Presentation
Download
Report
Transcript Presentation
DoS attacks prevention
Avital Yachin
Under supervision of Gal Badishi
SoftLab – June 2006
What is DoS
server
client
attacker
What is DDoS
zombie
zombie
server
zombie
zombie
zombie
zombie
Possible solutions
Firewall (specific ports) ?
Heuristic (identifying and blocking the
attacker) ?
Clients Authentication ?
At what level ?
Selected solution
Both sides authenticate the other side
at the packet level.
Current implementation filters packets
at the transport layer (UDP).
Can be generalized to the IP layer.
How it works
IP Header
IP Data
UDP Header
UDP Header
IP Header
UDP Data
UDP Data
IP Data
Outgoing Packets
Key
How it works
IP Header
IP Data
UDP Header
UDP Header
IP Header
UDP Data
UDP Data
Key
IP Data
Incoming Packets
Key
?
=
How it works
Application
TCP/IP Driver
NDIS Driver
Encapsulator
NDIS
Hook Driver
User mode
Kernel mode
Network Card
Authentication Method
Hashing (SHA-1) of current time and a
secret code.
Authentication token changes
periodically (not for every packet
much cheaper).
Clocks synchronization.
Client’s secret code is known to server.
Conclusions
There’s no simple solution to wire flood.
Packets can be filtered at lower levels
thus preventing system resources
abuse.
Solution is “cheaper” than IPSEC (but
doesn’t handle encryption).
Future Enhancements
Filtering packets at the IP layer
(solution for TCP and others).
Auto time synchronization.
Full kernel mode implementation
(performance / flexibility tradeoff).
Demo