Title: A Poisoning-Resilient TCP Stack
1A Poisoning-Resilient TCP Stack
- Amit Mondal
- Aleksandar Kuzmanovic
- Northwestern University
http//networks.cs.northwestern.edu/
2(No Transcript)
3(No Transcript)
4(No Transcript)
5Large-scale TCP Poisoning Attack
- Poison clients instead of servers
- Counter-DoS solutions at the server cannot
protect - Simple see and shoot strategy enough for this
kind of attack
Only monitoring capability is enough
A1 can inject a spoof packet with acceptable
sequence number with RST/FIN flag set
C1
A2
A1 monitors flows in the network
C2
A1
C3
Server
6Possible Scenarios
- Increasing trend of compromising Internet routers
Mizrak et al. DSN05 - A malicious hacker with only monitoring
capability can randomly poison TCP connections
and avoid detection - Music industry against P2P
- Direct Poisoning
- Corrupt content to frustrate users
- Poison P2P connections instead of direct
poisoning - Net Neutrality
- ISPs actively resetting flows like VoIP calls
etc.
7Why TCP Vulnerable to Poisoning Attack?
- Visibility of TCP headers in the network
- TCP end-points behave as dummy state machines
- Easily desynchronized by an outside third party
- We seek solution to this problem through DoS
resilient protocol design - Upgrade TCP from dummy state machine
- Implicit authentication of data packets and
packet stream - We are solving security problem through
congestion control
8Why Not Stronger Solutions?
- Explicit monitoring of packet headers are
required in networks - Advanced congestion control protocols (e.g., RCP,
XCP) - Intrusion-detection mechanisms
- Not implemented/used widely
- Our Goal
- Adopt an alternate approach
- Solve the problem through DoS-resilient protocol
design
9Our Approach
- How to detect attack?
- Deferred protocol reaction
- How to survive the attack?
- Distinguish packet streams from different sources
- Forward nonces
- Identify the valid packet stream
- Self-clocking-based correlation
10How long to defer?
Ideally, deferring time should be the maximum
possible inter-arrival time to detect all attacks
Inter-arrival time depends upon burstiness of
cross traffic as well as round-trip time of the
connection
Setting deferring time to 25 of SRTT yields
detection probability above 99
11Forward Nonces
Past Nonce
Future Nonce
i
i1
i2
Concatenation attack
i1
i1
i2
i
- Chaining mechanism to distinguish among different
packet sources - 8-bit random number
- Overhead 2 bytes/packet
- Limits the attack space
- Attacker can only inject packet w.r.t. sniffed
packet for meaningful attack
12Self Clocking Based Correlation
Idea Exploit strong correlation among packet
inter- departure and inter-arrival times at an
endpoint
IDTi
ACKi
Inter-departure samples
IDTi1
ACKi1
ACKi2
IDTi2
ACKi3
DATAi
DATAi1
IATi
DATAi2
Inter-arrival samples
IATi1
DATAi3
IATi2
Infer legitimate flow based on s
13Internet Experiment
Confirms the accuracy of self-clocking-based
detection method
14Experimental Setup
Taping Point
15Evaluation (1)
Variable queuing delay
Congested environment
Attack detection accuracy remains high for
moderately highly congested network environments
16Evaluation (2)
Link utilization drops sharply even at low attack
rate
Utilization remains high even at high attack rate
Does not go to zero because of high rate of
arrival of short flows
Link utilization remains high even at very high
attack rate with deferred TCP
17Incremental Deployability
Link utilization increases as percentage of
deferring TCP increases
Deferring TCP consume its fair bandwidth share
Regular TCP flows service is easily denied
Modified AIMD parameters to compensate
degradation due to deferred reaction
Presence of attack
Absence of attack
Deferring TCP flows remain highly resilient
during attack and utilize their bandwidth fair
share in absence of attack
18Conclusion
- Large-scale TCP poisoning attack
- Next stage of thriving DDoS attacks
- Stealthy and hard to detect
- Our approach
- Raise the bar instead of providing 100
protection - Our solution
- Uses network measurement for implicit
authentication - Incrementally deployable
- TCP friendly in absence of attack
- Poisoning resilient in presence of attack
19Questions?
20(No Transcript)