security related research projects at uccs network research lab

27
1 Security Research 1/10/2003 chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs Security Related Research Projects at UCCS Network Research Lab

Upload: dick

Post on 12-Feb-2016

28 views

Category:

Documents


0 download

DESCRIPTION

Security Related Research Projects at UCCS Network Research Lab. C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs. Outline of the Talk. Brief Introduction to the Network/Protocol Research Lab at UCCS - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Security Related Research Projects  at UCCS Network Research Lab

1Security Research 1/10/2003 chow

C. Edward Chow

Department of Computer ScienceUniversity of Colorado at Colorado Springs

Security Related Research Projects at UCCS Network Research Lab

Page 2: Security Related Research Projects  at UCCS Network Research Lab

2Security Research 1/10/2003 chow

Outline of the Talk Brief Introduction to the Network/Protocol Research Lab at

UCCS Network security related research projects at UCCS

Network/Protocol Research Lab Autonomous Anti-DDoS Project Secure Collective Defense Project BGP/MPLS based VPN Project

Discussion on AFA-UCCS Joint Research/Teaching Projects on Information Assurance Penetration Analysis/Testing exercises? Intrusion Detection/Handling exercises? Other Cyberwarfare related projects? Security Form/Seminar Series

Page 3: Security Related Research Projects  at UCCS Network Research Lab

3Security Research 1/10/2003 chow

UCCS Network Research Lab Personnel:

Director: Dr. C. Edward Chow Graduate students:

– Chandra Prakash: High Available Linux kernel-based Content Switch

– Ganesh Godavari: Linux based Secure Web Switch– Angela Cearns: Autonomous Anti-DDoS (A2D2) Testbed– Longhua Li: IXP-based Content Switch– Yu Cai (Ph.D. research assistant): Multipath Routing– Jianhua Xie (Ph.D.): Secure Storage Networks– Frank Watson: Content Switch for Email Security– Paul Fong: Wireless AODV Routing for sensor networks– Nirmala Belusu: Wireless Network Security PEAP vs. TTLS– David Wikinson/Sonali Patankar: Secure Collective Defense– Murthy Andukuri/Jing Wu: Enhanced BGP/MPLS-based VPN– Patricia Ferrao: Web-based Collaborative System Support

Page 4: Security Related Research Projects  at UCCS Network Research Lab

4Security Research 1/10/2003 chow

UCCS Network Lab Setup Gigabit fiber connection to UCCS backbone Switch/Firewall/Wireless AP:

HP 4000 switch; 4 Linksys/Dlink Switches. Sonicwall Pro 300 Firewall 8 Intel 7112 SSL accelerators; 4 7820 XML directors donated

by Intel. Cisco 1200 Aironet Dual Band Access Point and 350 client

PC/PCI cards (both 802.11a and 802.11b cards). Intel IXP12EB network processor evaluation board

Servers: Two Dell PowerEdge Servers. Workstations/PCs:

8 Dell PCs (3Ghz-500Mhz); 12 HP PCs (500-233Mhz) 2 laptop PCs with Aironet 350 for mobile wireless OS: Linux Redhat 8.0; Window XP/2000

Page 5: Security Related Research Projects  at UCCS Network Research Lab

5Security Research 1/10/2003 chow

HP4000SWGigibit Fiber to UCCS Backbone&WorkstationDell ServerIntel IXP Network Processor

Page 6: Security Related Research Projects  at UCCS Network Research Lab

6Security Research 1/10/2003 chow

Intel 7110 SSL Accelerators 7280 XML Director

Page 7: Security Related Research Projects  at UCCS Network Research Lab

7Security Research 1/10/2003 chow

DDoS: Distributed Denial of Service Attack

DDoS Victims:Yahoo/Amazon

2000CERT

5/2001DNS Root Servers

10/2002

DDoS Tools:Stacheldraht

TrinooTribal Flood Network (TFN)

Agent(Attacker)

Agent(Attacker)

Agent(Attacker)

Handler(Middleman)

Agent(Attacker)

Handler(Middleman)

Agent(Attacker)

Agent(Attacker)

Agent(Attacker)

Agent(Attacker)

Client(Attack Commander)

MastermindIntruder

Page 8: Security Related Research Projects  at UCCS Network Research Lab

8Security Research 1/10/2003 chow

How wide spread is DDoS? Research by Moore et al of University of California at

San Diego, 2001. 12,805 DoS in 3-week period Most of them are Home, small to medium sized

organizations

Page 9: Security Related Research Projects  at UCCS Network Research Lab

9Security Research 1/10/2003 chow

Intrusion Related Research Areas Intrusion Prevention

General Security Policy Ingress/Egress Filtering

Intrusion Detection Anomaly Detection Misuse Detection

Intrusion Response Identification/Traceback/Pushback Intrusion Tolerance

Page 10: Security Related Research Projects  at UCCS Network Research Lab

10Security Research 1/10/2003 chow

Security Related Research Projects Secure Content Switch Autonomous Anti-DDoS Project

Deal with Intrusion Detection and Handling; Techniques:

– IDS-Firewall Integration– Adaptive Firewall Rules – Easy to use/manage.

Secure Collective Defense Project Deal with Intrusion Tolerance; How to tolerate the attack Techniques (main ideaExplore secure alternate paths for clients to come in)

– Multiple Path Routing– Secure DNS extension: how to inform client DNS servers to add alternate new entries– Utilize a consortium of Proxy servers with IDS that hides the IP address of alternate

gateways. BGP/MPLS based VPN Project Content Switch for Email Security.

Page 11: Security Related Research Projects  at UCCS Network Research Lab

11Security Research 1/10/2003 chow

Design of an Autonomous Anti-DDOS Network (A2D2)

Graduate Student: Angela Cearns Goals:

Study Linux Snort IDS/Firewall system Develop Snort-Plug-in for Generic Flood Detection Investigate Rate Limiting and Class Based Queueing

for Effective Firewall Protection Intrusion Detection automatically trigger adaptive

firewall rule update. Study QoS impact with/without A2D2 system.

http://cs.uccs.edu/~chow/pub/master/acearns/doc/

Page 12: Security Related Research Projects  at UCCS Network Research Lab

12Security Research 1/10/2003 chow

Attack

Attack Attack

Private Subnet192.168.0

Attack Network128.198.61

IP: 128.198.61.12NM: 255.255.255.128

GW: 128.198.61.1

eth0

Pluto

Titan

DMZ

Multi-LevelRate Limiting

Class-BasedQueuing

(CBQ)

as Linux Router

Firewall(iptables)

Security Policy

IP: 192.168.0.1NM: 255.255.0.0

GW: 128.198.61.12

eth1

RealServer

Re

alS

erv

er

Tra

ffic

IDS

Ale

rts

trig

ge

r M

ulti

-Leve

lR

ate

-Lim

itin

g

IDS

70

% H

TT

P, R

ea

lPla

yer

15

% S

MT

P,

PO

P3

1

0%

SS

H,

SF

TP

5

% S

YN

, IC

MP

, D

NS

10 Mbps Hub

eth0

IP: 192.168.0.2NM: 255.255.0.0GW: 192.168.0.1Public Network

128.198

Internet

Alpha128.198.61.15

DDoSAgent

Gamma128.198.61.17

DDoSAgent

Beta128.198.61.16

DDoSAgent

Delta128.198.61.18

DDoSAgent

SimulatedInternet

100Mpbs Switch

Master Client& Handler

DDoS

Saturn128.198.61.11

NM: 255.255.255.128GW: 128.198.61.1

AutonomousAnti-DDoS

Network (A2D2)

Client1128.198.a.195

Real Player Client

Client2128.198.b.82

Real Player Client

Client3128.198.c.31

Real Player Client

100Mpbs Switch

Page 13: Security Related Research Projects  at UCCS Network Research Lab

13Security Research 1/10/2003 chow

A2D2 Multi-Level Adaptive Rate

Limiting

IP: 128.198.61.12NM: 255.255.255.128

GW: 128.198.61.1

eth0

Firewall Gateway

Multi-LevelRate Limiting

as Linux Router

IP: 192.168.0.1NM: 255.255.0.0

GW: 128.198.61.12

eth1

IDS

snort.confFloodPreprocessor

Threshold

snort.confFloodRateLimiter

PreprocessorThresholds

rateif.conflevels, rate,expiration,port # etc.

./snort -A UNSOCK

report.c./alert

rateif.pl

Level 4

Open(5 days)

Level 3

100 p/s

Level 2

50 p/s

Level 1

Block(2 hrs)

Level 0

Block(2 days)

Level 1Expires

Page 14: Security Related Research Projects  at UCCS Network Research Lab

14Security Research 1/10/2003 chow

A2D2 QoS Results - Baseline

10-min Video Stream betweenReal Player &Real Server

Packets Received: Around 23,000

(23,445)

No DDoS Attack

QoS Experienced at A2D2 by Real Player Client with No DDoS

Playout Buffering to Avoid Jitter

Page 15: Security Related Research Projects  at UCCS Network Research Lab

15Security Research 1/10/2003 chow

A2D2 Results – Non-stop Attack Packets Received: 8,039

Retransmission Request: 2,592

Retransmission Received: 35

Lost: 2,557

Connection Timed-out

QoS Experienced at A2D2 Client

Lost of Packets

Page 16: Security Related Research Projects  at UCCS Network Research Lab

16Security Research 1/10/2003 chow

A2D2 Results – UDP AttackMitigation: Firewall Policy

Packets Received: 23,407

Retransmission Request: 0 Retransmission Received: 0 Lost: 0

Look like we just need plainold Firewall rules, no fancy Rate Limiting/CBQ?

QoS Experienced at A2D2 Client

Page 17: Security Related Research Projects  at UCCS Network Research Lab

17Security Research 1/10/2003 chow

A2D2 Results – ICMP AttackMitigation: Firewall Policy

Packets Received: 7,127

Retransmission Request: 2,105

Retransmission Received: 4

Lost: 2,101

Connection Timed-out

Just plain old firewall ruleis not good enough!

QoS Experienced at A2D2 Client

Packet/Connection Loss

Page 18: Security Related Research Projects  at UCCS Network Research Lab

18Security Research 1/10/2003 chow

A2D2 Results – TCP AttackMitigation: Policy+CBQ

Turn on CBQ Packets Received: 22,179

Retransmission Request: 4,090

Retransmission Received: 2,641

Lost: 1,449

Screen Quality Impact!

QoS Experienced at A2D2 Client

Look OK But Quality Degrade

Page 19: Security Related Research Projects  at UCCS Network Research Lab

19Security Research 1/10/2003 chow

A2D2 Results – TCP AttackMitigation: Policy+CBQ+RateLimiting

Turn on Both CBQ & Rate Limiting

Packets Received: 23,444

Retransmission Request: 49 – 1,376

Retransmission Received: 40 – 776

Lost: 9 – 600

No image quality degradation

QoS Experienced at A2D2 Client

Page 20: Security Related Research Projects  at UCCS Network Research Lab

20Security Research 1/10/2003 chow

A2D2 Future Works Extend to include IDIP/Pushback Anomaly Detection Improve Firewall/IDS Processing Speed Scalability Issues

Tests with More Services TypesTests with Heavy Client Traffic Volume

Fault Tolerant (Multiple Firewall Devices) Alternate Routing

Page 21: Security Related Research Projects  at UCCS Network Research Lab

21Security Research 1/10/2003 chow

Wouldn’t it be Nice to Have Alternate Routes?

DNS1

...

Victim

AA A A A A A A

net-a.com net-b.com net-c.com

DNS2 DNS3

... ......

R R R

RR2 R1R3

Alternate Gateways

DNS

DDoS Attack TrafficClient Traffic

How to reroute clients traffic through R1-R3?

Page 22: Security Related Research Projects  at UCCS Network Research Lab

22Security Research 1/10/2003 chow

Implement Alternate Routes

DNS1

...

Victim

AA A A A A A A

net-a.com net-b.com net-c.com

DNS2 DNS3

... ......

R R R

RR2 R1R3

Alternate Gateways

DNS

DDoS Attack TrafficClient Traffic

Need to Inform Clients or Client DNS servers!

But how to tell which Clients are not compromised?

How to hide IP addresses of

Alternate Gateways?

Page 23: Security Related Research Projects  at UCCS Network Research Lab

23Security Research 1/10/2003 chow

Possible Solution for Alternate Routes

DNS1

...

Victim

AA A A A A A A

net-a.com net-b.com net-c.com

DNS2 DNS3

... ......

R R R

R

Sends Reroute Command with DNS/IP Addr. Of Proxy and Victim

distress call

Proxy1Proxy2 Proxy3

Blocked by IDSR2R1 R3

blockAttack msgs blocked by IDS

New route via Proxy3 to R3

Page 24: Security Related Research Projects  at UCCS Network Research Lab

24Security Research 1/10/2003 chow

Secure Collective Defense Main IdeaExplore secure alternate paths for clients to come in; Utilize

geographically separated proxy servers. Goal:

Provide secure alternate routes Hide IP addresses of alternate gateways

Techniques: Multiple Path Routing Secure DNS extension: how to inform client DNS servers to add alternate new

entries (Not your normal DNS name/IP address mapping entry). Utilize a consortium of Proxy servers with IDS that hides the IP address of

alternate gateways. How to partition clients to come at different proxy servers?

may help identify the attacker! How clients use the new DNS entries and route traffic through proxy server?

Use Sock protocol, modify resolver library?

Page 25: Security Related Research Projects  at UCCS Network Research Lab

25Security Research 1/10/2003 chow

New UCCS IA Degree/Certificate Master of Engineering Degree in Information Assurance Certificate in Information Assurance (offered to Peterson

AFB through NISSC) Computer Networks; Fundamental of Security;

Cryptography; Advanced System Security Design

Page 26: Security Related Research Projects  at UCCS Network Research Lab

26Security Research 1/10/2003 chow

New CS691 Course on Advanced System Security Design

Use Matt Bishop new Computer Security Text Spring 2003: With one class at UCCS; one at Peterson

AFB. Potential use/cooperation with Distribute Security Lab of

Ratheon? Integrate security research results into course material

such as A2D2, Secure Collective Defense, MPLS-VPN projects.

Invite speakers from Industry such as Innerwall and AFA?

Looking for potential joint exercises with other institutions such as AFA.

Page 27: Security Related Research Projects  at UCCS Network Research Lab

27Security Research 1/10/2003 chow

Joint Research/Teaching Effort on Information Assurance

Penetration Analysis/Testing exercises?

Intrusion Detection/Handling exercises?

Other Cyberwarfare related projects?

Security Forum organized by Dean Haefner/Dr. Ayen

Security Seminar Series with CITTI funding support

Look for Speakers (suggestion?)