete CPUthrough expensive and never-ending computation operations).

Leader protects the deploying server against every variant ofLRD attack. The novel aspect of leader is it’s hybrid detectionapproach combining network security mechanisms with OSand program-level aspects. Leader operates by learning, duringbaseline operation, a normal pattern of an applications andthe devices use of system resources, when serving externalrequests. Leader detects attacks as cases of resource overloadthat impairs some services quality. It then runs diagnostics,compares the observed and the expected resource usage pat-terns, and checks for anomalies. This helps it diagnose theattack type, and select the best remediation actions. Anothernovel aspect of Leader lies in the structures it uses to capturesequences of resource-use events in a temporal and relationalmanner per each incoming service request. These sequencesare known as connection life stages. They are built frommultiple, complementary observations collected at the (1)network level, (2) OS level and (3) application level. Theconnection life stages are then clustered into typical resource-

use patterns, or profiles for applications and for users. We usethese profiles to detect anomalous use and characterize LRDattacks. We also design mitigation actions that remove attacktraffic, or increase systems robustness to the specific attackwith the aid of these profiles.

II. METHODOLOGY

Figure 1(a) shows a high-level view of the abstraction levelsat which Leader operates. It also illustrates the trade-offsbetween accuracy of semantic reasoning on one side, andmonitoring cost and delay on another side. Semantic reasoningis accurately understanding and attributing resource usage toa given application and network connection. Better accuracyimplies more monitoring, which incurs higher cost and higherdelay. We qualify as black box observation the process ofcharacterizing the behavior of an application based on the soleobservation of its inputs and outputs. OS-level instrumentationallows an observer to gain more insights about the applicationssemantics and program analysis offers the highest level ofsemantic reasoning.

Figure 1(b) gives the system overview. LRD attacks usuallyinvolve one or several incoming service requests arriving atthe server that are expensive or slow processing leading toresource depletion. This causes a state where the service or theglobal system is unable to gracefully handle new requests anddenial of service occurs. The defense mechanisms in Leadercomprises the following operational steps unified into the threemain modules: (1) Behavior profiling, (2) Attack detection(and characterization), and (3) Attack mitigation.

A. Behavior profiling

LEADER relies on the collection of measures and statisticsof system resources usage for successful attack detection.These measures are collected per each incoming servicerequest and comprise observations at the network, systemand application level. Leader captures the connection, client,application and whole-device profiles at all times. Duringnormal operation, Leader performs profiling to learn the le-gitimate behavior of the connections, applications, clients andthe device where it is deployed.

B. Attack detection

Another novel aspect of leader is that it uses a hybriddetection approach combining network security mechanisms

Page 2: Poster: LEADER (Low-Rate Denial-of-Service Attacks Defense) · Examples of LRD attacks are: (1) Connection depletion attacks (e.g., TCP SYN flood [3] or SIP flood [2], which deplete

Fig. 1. Monitoring and system overview: novelty of our approach lies in our connection life stages and code path abstractions, which are built from monitoringthe system at network, OS and application levels.

Fig. 2. Life-stage diagrams for Slowloris attack: highlighted items show anomalies.

with OS and program-level aspects. Our attack detection mod-ule compares instantaneous profiles to corresponding baselineprofiles, with the goal of detecting evidence of troubled ser-vices that have low instantaneous percentages of successfullyserved incoming requests, compared to the historical (baseline)percentages of successfully served request.

C. Attack mitigation

Leader deploys a combination of attack mitigation ap-proaches that includes (1) Derivation of the attack signaturefrom attack connections (2) Costly connection termination, (3)Blacklisting of attack sources, (4) Dynamic resource replica-tion, (5) Program patching and algorithm modification, and (6)Blacklisting of sources with anomalous profiles.

III. PRELIMINARY FINDINGS AND NEXT STEPS

We relied on on Emulab [4] to experiment with Slowloris[5], a common type of LDR attacks. We set up a static Webserver, and used 10 legitimate and one attack client. Thelegitimate clients continuously requested the main Web page,using wget, each 200 ms. This created 50 requests per secondat the server. The attack client opened 1,000 simultaneousattack connections and kept them open for as long as possibleby sending never-ending headers on each. This had negativeimpact on legitimate clients, that had trouble establishing con-nection with the server. Figure 2 shows the life stage diagramfor traffic in attack case, which includes both legitimate andattack connections, and compared it to the diagram in thebaseline case. The highlighted stages differ between two casesand help us identify anomalous connections.

Currently, we use Systemtap [1] to build aggregate profilesof an application’s/system’s resource usage pattern for eachconnection at the system call level. We capture the timespent on each system call and the resources used by themsuch as memory usage, number of page faults and open filedescriptors, cpu cycles and other thread/process level details.We do such profiling for both legitimate traffic as well asattack traffic. There are notable differences between the two.We will utilize these profiles, along with other sophistication,to detect attacks and mitigate them.

IV. CONCLUSION

LEADER leverages a novel combination of runtime moni-toring and offline binary program analysis to protect a deploy-ing server against LRD attacks and prevents external servicerequests from misusing system resources. During baselineoperation, LEADER learns resource-usage patterns and detectsand mitigates attacks by following an anomaly detectionparadigm.

REFERENCES

[1] EIGLER, F. C., AND HAT, R. Problem solving with systemtap. In Proc.of the Ottawa Linux Symposium (2006), pp. 261–268.

[2] LUO, M., PENG, T., AND LECKIE, C. Cpu-based dos attacks againstsip servers. In Network Operations and Management Symposium, 2008.NOMS 2008. IEEE (2008), IEEE, pp. 41–48.

[3] MANNA, M. E., AND AMPHAWAN, A. Review of syn-flooding attackdetection mechanism. arXiv preprint arXiv:1202.1761 (2012).

[4] WHITE, B., LEPREAU, J., STOLLER, L., RICCI, R., GURUPRASAD, S.,NEWBOLD, M., HIBLER, M., BARB, C., AND JOGLEKAR, A. An inte-grated experimental environment for distributed systems and networks.ACM SIGOPS Operating Systems Review 36, SI (2002), 255–270.

[5] WIKIPEDIA. Slowloris. https://en.wikipedia.org/wiki/ slowloris(computer security).

[6] WIKIPEDIA. Zip bomb. https://en.wikipedia.org/wiki/Zip bomb.

2

Page 3: Poster: LEADER (Low-Rate Denial-of-Service Attacks Defense) · Examples of LRD attacks are: (1) Connection depletion attacks (e.g., TCP SYN flood [3] or SIP flood [2], which deplete

LEADER: Low-Rate Denial-of-Service Attacks DefenseRajat Tandon - Haoda Wang - Nicolaas Weideman - Christophe Hauser - Jelena Mirkovic

Information Sciences Institute, University of Southern California

OverviewLow-rate denial-of-service(LRD) attacks are of-ten hard to detect at the network level as theyconsume little bandwidth. It is the intricacies inthe payloads and the dynamics of the attack traf-fic that induces denial-of-service on servers whenprocessed by specific hardware and software.We introduce Leader, a hybrid approach forapplication-agnostic and attack-agnostic de-tection and mitigation of LRD attacks. Leaderoperates by learning normal patterns of net-work, application and system-level resourceswhen processing legitimate external requests. Itrelies on a novel combination of runtime, sys-tem and network monitoring and offline binaryprogram analysis.

Figure 1: Monitoring at different abstraction lev-els, with the associated trade-off.

Figure 2: System overview.

Monitoring and system overview: Novelty of our approachlies in our connection life stages and code path abstrac-tions, which are built from monitoring the system at net-work, OS and application levels. Figure 1 shows a high-level view of the abstraction levels at which Leader operates.It also illustrates the trade-offs between accuracy of semanticreasoning and, monitoring cost and delay. OS-level instru-mentation allows an observer to gain more insights about theapplications semantics and program analysis offers the high-est level of semantic reasoning. Figure 2 gives the systemoverview. LRD attacks usually involve several incoming ser-vice requests arriving at the server that are expensive/slowprocessing leading to resource depletion.

Preliminary ResultsWe relied on on Emulab to experiment withSlowloris, a common type of low-rate denial-of-service attack. We set up a static Web server, andused 10 legitimate and one attack client. The le-gitimate clients continuously requested the mainWeb page, using wget, each 200 ms. This created50 requests per second at the server. The attackclient opened 1,000 simultaneous attack connec-tions and kept them open for as long as possibleby sending never-ending headers on each. Thishad negative impact on legitimate clients, that hadtrouble establishing connection with the server.Figure 3 shows the life stage diagram for traffic inattack case, which includes both legitimate and at-tack connections, and compared it to the diagramin the baseline case. The highlighted stages differbetween two cases and help us identify anomalousconnections.

Another novel aspect of Leader lies in the structures it uses to capture sequences of resource-use events in a tempo-ral and relational manner per each incoming service request. These sequences are known as connection life stages.We relied on on Emulab to experiment with Slowloris, a common type of low-rate denial-of-service attack. We setup a static Web server, and used 10 legitimate and one attack client. The legitimate clients continuously requestedthe main Web page, using wget, each 200 ms. This created 50 requests per second at the server. The attack clientopened 1,000 simultaneous attack connections and kept them open for as long as possible by sending never-endingheaders on each. This had negative impact on legitimate clients, that had trouble establishing connection with theserver. Figure 3 shows the life stage diagram for traffic in attack case, which includes both legitimate and attackconnections, and compares it to the diagram in the baseline case.

Figure 3: Life-stage diagrams for Slowloris attack: highlighted items show anomalies.

We are working on Systemtap to build aggregate profiles of an application’s/system’s resource usage pattern for each connection at the system call level. We capture thetime spent on each system call and the resources used by them such as memory usage, number of page faults and open file descriptors, cpu cycles and other thread/processlevel details. We do such profiling for both legitimate traffic as well as attack traffic. There are notable differences between the two. We will utilize these profiles, along withother sophistication, to detect attacks and mitigate them.

Methodology•Behavior profiling

LEADER relies on the collection of mea-sures and statistics of system resources usagefor successful attack detection. These measuresare collected per each incoming service requestand comprise observations at the network,system and application level. Leader capturesthe connection, client, application and whole-device profiles at all times. During normaloperation, Leader performs profiling to learn thelegitimate behavior of the connections, applica-tions, clients and the device where it is deployed.

• Attack detection (and characterization)

Another novel aspect of leader is that it uses ahybrid detection approach combining networksecurity mechanisms with OS and program-levelaspects. Our attack detection module comparesinstantaneous profiles to corresponding baselineprofiles, with the goal of detecting evidence oftroubled services that have low instantaneouspercentages of successfully served incomingrequests, compared to the historical (baseline)percentages of successfully served request.

•Attack mitigation

Leader deploys a combination of attack miti-gation approaches that includes (1) Derivationof the attack signature from attack connections(2) Costly connection termination, (3) Black-listing of attack sources, (4) Dynamic resourcereplication, (5) Program patching and algorithmmodification, and (6) Blacklisting of sourceswith anomalous profiles.

Contact us at — tandon, haodawa, nweidema, hauser, sunshine @isi.edu