powerpoint - ARQoS - NC State University

Download Report

Transcript powerpoint - ARQoS - NC State University

Protecting Network Quality of
Service against Denial of
Service Attacks
Douglas S. Reeves
S. Felix Wu
Chandru Sargor
N. C. State University / MCNC
October 6, 1999
Tolerant Networks Program
BAA99-10 Kickoff Meeting
1
Quality of Service - a New
Capability for Packet-Switching

New services
 Guaranteed minimum bandwidth
 Guaranteed maximum delay
 Guaranteed maximum loss rate

Guaranteeing QoS for a “flow” requires
providing adequate resources
2
IntServ / RSVP Operation
PATH messages
DST
SRC
RESV messages
Tspec = 5M
ADspec = 5M
That looks fine
to me…..
Tspec = 5M
ADspec = 4M
Reserve
3M
ADspec = 3M
Reserve
3M
3
DiffServ
DATA flow
SRC1
DST1
SRC2
DST2
Service Agreement
and Traffic Agreement
4
Quality of Service - A New
Vulnerability

Normal users will try to get maximum
QoS without regard to others

Malicious users will try to deny quality of
service for others
5
The ARQOS Project
Selective verification of reservation
signaling (SVR)
Congestion pricing of scarce resources
($$$)
Monitoring of data flows, and integration
with intrusion detection (IDS)
6
SVR: Attacking ADSpec
DST
SRC
ADSpec = 5M
That looks fine
to me…..
ADSpec = 200M
Reserve
5M
Reserve
200M
7
SVR: IETF RSVP Security
Current solution proposed by Fred Baker

All routers, even including those not on
the path, share the same “key table”

Hop-by-hop authentication of messages
– outsiders tampering with packets will be
detected, but corrupted insiders will not be
detected
8
SVR: IETF RSVP Security
(cont.)
Sharing a secret key
A
ADSpec
B
A & B trust each other;
If A is compromised and sends a faulty ADSpec,
there is no way for B to know about it
9
SVR: Our Approach
DST
SRC
ADSpec = 5M
ADSpec = 200M
Correlation and Verification of the Correctness Properties
10
SVR: Verification of Reservations

No need to introduce new features to
RSVP, other existing protocols

Do not need to install verification agents
in every router

Capable of detecting insider attacks
12
SVR: Status

Identified types of possible attacks on
RSVP signals

Solutions for detecting the most
important types of attacks

Now implementing attacks and solutions
14
$$$: Competing for Services
"You can have
5M, 2M, or
1M, at no cost;
what do you
want, and for
how long?”
Service Provider:
Network Resources
5M
5M
5M
5M
5M
5M
Users:
“We all want 5M, from now on!”
15
$$$: Influencing Behavior

Disincentives for bad behavior -- users
incur costs for resource usage

Incentives for good behavior -- profits
for service providers
17
$$$: Competition (cont.)
“5M costs $3/min,
2M costs $2/min,
1M costs $1/min.”
Service Provider:
Network Resources
5M
@$3
2M
@$2
5M
@$3
1M
@$1
5M
@$3
1M
@$1
Users:
18
$$$: Pricing of Resources

Price is right when demand = supply

Flexibility
– combinations of resources and services
– User endowments for non-monetary goals

How are prices set, by whom, and how
are they distributed?
19
$$$: Goals and Assumptions

Fairness vs. “maximum aggregate utility”

The time and data scales for which this
is useful

Real money, or play money?

Charging senders, or receivers

The overhead of billing and accounting
21
$$$: Status

Pricing method

Integration with RSVP

Integration with DiffServ

Infrastructure
22
IDS: Attacks on the Data Flow

From a malicious host (external to
network)
– spoof high priority data flow packets
– send large amounts of data to ingress
router to overload it

From a compromised ingress router
– admit/discard traffic in violation of service
agreement
– inappropriate marking of admitted traffic
23
IDS: Possible Attacks (cont.)
– delay/drop packets from selected flows
– generate additional traffic to degrade
overall network QoS

From a compromised core router
– randomly re-mark flows
– delay/drop packets from selected flows
– generate additional traffic to degrade
overall network QoS
24
IDS: Intrusion Detection System
Security
Management
Entity
SNMPv3
Profile-Based
Analyzer
IDS MIB
Rule-Based
Analyzer
Decision Module
Filtering Engine
Network
25
IDS: Detecting Re-marked
Packets

Downstream IDS will detect anomalous
change in IP header
– raise alarm via SNMP

Security management entity will receive
alarms from IDS entities and correlate
them

Security management entity will query
other routers on the path to isolate
compromised router
26
IDS: Status

Enhance JiNao implementation to make
it protocol independent
– originally targeted for OSPF attack
detection
– now can be used to detect attacks against
any protocol

Identification of data flow attacks

Preliminary design of IDS system
27
Conclusions

Started August ‘99

Implementing RSVP / DiffServ testbed

Exploring collaborations with vendors
28