Areej Al-Bataineh
4/11/2020 Tracing Cyber Attacks 1
Tracing cyber attacks from the practical perspective
Zhiqiang Gao and Nirwan Ansari
Communications Magazine, IEEE
May 2005 http://www.comsoc.org/tutorials/Ansari
Tracing Cyber Attacks 4/11/2020 2
Outline
Introduction
IP Traceback
Objective
Classification of IP Traceback Schemes
Evaluation of Representative Schemes
Conclusion
Future Work
4/11/2020 Tracing Cyber Attacks 3
Introduction
Denial of service (DoS/DDoS) attacks
Disrupt legitimate access
Costs victims financial and productivity loss
Why Easy to conduct?
Prevalence of attack tools
Stateless nature of Internet
Address Spoofing (Anonymous Attacks)
Gain illegitimate access
Hide attack source
4/11/2020 Tracing Cyber Attacks 4
Intrusion Countermeasure
Prevention
Source/Network/Victim-based
Detection
Mitigation
Rate limiting/statistical/path-based
Response
IP Traceback
Tracing Cyber Attacks 4/11/2020 5
IP Traceback
Objective
Locate the actual source of attack packets
Difficult
Source Address Spoofing
Many attack sources (DDoS)
Host in stepping stone chain
Reflector
Zombie
4/11/2020 Tracing Cyber Attacks 6
Objectives
Grasp global view
Classify Traceback schemes
Select typical schemes
Focus on practicality
Foundation for
Developing efficient schemes
And Effective schemes
4/11/2020 Tracing Cyber Attacks 7
Classification
4/11/2020 Tracing Cyber Attacks 8
Evaluation Metrics
Based on Practicality
Minimum number of packets required for path reconstruction
The less the better
The computational overhead
Good design minimize it
Effectiveness under partial deployment
Deployment implies more cost
Robustness
The ability to perform tracing reliably under adverse conditions
4/11/2020 Tracing Cyber Attacks 9
Representative Schemes
Probabilisic Packet Marking (PPM)
Savage et al (2001)
ICMP traceback (iTrace)
Bellovin (2000)
Source Path Isolation Engine (SPIE)
Snoeren et al (2002)
Algebraic-bases Traceback Approach (ATA)
Dean et al (2002)
Determinnistic Packet Marking (DPM)
Belenky and Ansari (2003)
Overlay-based solution (Center-Track)
Stone (2000)
4/11/2020 Tracing Cyber Attacks 10
Basic PPM
4/11/2020 Tracing Cyber Attacks 11
PPM Variants
Edge-Sampling with p(1-p)^d-i probability
4/11/2020 Tracing Cyber Attacks 12
PPM Variants
Net result in (c) and final result in (d)
4/11/2020 Tracing Cyber Attacks 13
Analysis of PPM
Pros
1.
Low router overhead
2.
Support of incremental deployment
3.
“Post-mortem” tracing
Cons
1.
Heavy computational load for path reconstruction
2.
High false-positives
3.
Spoofed marking
4.
Unaware of path length ( d) in advance
5.
Subverted routers
Good for DoS, not for large-scale DDoS
4/11/2020 Tracing Cyber Attacks 14
Development and Solutions
Advaned and Authenticated PPM
Proposed by Song et al (2001)
Victim knows the mapping of upstream routers
Solves problems 1 , 2 , and 3
PPM with Non-Preemptive Compensation
Proposed by Tseng et al (2004)
Use counters to complement the marking info loss from upstream routers
May address 1 , 3 , and decrease false-positives ( 2 )
15 4/11/2020 Tracing Cyber Attacks
Development and Solutions
Problem 4
Not easy to resolve in the IP layer d is known at AS level
Problem 5
More difficult to resolve
To solve, verification of marking info embedded by upstream routers should be done
No scheme has this feature yet!
16 4/11/2020 Tracing Cyber Attacks
Basic DPM
4/11/2020 Tracing Cyber Attacks 17
Analysis of DPM
Pros
Effectively handles DoS attack
Path construction is simpler
Cons
High false positives for DDoS attack
Cannot identify the ingress router if attacker uses different source IP addresses for each packet
18 4/11/2020 Tracing Cyber Attacks
Development and Solutions
Tracing Multiple Attackers with DPM
Proposed by Belenky and Ansari (2003)
Uses hash function to contain the identity of the ingress edge router
Victim uses identity to combine packets from the same source better than PPM
Far less false positives than PPM
Handles reflector-based DDoS
Subverted routers problem ( 5 )
4/11/2020 Tracing Cyber Attacks 19
iTrace
4/11/2020 Tracing Cyber Attacks 20
Analysis of iTrace
Marking procedure similar to PPM
Shares pros and cons
Differences
Requires additional bandwidth
More marking bits can be used ( 1 , 2 solved)
Requires far fewer ICMP messages than PPM for path reconstruction
21 4/11/2020 Tracing Cyber Attacks
Comparison of ICMP and PPM
4/11/2020 Tracing Cyber Attacks 22
Development and Solutions
Intention-Driven ICMP traceback technology
Proposed by Mankin et al (2001)
Adds some intellegence to the marking procedure
Path reconstruction is gleaned quickly
Solves problems 1 and 2
Problem 3 may be addressed using PKI, but increase overhead at routers
Further work on problems 4 and 5 is needed
23 4/11/2020 Tracing Cyber Attacks
Basic SPIE
4/11/2020 Tracing Cyber Attacks 24
Analysis of SPIE
Deterministic logging scheme
Pros
Supports advanced functions like single packet tracing, transformed packet tracing (wireless)
Cons
Requires additional infrastructure
Incurs very heavy computational, management, and storage overhead
Not scalable
Limited applicability
4/11/2020 Tracing Cyber Attacks 25
Development and Solutions
Large-scale IP traceback
Proposed by Li et al (2004)
Logging scheme by sampling
Construct attack tree by correlating samples
Scale well for 5000 attack sources
4/11/2020 Tracing Cyber Attacks 26
Basic Center-Track
4/11/2020 Tracing Cyber Attacks 27
Analysis of Center-Track
Pros
Handles DDoS
Cons
Enforces heavy management burden on the network
Wears out network resources (bandwidth, processing capability) due to tunnels maintenance
Not scalable
Limited applicability
28 4/11/2020 Tracing Cyber Attacks
Development and Solutions
Secure Overlay Service (SOS)
Associative defensive method
Proactive approach
Employ intensive filtering and anonymity
Effectively mitigate DDoS attacks
No false positives
Low chance for compromised routers
4/11/2020 Tracing Cyber Attacks 29
Conclusion/Future Work
IP Traceback technology is only the first step toward tackling DoS/DDos attacks
Ideal tracing scheme trade-offs
Identify indirect sources of DDoS
Identify attackers who use stepping stone
Integrating IDS with tracebak
Automatic traceback
Scalability
30 4/11/2020 Tracing Cyber Attacks
Future Work
Identify indirect sources of DDoS
Identify attackers who use stepping stone
Integrating IDS with tracebak
Automatic traceback
Scalability
4/11/2020 Tracing Cyber Attacks 31
Questions?
4/11/2020 Tracing Cyber Attacks 32