ppt

Exposing and Eliminating
Vulnerabilities to Denial of
Service Attacks in Secure
Gossip-Based Multicast
Gal Badishi, Idit Keidar, Amir Sasson
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Outline
• The problem
• Overview of gossip-based multicast
• Proposed solution - Drum
• Analysis and simulations
• Implementation and measurements
• Summary and general principles
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Denial of Service (DoS)
• Unavailability of service
– Exhausting resources
• Remote attacks
– Network level
• Solutions do not solve all application problems
– Application level
• Got little attention
• Quantitative analysis of impact on application and
identification of vulnerabilities needed
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Challenges
• Quantify the effect of DoS at the
application level
• Expose vulnerabilities
• Find effective DoS-mitigation techniques
– Prove their usefulness using the found metric
• Multicast as an example
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Tree-Based Multicast
• Use a spanning tree – most common solution
• No duplicates (optimal BW when network-level)
• Single points of failure Source
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Gossip-Based Multicast
• Progresses in rounds
• Every round
– Choose random partners (view )
– Send or receive messages
– Discard old msgs from buffer
• Probabilistic reliability
• Uses redundancy to achieve robustness
• Two methods
– Push
– Pull
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Push
Source
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Pull
Source
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Effects of DoS on Gossip
• Surprisingly, we show that naïve gossip is
vulnerable to DoS attacks
• Attacking a process in pull-based gossip
may prevent it from sending messages
• Attacking a process in push-based gossip
may prevent it from receiving messages
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Drum
• A new gossip-based ALM protocol
• Utilizes DoS-mitigation techniques
– Using random one-time ports to communicate
– Combining both push and pull
– Separating and bounding resources
• Eliminates vulnerabilities to DoS
• Proven robust using formal analysis and
quantitative evaluation
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Random Ports
• Any request necessitating a reply contains
a random port number
– “Invisible” to the attacker (e.g., encrypted)
• The reply is sent to that random port
Request
+
on
Wait on
•Wait
Assumption:
Network
withstands
load
wellknown
port
Gal Badishi
random port
number
Faculty of Electrical Engineering, Technion
random
port
DSN 2004
Combining Push and Pull
• Attacking push cannot prevent receiving
messages via pull (random ports)
• Attacking pull cannot prevent sending via
push
• Each process has some control over the
processes it communicates with
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Bounding Resources
• Motivation: prevent resource exhaustion
• Each round process a random subset of
the arriving messages and discard the rest
• Separate resources for orthogonal
operations
Round Duration
Valid Request
Gal Badishi
Bogus Request
Faculty of Electrical Engineering, Technion
DSN 2004
Evaluation: Staged DoS Attacks
• Increasing strength
– shows trend under DoS
• Fixed strength
– exposes vulnerabilities
• Source is always attacked
• Analysis, simulations, measurements
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Analysis – Increasing Strength
• Assume static group, strict subset is attacked
• Lemma 1: Drum’s propagation time is bounded
from above by a constant independent of the
attack rate
• Lemma 2: The propagation time of Push grows
at least linearly with the attack rate
• Lemma 3: The propagation time of Pull grows at
least linearly with the attack rate
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Expected Propagation Time, 10% Attacked
30
Push, n = 1000
Push, n = 120
Pull, n = 1000
Pull, n = 120
Drum, n = 1000
Drum, n = 120
# rounds
25
20
15
10
5
0
0
20
40
60
80
100
120
140
Attack Rate
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Expected Propagation Time, 10% Attacked (of 1000)
30
Drum - Known Ports
Drum - Random Ports
25
# rounds
20
15
10
5
0
0
20
40
60
80
100
120
140
Attack Rate
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Expected Propagation Time, 10% Attacked (of 50)
12
Drum - Shared Bounds
Drum - Separate Bounds
10
# rounds
8
6
4
2
0
0
20
40
60
80
100
120
140
Attack Rate
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Analysis – Fixed Strength
• Lemma 4: For strong enough attacks,
Drum’s expected propagation time is
monotonically increasing as the
percentage of attacked processes
increases
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Expected Propagation Time, Fixed Strength (c = 10)
100
Push, n = 120
Push, n = 500
Pull, n = 120
Pull, n = 500
Drum, n = 120
Drum, n = 500
90
80
# rounds
70
60
50
40
30
20
10
0
0
10
20
30
40
50
60
70
80
90
% attacked processes
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
High-Throughput Experiments
• Multithreaded Java implementation
• Single source creates 40 msgs/sec
• Round duration = 1 second
• Measure throughput and latency at the
receiving processes
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Average Throughput (msgs/sec)
Average Received Throughput, 10% Attacked
45
40
35
30
Drum
Push
Pull
25
20
15
10
5
0
20
40
60
80
100
120
140
Attack Rate
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
CDF: Average Latency of Received Messages, 40% Attacked, Rate = 128
1
0.9
Drum
Push
Pull
% of Correct Processes
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
1000
2000
3000
4000
5000
6000
7000
8000
9000
10000
Average Latency (msecs)
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Summary
• Gossip-based protocols are very robust, but…
– naïve gossip-based protocols are vulnerable to
targeted DoS attacks
• Drum uses simple techniques to mitigate the
•
•
effects of DoS attacks
Evaluations show Drum’s resistance to DoS
The most effective attack against Drum is a
broad one
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
General Principles
• DoS-mitigation techniques:
– random ports
– neighbor-selection by local choices
– separate resource bounds
• Design goal: eliminate vulnerabilities
– The most effective attack is a broad one
• Analysis and quantitative evaluation of
impact of DoS
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004
Gal Badishi
Faculty of Electrical Engineering, Technion
DSN 2004