Title: Low-rate TCP-Targeted Denial of Service Attacks Aleksandar Kuzmanovic and Edward W. Knightly
1Low-rate TCP-Targeted Denial of Service
AttacksAleksandar Kuzmanovic and Edward W.
Knightly
- Presented by
- Prasanth Kalakota Ravi Katpelly
2Outline
- Introduction
- TCP timeout mechanism
- DOS outages
- Counter DOS techniques
- Conclusion
3Introduction
- DoS Attacks
- Prevent access to legitimate users
- Consume resources
- Various Types TCP SYN, ICMP broadcasts, DNS
flood attacks - Shrew attacks or Low Rate DoS attacks
4TCP Congestion Control
- Uses Additive Increase Multiplicative Decrease
(AIMD) - Uses Retransmission Timeout (RTO) to avoid
congestion - Selection of RTO value
- Case (i) If too low spurious retransmissions
occurs - Case (ii) If too high, flows will wait
unnecessarily long
5TCP Congestion Control (cntd)
- To solve the first case, time out value should be
at least 1 sec. (suggested and verified by Allman
and Paxson) - For the second case, TCP sender maintains two
states. - Smooth Round Trip Time (SRTT)
- Round Trip Time Variation (RTTVAR)
6Terms used
- RTT
- RTO
- SRTT
- RTTVAR
- minRTO
7TCPs Timeout Mechanism
- Suggested in RFC 2988
- When First time RTT is measured
- SRTT R, RTTVAR R/2,
- RTO SRTT max(G, 4RTTVAR)
- When subsequent RTT measurement is made
- RTTVAR (1-ß)RTTVAR ßSRTT-R
- SRTT (1-a)SRTT aR
- RTO max(minRTO, SRTT max(G, 4RTTVAR)).
- a 1/4 and ß 1/8
8Low-Rate DoS Attacks
- Attackers exploit TCP Timeout mechanism
- Send short duration bursts with length equal to
RTT scale burst length - Repeat these things periodically at slower RTO
time scales
9Model of DoS Attack (Simple DoS Model)
- Assume single TCP flow and single DoS stream
- Attacker sends short duration burst at time t0
- The TCP sender waits 1sec and doubles RTO.
- Attacker sends the second outage between 1 and
12RTT
10Model of DoS Attack (cntd)
11Model of DoS Attack (cntd)
- N TCP flows with heterogeneous RTTs and single
DoS flow.
12Model of DoS Attack (cntd)
- DoS TCP Throughput Result
- Assume periodic DoS attack with period T
- L gt RTTi
- minRTO gt SRTTi 4RTTVARi for all i1,..,n
- Normalized throughput of the aggregate TCP flow
is given by
13Model of DoS Attack (cntd)
- DoS TCP Flow-Filtering Result
- For i 1,.,k
- L RTTi and
- minRTO gt SRTTi 4RTTVARi
- For j k1,.,n
- L lt RTTj and
- minRTO SRTTj 4RTTVARj
14Model of DoS Attack (cntd)
15Creating DoS outages
- Instantaneous Queue Behavior
- B Queue Size
- B0 Queue Size at the onset of an attack
- RTCP Instantaneous rate of the TCP flow.
- RDoS Rate of DoS flow
- T DoS burst length
- L Duration of attack
- C Bottleneck Rate
- Time at which Queue becomes full is given by
- L1 (B-B0)/(RDoSRTCP-C)
16Creating DoS outages (cntd)
- Queue remains full for L2 L L1 seconds if
RDoSRTCP C - If No TCP Traffic and if B00, Time at which
Queue becomes full is given by - L1 B/(RMAX-C)
- If the buffer is full attacker reduces its rate
to bottleneck rate C.
17Minimum Rate DoS Streams
18Impact of shrew DoS Attack on TCP flow aggregation
- With homogeneous RTT
- With heterogeneous RTT
- On web traffic
- On TCP variants
19Low-rate DoS stream with Homogeneous RTT
20Low-rate DoS stream with Heterogeneous RTT
- Depends on its RTT
- Shorter RTT flows use more bandwidth
21Low-rate DoS stream with Heterogeneous RTT (cntd)
- With increased TCP flows unused bandwidth
utilized by higher RTT flows - Total TCP throughput increase
22Impact of DoS Burst Length
- Flows with longer RTTs filtered
- Less no of non-filtered flows
23Impact of DoS Peak Rate on Short-RTT Flow
- Throughput of short-RTT flow effected
- Low peak rate sufficient to filter short-RTT flow
24Impact on HTTP Traffic
25Dos Attacks on TCP Variants
26Dos Attacks on TCP Variants (cntd)
27DoS Experiments on Internet
28Results
29Counter-DOS Techniques
- Router-Assisted Mechanisms
- End-point minRTO Randomization
30Router-Assisted Mechanisms
- Router-Based algorithms
- Random early detection with preferential dropping
(RED-PD)
31Router-Assisted Mechanisms (cntd)
32Router-Assisted Mechanisms (cntd)
33End-Point minRTO Randomization
34Conclusions
- Presented DoS attacks that are able to throttle
TCP flows. - Discussed impact of various DoS Attacks on TCP
flow aggregation - Experiments conducted using combination of
analytical modeling, extensive set of simulations
and internet experiments - Discussed Counter DoS Techniques