Portcullis: Protecting Connection Setup from DenialofCapability Attacks - PowerPoint PPT Presentation

About This Presentation
Title:

Portcullis: Protecting Connection Setup from DenialofCapability Attacks

Description:

Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks ... Portcullis authors argue TVA's capability setup is broken due to (non-working) ... – PowerPoint PPT presentation

Number of Views:40
Avg rating:3.0/5.0
Slides: 16
Provided by: solipsis
Category:

less

Transcript and Presenter's Notes

Title: Portcullis: Protecting Connection Setup from DenialofCapability Attacks


1
Portcullis Protecting Connection Setup from
Denial-of-Capability Attacks
  • Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian
    Perrig, Bruce Maggs, Yih-Chun Hu
  • Offense Kiaie, A., Teng, X.

2
Outline
  • Relevance
  • Deployment
  • Scalability

3
Relevance?
  • Portcullis is not solution to DoS
  • Portcullis is solution to solution to DoS
  • Assumes capability systems
  • Weaknesses (from Monday)
  • Questionable scalability
  • Does not address adaptive bandwidth issue
  • Questionable deployment plan

4
Relevance?
  • Is TVA broken?
  • Portcullis authors argue TVAs capability setup
    is broken due to (non-working) fair-queuing
  • However TVA paper, section 5.4, Figure 11
    demonstrates that mechanism other than
    fair-queuing, expiring capabilities, limit DoS
    attack effectiveness to 5 seconds
  • Not good enough?
  • Conclusion Portcullis solves nonexistent problem?

5
Deployment?
  • Portcullis requires modification of hosts and
    routers
  • Section 6.1, Figure 3 has nice graph evaluating
    full deployment
  • Modification of all hosts and routers
  • Section 6.4, Figure 5 has nice graph evaluating
    partial deployment
  • Only ISPs upgrade routers
  • All hosts still need to be modified!
  • Conclusion Portcullis has no partial deployment,
    only partial partial deployment

6
Scalability?
  • Theorem 4.1. Under the Portcullis router
    scheduling policy legitimate sender utilizing
    the Portcullis sending policy successfully
    transmits a request packet in O(nm) amount of
    time in expectation, regardless of the strategy
    employed by the adversary.

7
Scalability?
  • Theorem 4.1. Under the Portcullis router
    scheduling policy legitimate sender utilizing
    the Portcullis sending policy successfully
    transmits a request packet in O(nm) amount of
    time in expectation, regardless of the strategy
    employed by the adversary.

8
Scalability?
  • Attackers goal Conquer and use nm hosts such
    that O(nm) gt t such that user gives up
  • gt effective DDoS

9
Scalability?
10
Scalability?
  • Figure 3 shows graph (looks more than linear)
    that says with 20000 attackers, t 8s
  • Median botnet size 45000 (source (Thursday,
    February 16, 2006 312 PM) http//www.washington
    post.com/wp-dyn/content/article/2006/02/16/AR20060
    21601388.html)
  • Assume linear t(45000) 450008/20000 18s
  • Would you give up and go elsewhere if after 18s
    the page has not loaded?
  • Conclusion Portcullis has scalability problem?
    Median likely to be gt 45000 now in 2008

11
Scalability?
  • Our second result states that for any scheduling
    policy and any sending algorithm, a legitimate
    sender cannot perform better than the guarantee
    provided by Theorem 4.1

12
Scalability?
  • Interpretation 1 We are on the way to
    destruction. We have no chance to survive make
    our time.

13
Scalability?
  • Interpretation 2 Big contribution of this paper
    is to show that we should not rely on scheduling
    policy and sending algorithm to solve DoS/DoC
    problem?

14
Summary
  • Portcullis
  • Questionable relevance
  • Questionable deployment plan given huge
    cost-benefit ratio (benefit is small)
  • Questionable scalability

15
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com