spinoza: a comprehensive framework for ddos detection and...

29
A Comprehensive Framework For DDoS Resiliency in the Cloud Mohammad Noureddine PERFORM Group UIUC

Upload: others

Post on 22-May-2020

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

A Comprehensive Framework For DDoS Resiliency in the

CloudMohammad Noureddine

PERFORM GroupUIUC

Page 2: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Introduction•DDoS attacks are becoming very effective•Easy to launch attacks

• DDoS as a Service• $38 for one hour/month attack subscription service

•“Subleasing” botnets containing millions of hosts• User machines, mobile devices, IoT devices, etc.

•Largest recorded DDoS assault at 650 Gbps

1

Page 3: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Motivation•DDoS is far from being solved

2Imperva DDoS Threat Landscape Report 2015-2016

Presenter
Presentation Notes
Application layer attacks still constitute the largest part of the attacks.
Page 4: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Attack Capabilities•Majority of botnets are still primitive

3Imperva DDoS Threat Landscape Report 2015-2016

Presenter
Presentation Notes
The figure shows the application level attacks in their complexity, The majority of which are still primitive using only SYN floods.
Page 5: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

The Cloud•Cloud adoption rates are increasing

• Cloud providers making it easier•Provides flexibility and elasticity

• Efficient use of ever-increasing capacity•Lucrative targets for DDoS attacks•Does profit drive security?

• Telemetry infrastructure unexploited

4

Presenter
Presentation Notes
From the last question, I want to argue that in this case profit can help in driving security. Because cloud providers need telemetry services to drive profit, they have enabled a rich monitoring infrastructure that can be used for security monitoring.
Page 6: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Traditional Approaches•Often very intrusive

• Capabilities require changes to core routers•Require cooperation between ISPs

• Unlikely to happen without enforcement•Require expensive classification of hosts

• IP traceback is expensive and easily fooled•Very few make use of the cloud

• The ones that are often proprietary

5

Presenter
Presentation Notes
Capabilities require changes to the Internet infrastructure, and still face a DDoS against the capabilities channel itself.
Page 7: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Requirements•We need to detect DDoS attacks

• Distinguish between high load and DDoS•We need to effectively respond to attacks

• Trigger protection mechanism• Maintain operation

•We need to scale up horizontally if possible• High availability, Content Delivery Networks (CDN)

6

Page 8: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Approach

7

Presenter
Presentation Notes
Make sure to mention that we are focusing on TCP SYN attacks and application level attacks.
Page 9: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

System Model

8

Page 10: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Data Collection•Openstack, EC2, Azure provide strong telemetry infrastructure• Make use of it for security monitoring

•Openstack ceilometer• Complemented with Gnocchi for current and future

versions• Time series database as a service

9

Page 11: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Ceilometer

10

Page 12: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Change Point Detection•Statistical detection of abrupt changes in normal behavior

•Traditionally, observe•Δ𝑡𝑡 = {𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑞𝑞𝑡𝑡 − 𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑝𝑝𝑡𝑡}, 𝑡𝑡 = 0,1,2, …• Focuses only on network information • Myopic to performance of server instances

11

Page 13: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

In Our Approach•Ceilometer data collection

• Disk usage, CPU utilization, Memory utilization, Network utilization

• [Apache logs]•Define new sample vector

•𝚫𝚫𝐭𝐭 = {𝑑𝑑𝑑𝑑𝑑𝑑𝑘𝑘𝑡𝑡 , 𝑐𝑐𝑝𝑝𝑢𝑢𝑡𝑡 ,𝑚𝑚𝑆𝑆𝑚𝑚𝑡𝑡 , 𝑟𝑟𝑆𝑆𝑞𝑞𝑡𝑡 , 𝑟𝑟𝑆𝑆𝑝𝑝𝑡𝑡}𝑇𝑇• Provides richer definition of normal behavior • Covers larger space of attacks

12

Page 14: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Client Puzzles•Efficient stateless proof of work

• Receive service only after appropriate “payment”•No puzzle solution required under regular load•Non intrusive, no infrastructure change required•Puzzle mechanism initiated upon attack detection

• Use historical data to select puzzle complexity• Mechanism/Incentive design problem

13

Page 15: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Puzzle Protocol

14

Page 16: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Puzzle Construction•Each puzzle is compose of 𝑘𝑘 sub-puzzles

• Each sub-puzzle of length 𝑚𝑚 bits•Solve by brute force

15

Presenter
Presentation Notes
On average same amount of work for (k+m) 1 subpuzzle K subpuzzles of length m each But probablity to guess is lower for the second
Page 17: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Effectiveness•Stateless mechanism to filter clients

•Serious rate limiting on the client side

•More complexity comes at lower cost for server

16

Presenter
Presentation Notes
Note that increasing the number of bits per puzzle has no cost on the server
Page 18: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Limitations•Can be DDoS’ed

• More efficient ways to generate and check puzzles• White/Black listing clients based on history• Still better than SYN flood attacks

•How to pick 𝑘𝑘 and 𝑚𝑚• Currently fixed for all users• Increased for everyone when attack intensifies • Mechanism/Incentive design problem

17

Page 19: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Choosing 𝑘𝑘 and 𝑚𝑚•Provide service for those who actually want it•Motivation from network pricing •𝑥𝑥𝑖𝑖: Request rate for client 𝑑𝑑•Define utility for each client

𝑈𝑈𝑖𝑖 𝑥𝑥𝑖𝑖 , 𝑥𝑥−𝑖𝑖 = log 1 + 𝑥𝑥𝑖𝑖 − 𝑃𝑃𝑢𝑢𝑃𝑃𝑃𝑃𝑃𝑃𝑆𝑆𝑃𝑃𝑃𝑃𝑑𝑑𝑡𝑡𝑖𝑖 − 𝑆𝑆𝑆𝑆𝑟𝑟𝑆𝑆𝑑𝑑𝑐𝑐𝑆𝑆𝑆𝑆𝑆𝑆𝑃𝑃𝑆𝑆𝑆𝑆

18

Page 20: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Time to Solve a Puzzle •Expected number of hashes to solve a puzzle is 𝑘𝑘 ×

2 𝑚𝑚−1

19

Page 21: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Service Delay• Model application service as an M/M/c queue

• c is the number of server replicas

• Rate of arrivals 𝜆𝜆 = ∑𝑖𝑖 𝑥𝑥𝑖𝑖𝑁𝑁

, 𝑆𝑆 being the number of flows• Service rate 𝜇𝜇 is estimate from ab and other stress

testing tools• Analytical solution for expected wait time 𝑊𝑊

• Function of 𝜌𝜌 = 𝜆𝜆𝑐𝑐𝑐𝑐

20

Presenter
Presentation Notes
Interestingly W is convex which is great for analytical solutions
Page 22: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Service Time Estimate

21

Page 23: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Stackelberg Game (Mechanism Design)•𝑈𝑈𝑖𝑖 𝑥𝑥𝑖𝑖 , 𝑥𝑥−𝑖𝑖 = log 1 + 𝑥𝑥𝑖𝑖 − 𝑘𝑘𝑖𝑖2 𝑚𝑚𝑖𝑖−1 𝑥𝑥𝑖𝑖 −𝑊𝑊•𝑊𝑊 is a function of 𝑥𝑥𝑖𝑖 and 𝑥𝑥−𝑖𝑖•Solve for equilibrium rates 𝑥𝑥𝑖𝑖∗

•𝑈𝑈𝑖𝑖 𝑥𝑥𝑖𝑖∗, 𝑥𝑥−𝑖𝑖∗ ≥ 𝑈𝑈𝑖𝑖 𝑥𝑥𝑖𝑖 , 𝑥𝑥−𝑖𝑖∗ ∀𝑥𝑥𝑖𝑖 ,∀𝑑𝑑•The cloud’s design problem is to find 𝑘𝑘𝑖𝑖∗ and 𝑚𝑚𝑖𝑖

• argmax𝑝𝑝𝑖𝑖,𝑘𝑘𝑖𝑖∈ℕ

∑𝑖𝑖 log 1 + 𝑥𝑥𝑖𝑖∗ − ∑𝑖𝑖(𝑚𝑚𝑖𝑖 × 𝑘𝑘𝑖𝑖)𝑥𝑥𝑖𝑖∗

22

Presenter
Presentation Notes
This is a bit sloppy but just to illustrate the point Looking for social optimum as well as possible minimum for cost on the server end
Page 24: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Horizontal Scaling Ideas•Adding more replicas naively•Give networking and compute budgets

• Solve optimization problem •Think in terms of the queueing model

• Scale up to keep 𝜌𝜌 < 1

23

Page 25: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

OpenStack Deployment

24

Page 26: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Infrastructure and Applications•Deployment composed of 4 servers and 6 commodity machines

•Running Wordpress server replicas with MySQL backend

•NginX load balancer

25

Page 27: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Steps for Evaluation•Evaluate change point detection mechanism•Simulations to evaluate puzzle difficulty selection •Comprehensive evaluation

• Simulate normal and heavy load using stress testing tools

• Simulate attack using botnet simulator

26

Page 28: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Major Challenge•We have tried multiple deployment tools• Each claim to be the “Chuck Norris”

of deployment•Lack of documentation for troubleshooting deployment errors

•Biggest success with Ubuntu Autopilot so far

27

Page 29: SPINOZA: A Comprehensive Framework For DDoS Detection and ...publish.illinois.edu/science-of-security-lablet/files/2017/07/04272017... · A Comprehensive Framework For DDoS Resiliency

Conclusion•Comprehensive design for resilient applications in a private cloud

•Uses telemetry infrastructure for monitoring•Uses client puzzles for DDoS protection under attack

•Provides horizontal scaling to guarantee performance

28