ppt3 - School of Computer Science
Download
Report
Transcript ppt3 - School of Computer Science
Hash-Based IP Traceback
U Kang
Computer Science Department
15-744 Computer Networks
Carnegie Mellon University
U Kang
1
Motivation
Our network or hosts have been
compromised
How can we trace the attackers identity?
Carnegie Mellon University
U Kang
2
Problem Definition
IP traceback problem
Given packets of interest,
1. Identify the source of the packets
2. Construct an attack graph composed of the
attack paths for attack packets that arrived at the
victim
Attack Graph
Carnegie Mellon University
U Kang
3
Log-based Traceback
Routers keep the log of packets
If an attack occurs, routers are queried for
attack packets
Carnegie Mellon University
U Kang
Challenges
C1: Minimizing Cost
C2: Accuracy
Storage used to keep information
No false negative
Minimize false positive
C3: Maintaining Privacy
A tracing system should not adversely impact the
privacy of legitimate users
Carnegie Mellon University
U Kang
5
Proposed Method
Source Path Isolation Engine(SPIE)
Audit traffic by storing 32-bit packet digests rather
than the packets themselves
Solves “C1: Minimizing Cost”, “C3: Maintaining Privacy”
Bloom Filters to Minimize False Positive
Solves “C2: Accuracy”
Bloom Filter
- add()
- isMember()
Carnegie Mellon University
U Kang
6
SPIE Infrastructure
STM: Traceback Manager
SCAR: Collection and Reduction
Agents
DGA: Data Generation Agent
1. IDS detects an attack packet
2. IDS issue a traceback request to STM
3. STM asks all SCARS in its domain to poll their
respective DGAs for the relevant traffic digests
4. SCARs construct attack subgraphs
Carnegie Mellon University
U Kang
7
Discussion
Deployment: can the SPIE infrastructure be
deployed over multiple ISPs?
Memory Requirements?
A core router with a max. capacity of 640M
pkts/sec requires 23 GB for one minute’s storage
Carnegie Mellon University
U Kang
8