sos: security overlay service angelos d. keromytis, vishal misra, daniel rubenstein- columbia...

19
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG 2002 Presented by Wei Zhou

Upload: kristin-armstrong

Post on 01-Jan-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

SOS: Security Overlay Service

Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University

ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG 2002

Presented by Wei Zhou

Page 2: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

References A. Keromytis, V. Misra and D.

Rubenstein, “SOS: Secure Overlay Services”, the Proceedings of the ACM SIGCOMM Conference, August 2002

D. Cook, “Analysis of Routing Algorithms for Secure Overlay Service”, Computer Science Department Technical Report CUCS-010-02, 2002

Page 3: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Outline

Introduction System Design Rationale System Architecture Performance Analysis Discussion

Page 4: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Introduction – the problem The Communication by Emergency Services

A critical service (the target) that resides in a well-known location (i.e. IP address).

A group of pre-confirmed users, located anywhere in the wide-area network, who have authentication to communicate with that location.

Example scenario Without protection, such a service can be

easily flooded by DDoS attacks

Page 5: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Design Rationale Intuition

A firewall standing in front of the server

One firewall is NOT enough

Firew

all

Server

Page 6: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Design Rationale (cont.) Replicate the firewall functionality, thus have a

distributed firewall network. A dedicated router set filtering packets that are

not from one of the firewalls.

Assume high-powered routers with light-weight computation.

Server

Filtering router set

Page 7: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Design Rationale (cont.) How to deal with spoofed traffic purporting to

originate from one of these firewalls. Target selects a small set of these firewalls as

the designated authorized forwarding stations, and hides their identities to the public.

Why overlay network? Highly dynamic nature – a node can easily join

in or be taken out from an overlay network. High level of connectivity – there is a (logic)

link between any pair of participating nodes in an overlay network.

Page 8: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

System Architecture – version 1

Source Point

SOAPSOAP

Secret ServletSecret

ServletSecret Servlet

Target

Overlay nodes

Filtered region

Page 9: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

System Architecture (cont.) Preliminary routing mechanism

Each node receiving a packet forwards the packet to another randomly chosen overlay node, until the packet reaches a secret servlet.

Not efficient suppose N overlay nodes and Ns secret servlets,

the expected number of intermediate overlay network nodes that a packet will have to go through is O(N/Ns).

Enhanced routing mechanism Actually CHORD service Enhance the routing efficiency to O(logN) Need to introduce one more type of nodes, beacon,

who also knows the identity of the secret servlet

Page 10: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

System Architecture – version 2

Source Point

SOAPSOAP

Secret ServletSecret

ServletSecret Servlet

Target

BeaconBeaconBeacon

Overlay nodes

Filtered region

Page 11: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Overlay Routing Algorithm – CHORD Servicem = 5 Each node with an ID via a

hash function. Suppose 2m possible ids. Each node contains a table of

m entries. The ith entry in the table of

node x is the 1st node whose id is >= (x + 2i-1(mode 2m))

If node x receives a packet destined to node y, it forwards the packet to the node in its table whose id is closest to, but <= y

For a node y not in the overlay, the node whose id is closest to but >= y stores information about y (i.e. knows that y is not in the overlay)

30

25

22

17

16 12

10

7

3

1

7+1: 107+2: 107+4: 127+8: 16

7+16: 25

16+1: 1716+2: 2216+4: 2216+8: 2516+16: 1

17+1: 22 : :

Page 12: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Overlay Routing Algorithm – CHORD Service CHORD guarantees that a packet will get to its

destination through no more than logN nodes, where N is the size of the overlay.

Multiple destination nodes for a given identifier can be created by using different hash functions. (e.g. the target’s IP can be mapped to several beacons)

By choosing the right class of hash functions, the sequences of nodes used to carry a packet from a node to the destination are independent from one another. (e.g. the paths from a source to different beacons are independent)

CHORD is robust to changes in overlay membership: each node’s list is adjusted to account for nodes leaving and joining the overlay.

Page 13: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Architecture Summary A site (target) selects a number of SOS nodes to act as secret

servlets and sets up its filtering perimeter; A secret servlet, upon informed of its role in the system (request

authenticity verified), computes the key k for each of a number of well-known consistent hash functions, based on the target site’s network address range. Each of these keys will identify a number of overlay nodes that will act as beacons for that target site.

Beacons, will be informed by either the servlets or the target of the servlets’ ids (request authenticity verified).

A source must first contact an overlay access point (SOAP). After authenticating and authorizing the request, the SOAP securely routes all traffic from the source to the target to one of the beacons. The SOAP (and all subsequent hops on the overlay) can route the packet to an appropriate beacon in a distributed fashion using Chord by applying appropriate hash function to the target’s address to identify the next hop on the overlay.

The beacon then routes the packet to a secret servlet that then routes the packet (through the filtering) to the target.

Page 14: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Architecture Summary (cont.) If a SOAP is attacked, the confirmed source

point can simply choose an alternate SOAP by which it enters the overlay.

If a node within the overlay is attacked, the node simply exits the overlay until the attack terminates.

If a beacon is attacked, it exits and the CHORD service self-heals by choosing a new node as that beacon for that hash function.

If a secret servlet is attacked or its identity is breached, the target can simply choose alternate secret servlets.

Page 15: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Performance Analysis of SOS Assumptions

An attacker knows all the overlay nodes, and can attack any of them by bombarding them with traffic, however, an attacker can only manipulate finite resources and bandwidth.

An attacker does not know which nodes are secret servlets or beacons, nor will they infer these identities.

Attackers have not breached the security protocols of the overlay, i.e. their packets can always be identified by SOS nodes as being illegitimate

Each legitimate user can access the overlay through a limited number of SOAPs, but different users access the overlay through different SOAPs

Three analysis models A Static Attack Dynamic Attacks and Recovery Attacking the Underlying Network

Page 16: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Performance Analysis (cont.) A Static Attack

Ph(a, b, c): the probability that a set of b nodes selected randomly from a ≥ b nodes contains a specific subset of c nodes.

Notations: T – the target {Si(T)} - the set of secret servlets Us = |{Si(T)}| {Ai(T)} – the set of SOAPs Uo = |{Ai(T)}| {Bi(T)} – the set of beacons Ub = |{Bi(T)}| na - the number of nodes the attacker attacks US,T – a random variable that equals 1 if S can reach T during an

ongoing attack and 0 otherwise Pr[UT,S = 1] = (1 – Ph(N, na, Us))(1 – Ph(N, na, Ub))(1 – Ph(N, na,

Uo))

Page 17: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Performance Analysis (cont.)

Us = Uo = Ub = 10, na varies

Page 18: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Discussion Combines IP Security, IP router filtering, and Overlay

network routing techniques. Proactive mechanism. SOAPs and secret servlets both are a part of

distributed firewalls. The more the number of nodes in an overlay network,

the more effectively the SOS protects its users from DDoS attacks.

Further questions Attacks from inside the overlay A Shared Secure Overlay – scalability issues Timely delivery

Page 19: SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG

Thank you!