SlideShare a Scribd company logo
1 of 33
Download to read offline
DDoS Defense Mechanisms
for IXP Infrastructures
Tim Dijkhuizen
Lennart van Gijtenbeek
SNE: Research Project II
03-07-2018
Supervisor: Stavros Konstantaras (AMS-IX)
DDoS Defense Mechanisms for IXP Infrastructures
Introduction
2
● Distributed Denial of Service
● DDoS attacks on banks in NL [1]
● DDoS launched via botnets/booters
● Increase in size and complexity [2]
● IXP is a central entity
● Challenges:
○ High traffic loads
○ IXP neutrality
○ Complex infrastructure
DDoS Defense Mechanisms for IXP Infrastructures
Research Question
3
What (automated) solution can be developed to
identify and mitigate DDoS attacks in an IXP network?
Image source - thenounproject.com
DDoS Defense Mechanisms for IXP Infrastructures
Internet eXchange Points (IXPs)
● Peering LAN (BGP)
● Exchange of traffic
● Wide range of networks connected
○ Such as banks, content providers, etc.
● Layer 2 forwarding (no routing)
● Route servers
4
DDoS Defense Mechanisms for IXP Infrastructures
Amsterdam Internet Exchange (AMS-IX)
● ~820 peers
● 5 Tbit/s peaks each day
● Traffic forwarding: MPLS/VPLS
● Statistics collector: sFlow
● Route server: BIRD
● Current DDoS solution
○ Disable port(s), NaWas
5
DDoS Defense Mechanisms for IXP Infrastructures
Types of DDoS Attacks
6Image source - nbip.nl/nl/2018/05/16/nbip-ddos-data-report-2017-now-available/
DDoS Defense Mechanisms for IXP Infrastructures
Types of DDoS Attacks cont'd
● Volumetric attacks
○ Amplification attacks
■ E.g. DNS amplification
■ Small request, large response
● Protocol attacks
○ E.g. TCP SYN flood
○ State exhaustion
● Application attacks
○ Layer 7
● No single detection method
● Distinct in: bandwidth and packets per second
7Image source - thenounproject.com
DDoS Defense Mechanisms for IXP Infrastructures
Design Principles
1. Mitigate as close to the source as possible
2. No configuration required on the CEs
3. No congestion in the IXP core
4. Identification and mitigation on
lower layers is preferred
5. Detect most common DDoS attacks
6. Intelligence resides in the IXP
7. Minimal impact on good traffic
8. IXP neutrality
9. Compatibility
8
DDoS Defense Mechanisms for IXP Infrastructures
Detection Methods
● Traffic monitoring needed
○ PE switches
○ Sample data: sFlow/Netflow
● L2 detection
○ L2 headers are too limited
■ Frame size, CRC
○ Other parameters
■ Send rate, arrival interval
● L3/L4 detection
9
DDoS Defense Mechanisms for IXP Infrastructures
Detection Methods cont'd
● Threshold-based detection
○ Calculate thresholds based on destination IP(s)
■ Scalability: thresholds on prefixes
■ IXP environment: per source AS
○ Metrics:
■ L2/L3: BPS, PPS
■ L4: TCP flags, source ports, destination ports
● Fingerprint-based detection
○ DDoSDB [3]
○ False negatives
10
DDoS Defense Mechanisms for IXP Infrastructures
Mitigation Methods
● Scrubbing
○ On-site
■ Proprietary box
○ Off-site
■ NaWas
● Access Control Lists
● Software Defined Networking (SDN)
● BGP Blackholing
11
DDoS Defense Mechanisms for IXP Infrastructures
Blackholing Techniques with BGP
● Source-based blackholing
○ IXP neutrality
○ IP spoofing / false positives
● Destination-based blackholing on the CE
1. Route withdrawal
2. Static routing entry for prefix to Null0
and announce next-hop
● Destination-based blackholing on the PE
○ Set CE next-hop to ARP-dummy
○ L2 ACL
12
DDoS Defense Mechanisms for IXP Infrastructures
Design Proposal
13Image source - thenounproject.com
DDoS Defense Mechanisms for IXP Infrastructures
Added Components to IXP
14
DTM = DDoS Threat Mitigator
DDoS Defense Mechanisms for IXP Infrastructures
Component Interaction
15
DTM = DDoS Threat Mitigator
DTA = DDoS Threshold Adviser
CTA = Current Traffic Analyzer
DDoS Defense Mechanisms for IXP Infrastructures
Design Proposal
16
Threshold-based detection
Three-way mitigation
DDoS Defense Mechanisms for IXP Infrastructures
Design Workflow
17
DDoS Defense Mechanisms for IXP Infrastructures
Identification Start Phase (1.1)
1. Peer starts the process
2. Identify PE port(s) of the victim
3. Get the CE IP, and announced prefixes (RS)
4. Start the DTA/CTA
○ Based on victim ports, and destination prefixes
5. Perform threshold comparisons
6. Present customer with exceeded prefixes
○ Customer decides which prefixes to mitigate
18
DDoS Defense Mechanisms for IXP Infrastructures
Mitigation Start Phase (1.2)
1. Determine the culprit AS(es)
○ Compare current to historical traffic
○ ASes to mitigation prefix
2. Determine mitigation workflow
○ Culprit AS is peered with RS:
■ Perform mitigation via BGP route withdrawal (phase 2.1)
○ Culprit AS is NOT peered with RS:
■ Perform mitigation via ACL on the ingress PE
(phase 2.3)
19
DDoS Defense Mechanisms for IXP Infrastructures
CE Route Withdrawal Mitigation (2.1)
● Instruct the RS to withdraw
the destination prefix to culprit
○ Wait for <BGP_convergence_timeout>
● Threshold is still exceeded:
○ Method unsuccessful, restore original BGP announcement
○ Perform mitigation via BGP blackhole nexthop (phase 2.2 )
● Threshold is NOT exceeded:
○ Continue mitigation until DDoS no longer active
○ DDoS stopped or mitigation still working?
20
DDoS Defense Mechanisms for IXP Infrastructures
CE Blackhole Next-hop Mitigation (2.2)
● Instruct the RS to announce
blackhole next-hop to culprit
○ Wait for <BGP_convergence_timeout>
● Threshold is still exceeded:
○ Method unsuccessful, restore original BGP announcement
○ Perform mitigation via L2 ACL (phase 2.3)
● Threshold is NOT exceeded:
○ Continue mitigation until DDoS no longer active
○ Monitor on ingress PE
21
DDoS Defense Mechanisms for IXP Infrastructures
PE L2 ACL Mitigation (2.3)
● Determine MAC addresses
and DDoS ingress PE
● Instruct the PE to set up L2 ACL on the ingress PE
○ Based on source CE and destination CE
○ Wait for <ACL_timeout>
● Threshold is still exceeded:
○ Identification unsuccessful, remove ACL and go to phase 1.1
● Threshold is NOT exceeded:
○ Continue mitigation until DDoS no longer active
○ Monitor on ingress PE
22
DDoS Defense Mechanisms for IXP Infrastructures
Proof of Concept
23
● Focused on mitigation phases
○ Prefix identification, DTA, culprit AS identification
● Four different scenarios
○ Peered with RS:
■ 2.1 ✔
■ 2.1 ✘, 2.2 ✔
■ 2.1 ✘, 2.2 ✘, 2.3 ✔
○ Not peered with RS:
■ 2.3 ✔
DDoS Defense Mechanisms for IXP Infrastructures
Proof of Concept cont'd
24
The DTM here also functions as the statistics collector
FastNetMon: DDoS detector that supports multiple packet capture engines
iPerf to generate traffic
DDoS Defense Mechanisms for IXP Infrastructures
● Culprit AS is peered with RS
● BGP route withdrawal mitigation (2.1)
● Converge timeout: 10s, analysis: 4s
● 50Mbit normal traffic, 150Mbit threshold
Proof of Concept cont'd
25
BPS (Mbit)
Threshold (Mbit)
BPS(Mbit)
Time (s)
Mitigation Scenario 1
Threshold detected
and performing 2.1 mitigation at 27s
2.1 converge timeout at 37s2.1 mitigation successful at 41s
DDoS Defense Mechanisms for IXP Infrastructures
Proof of Concept cont'd
● Culprit AS is peered with RS
● BGP route withdrawal mitigation unsuccessful (2.1)
● BGP blackhole next-hop mitigation (2.2)
26
BPS (Mbit)
Threshold (Mbit)
BPS(Mbit)
Time (s)
Mitigation Scenario 2
Threshold detected
and performing 2.1 mitigation at 26s
2.1 NOT successful and
performing 2.2 mitigation at 40s
2.1 converge timeout at 36s2.2 converge timeout at 44s2.2 mitigation successful at 55s
DDoS Defense Mechanisms for IXP Infrastructures
Proof of Concept cont'd
● Culprit AS is peered with RS
● BGP route withdrawal mitigation unsuccessful (2.1)
● BGP blackhole next-hop mitigation unsuccessful (2.2)
● Ingress PE L2 ACL mitigation (2.3)
27
BPS (Mbit)
Threshold (Mbit)
BPS(Mbit)
Time (s)
Mitigation Scenario 3
2.1 mitigation NOT successful and
performing 2.2 mitigation at 41s
Threshold detected
and performing 2.1 mitigation at 27s
2.1 converge timeout at 37s
2.2 mitigation NOT successful and
performing 2.3 mitigation at 55s
2.2 converge timeout at 51s
DDoS Defense Mechanisms for IXP Infrastructures
Proof of Concept cont'd
● Culprit AS is NOT peered with RS
● Ingress PE L2 ACL mitigation (2.3)
28
Mitigation Scenario 4
BPS (Mbit)
Threshold (Mbit)
BPS(Mbit)
Time (s)
Threshold detected
and 2.3 mitigation at 25s
DDoS Defense Mechanisms for IXP Infrastructures
Discussion
● Usage of route server and statistics collector
● BGP convergence time (too long?)
● Layer 3 ACL
○ IXP environment: focus on layer 2 mitigation
● Fine-grained thresholds (time of day)
● Present more details to customer
29
DDoS Defense Mechanisms for IXP Infrastructures
Conclusion
● Thresholds and Three-way mitigation
● Identification requires layer 3 analysis (prefixes)
● Mitigation achieved on layer 2
○ BGP TE
○ IXP perspective
30
DDoS Defense Mechanisms for IXP Infrastructures
Future Work
● Different mitigations per type of attack
○ More advanced threshold metrics
● Testing with different sample rates
● Test scalability of the design
● Expand proof of concept
○ Identification phase
● Other methods of identification
○ Unsupervised/supervised learning
31
DDoS Defense Mechanisms for IXP Infrastructures
Questions
Image source - thenounproject.com
DDoS Defense Mechanisms for IXP Infrastructures
References
[1] ABN AMRO Group. Service temporarily disrupted by DDoS attacks (Jan 2018). Available at
https://www.abnamro.com/en/newsroom/newsarticles/2018/service-temporarily-disrupted-by-ddos-atta
cks.html (Accessed on 01/06/2018)
[2] Cyberscoop. Arbor: DDoS attacks growing faster in size, complexity (Jan 2018). Available at
https://www.cyberscoop.com/ddos-attacks-growing-arbor-networks/ (Accessed on 01/06/2018)
[3] DDoSDB. Collecting and Sharing the most important information of DDoS attacks.
https://ddosdb.org/ (Accessed on 14/06/2018)
33

More Related Content

What's hot

Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationPavel Odintsov
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdPavel Odintsov
 
FastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigationFastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigationPavel Odintsov
 
DDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentDDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentPavel Odintsov
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool Pavel Odintsov
 
Protect your edge BGP security made simple
Protect your edge BGP security made simpleProtect your edge BGP security made simple
Protect your edge BGP security made simplePavel Odintsov
 
Implementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkImplementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkPavel Odintsov
 
Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonPavel Odintsov
 
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)Pavel Odintsov
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionRedge Technologies
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecShortestPathFirst
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationWilson Rogerio Lopes
 
FastNetMonを試してみた
FastNetMonを試してみたFastNetMonを試してみた
FastNetMonを試してみたYutaka Ishizaki
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricBangladesh Network Operators Group
 
Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)Juniper Networks
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиPositive Hack Days
 

What's hot (20)

Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And Mitigation
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPd
 
9534715
95347159534715
9534715
 
FastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigationFastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigation
 
DDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentDDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environment
 
Jon Nield FastNetMon
Jon Nield FastNetMonJon Nield FastNetMon
Jon Nield FastNetMon
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
 
Protect your edge BGP security made simple
Protect your edge BGP security made simpleProtect your edge BGP security made simple
Protect your edge BGP security made simple
 
Implementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkImplementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit network
 
Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmon
 
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solution
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow Spec
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and Mitigation
 
FastNetMonを試してみた
FastNetMonを試してみたFastNetMonを試してみた
FastNetMonを試してみた
 
Preventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP addressPreventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP address
 
Make the internet safe with DNS Firewall
Make the internet safe with DNS FirewallMake the internet safe with DNS Firewall
Make the internet safe with DNS Firewall
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
 
Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атаки
 

Similar to DDoS Defense Mechanisms for IXP Infrastructures

EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7allanjude
 
Cilium - BPF & XDP for containers
 Cilium - BPF & XDP for containers Cilium - BPF & XDP for containers
Cilium - BPF & XDP for containersDocker, Inc.
 
Internet Protocol Deep-Dive
Internet Protocol Deep-DiveInternet Protocol Deep-Dive
Internet Protocol Deep-DiveGLC Networks
 
packet traveling (pre cloud)
packet traveling (pre cloud)packet traveling (pre cloud)
packet traveling (pre cloud)iman darabi
 
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)Kevin Lynch
 
Kubernetes from scratch at veepee sysadmins days 2019
Kubernetes from scratch at veepee   sysadmins days 2019Kubernetes from scratch at veepee   sysadmins days 2019
Kubernetes from scratch at veepee sysadmins days 2019🔧 Loïc BLOT
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m Agus Awaludin
 
Best Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for SecurityBest Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for SecurityGLC Networks
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityMikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityGLC Networks
 
Tutorial: Network State Awareness Troubleshooting
Tutorial: Network State Awareness TroubleshootingTutorial: Network State Awareness Troubleshooting
Tutorial: Network State Awareness TroubleshootingAPNIC
 
BGP Services IP Transit vs IP Peering
BGP Services  IP Transit vs IP PeeringBGP Services  IP Transit vs IP Peering
BGP Services IP Transit vs IP PeeringGLC Networks
 
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
BPF  & Cilium - Turning Linux into a Microservices-aware Operating SystemBPF  & Cilium - Turning Linux into a Microservices-aware Operating System
BPF & Cilium - Turning Linux into a Microservices-aware Operating SystemThomas Graf
 
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Ontico
 
Accelerating Networked Applications with Flexible Packet Processing
Accelerating Networked Applications with Flexible Packet ProcessingAccelerating Networked Applications with Flexible Packet Processing
Accelerating Networked Applications with Flexible Packet ProcessingOpen-NFP
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityMahipesh Satija
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network securityMahipesh Satija
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityMahipesh Satija
 

Similar to DDoS Defense Mechanisms for IXP Infrastructures (20)

EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
 
Cilium - BPF & XDP for containers
 Cilium - BPF & XDP for containers Cilium - BPF & XDP for containers
Cilium - BPF & XDP for containers
 
Internet Protocol Deep-Dive
Internet Protocol Deep-DiveInternet Protocol Deep-Dive
Internet Protocol Deep-Dive
 
packet traveling (pre cloud)
packet traveling (pre cloud)packet traveling (pre cloud)
packet traveling (pre cloud)
 
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
 
Kubernetes from scratch at veepee sysadmins days 2019
Kubernetes from scratch at veepee   sysadmins days 2019Kubernetes from scratch at veepee   sysadmins days 2019
Kubernetes from scratch at veepee sysadmins days 2019
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m
 
Best Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for SecurityBest Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for Security
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityMikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and Security
 
SFMap (TMA 2015)
SFMap (TMA 2015)SFMap (TMA 2015)
SFMap (TMA 2015)
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Tutorial: Network State Awareness Troubleshooting
Tutorial: Network State Awareness TroubleshootingTutorial: Network State Awareness Troubleshooting
Tutorial: Network State Awareness Troubleshooting
 
BGP Services IP Transit vs IP Peering
BGP Services  IP Transit vs IP PeeringBGP Services  IP Transit vs IP Peering
BGP Services IP Transit vs IP Peering
 
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
BPF  & Cilium - Turning Linux into a Microservices-aware Operating SystemBPF  & Cilium - Turning Linux into a Microservices-aware Operating System
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
 
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
 
Accelerating Networked Applications with Flexible Packet Processing
Accelerating Networked Applications with Flexible Packet ProcessingAccelerating Networked Applications with Flexible Packet Processing
Accelerating Networked Applications with Flexible Packet Processing
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 

More from Pavel Odintsov

Network telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationNetwork telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationPavel Odintsov
 
VietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedVietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedPavel Odintsov
 
Flowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoiseFlowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoisePavel Odintsov
 
Detectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSDetectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSPavel Odintsov
 
Lekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flLekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flPavel Odintsov
 
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersLekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersPavel Odintsov
 
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiJanog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiPavel Odintsov
 
DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaPavel Odintsov
 
Containers in real world презентация
Containers in real world презентацияContainers in real world презентация
Containers in real world презентацияPavel Odintsov
 
Containers are the future of the Cloud
Containers are the future of the CloudContainers are the future of the Cloud
Containers are the future of the CloudPavel Odintsov
 

More from Pavel Odintsov (12)

Network telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationNetwork telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentation
 
VietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedVietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume Based
 
Flowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoiseFlowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoise
 
Detectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSDetectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOS
 
Lekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flLekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_fl
 
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersLekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
 
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiJanog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka Ishizaki
 
SIG-NOC Tools Survey
SIG-NOC Tools SurveySIG-NOC Tools Survey
SIG-NOC Tools Survey
 
DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner Maia
 
03 estrategia-ddos
03 estrategia-ddos03 estrategia-ddos
03 estrategia-ddos
 
Containers in real world презентация
Containers in real world презентацияContainers in real world презентация
Containers in real world презентация
 
Containers are the future of the Cloud
Containers are the future of the CloudContainers are the future of the Cloud
Containers are the future of the Cloud
 

Recently uploaded

Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 

Recently uploaded (20)

Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 

DDoS Defense Mechanisms for IXP Infrastructures

  • 1. DDoS Defense Mechanisms for IXP Infrastructures Tim Dijkhuizen Lennart van Gijtenbeek SNE: Research Project II 03-07-2018 Supervisor: Stavros Konstantaras (AMS-IX)
  • 2. DDoS Defense Mechanisms for IXP Infrastructures Introduction 2 ● Distributed Denial of Service ● DDoS attacks on banks in NL [1] ● DDoS launched via botnets/booters ● Increase in size and complexity [2] ● IXP is a central entity ● Challenges: ○ High traffic loads ○ IXP neutrality ○ Complex infrastructure
  • 3. DDoS Defense Mechanisms for IXP Infrastructures Research Question 3 What (automated) solution can be developed to identify and mitigate DDoS attacks in an IXP network? Image source - thenounproject.com
  • 4. DDoS Defense Mechanisms for IXP Infrastructures Internet eXchange Points (IXPs) ● Peering LAN (BGP) ● Exchange of traffic ● Wide range of networks connected ○ Such as banks, content providers, etc. ● Layer 2 forwarding (no routing) ● Route servers 4
  • 5. DDoS Defense Mechanisms for IXP Infrastructures Amsterdam Internet Exchange (AMS-IX) ● ~820 peers ● 5 Tbit/s peaks each day ● Traffic forwarding: MPLS/VPLS ● Statistics collector: sFlow ● Route server: BIRD ● Current DDoS solution ○ Disable port(s), NaWas 5
  • 6. DDoS Defense Mechanisms for IXP Infrastructures Types of DDoS Attacks 6Image source - nbip.nl/nl/2018/05/16/nbip-ddos-data-report-2017-now-available/
  • 7. DDoS Defense Mechanisms for IXP Infrastructures Types of DDoS Attacks cont'd ● Volumetric attacks ○ Amplification attacks ■ E.g. DNS amplification ■ Small request, large response ● Protocol attacks ○ E.g. TCP SYN flood ○ State exhaustion ● Application attacks ○ Layer 7 ● No single detection method ● Distinct in: bandwidth and packets per second 7Image source - thenounproject.com
  • 8. DDoS Defense Mechanisms for IXP Infrastructures Design Principles 1. Mitigate as close to the source as possible 2. No configuration required on the CEs 3. No congestion in the IXP core 4. Identification and mitigation on lower layers is preferred 5. Detect most common DDoS attacks 6. Intelligence resides in the IXP 7. Minimal impact on good traffic 8. IXP neutrality 9. Compatibility 8
  • 9. DDoS Defense Mechanisms for IXP Infrastructures Detection Methods ● Traffic monitoring needed ○ PE switches ○ Sample data: sFlow/Netflow ● L2 detection ○ L2 headers are too limited ■ Frame size, CRC ○ Other parameters ■ Send rate, arrival interval ● L3/L4 detection 9
  • 10. DDoS Defense Mechanisms for IXP Infrastructures Detection Methods cont'd ● Threshold-based detection ○ Calculate thresholds based on destination IP(s) ■ Scalability: thresholds on prefixes ■ IXP environment: per source AS ○ Metrics: ■ L2/L3: BPS, PPS ■ L4: TCP flags, source ports, destination ports ● Fingerprint-based detection ○ DDoSDB [3] ○ False negatives 10
  • 11. DDoS Defense Mechanisms for IXP Infrastructures Mitigation Methods ● Scrubbing ○ On-site ■ Proprietary box ○ Off-site ■ NaWas ● Access Control Lists ● Software Defined Networking (SDN) ● BGP Blackholing 11
  • 12. DDoS Defense Mechanisms for IXP Infrastructures Blackholing Techniques with BGP ● Source-based blackholing ○ IXP neutrality ○ IP spoofing / false positives ● Destination-based blackholing on the CE 1. Route withdrawal 2. Static routing entry for prefix to Null0 and announce next-hop ● Destination-based blackholing on the PE ○ Set CE next-hop to ARP-dummy ○ L2 ACL 12
  • 13. DDoS Defense Mechanisms for IXP Infrastructures Design Proposal 13Image source - thenounproject.com
  • 14. DDoS Defense Mechanisms for IXP Infrastructures Added Components to IXP 14 DTM = DDoS Threat Mitigator
  • 15. DDoS Defense Mechanisms for IXP Infrastructures Component Interaction 15 DTM = DDoS Threat Mitigator DTA = DDoS Threshold Adviser CTA = Current Traffic Analyzer
  • 16. DDoS Defense Mechanisms for IXP Infrastructures Design Proposal 16 Threshold-based detection Three-way mitigation
  • 17. DDoS Defense Mechanisms for IXP Infrastructures Design Workflow 17
  • 18. DDoS Defense Mechanisms for IXP Infrastructures Identification Start Phase (1.1) 1. Peer starts the process 2. Identify PE port(s) of the victim 3. Get the CE IP, and announced prefixes (RS) 4. Start the DTA/CTA ○ Based on victim ports, and destination prefixes 5. Perform threshold comparisons 6. Present customer with exceeded prefixes ○ Customer decides which prefixes to mitigate 18
  • 19. DDoS Defense Mechanisms for IXP Infrastructures Mitigation Start Phase (1.2) 1. Determine the culprit AS(es) ○ Compare current to historical traffic ○ ASes to mitigation prefix 2. Determine mitigation workflow ○ Culprit AS is peered with RS: ■ Perform mitigation via BGP route withdrawal (phase 2.1) ○ Culprit AS is NOT peered with RS: ■ Perform mitigation via ACL on the ingress PE (phase 2.3) 19
  • 20. DDoS Defense Mechanisms for IXP Infrastructures CE Route Withdrawal Mitigation (2.1) ● Instruct the RS to withdraw the destination prefix to culprit ○ Wait for <BGP_convergence_timeout> ● Threshold is still exceeded: ○ Method unsuccessful, restore original BGP announcement ○ Perform mitigation via BGP blackhole nexthop (phase 2.2 ) ● Threshold is NOT exceeded: ○ Continue mitigation until DDoS no longer active ○ DDoS stopped or mitigation still working? 20
  • 21. DDoS Defense Mechanisms for IXP Infrastructures CE Blackhole Next-hop Mitigation (2.2) ● Instruct the RS to announce blackhole next-hop to culprit ○ Wait for <BGP_convergence_timeout> ● Threshold is still exceeded: ○ Method unsuccessful, restore original BGP announcement ○ Perform mitigation via L2 ACL (phase 2.3) ● Threshold is NOT exceeded: ○ Continue mitigation until DDoS no longer active ○ Monitor on ingress PE 21
  • 22. DDoS Defense Mechanisms for IXP Infrastructures PE L2 ACL Mitigation (2.3) ● Determine MAC addresses and DDoS ingress PE ● Instruct the PE to set up L2 ACL on the ingress PE ○ Based on source CE and destination CE ○ Wait for <ACL_timeout> ● Threshold is still exceeded: ○ Identification unsuccessful, remove ACL and go to phase 1.1 ● Threshold is NOT exceeded: ○ Continue mitigation until DDoS no longer active ○ Monitor on ingress PE 22
  • 23. DDoS Defense Mechanisms for IXP Infrastructures Proof of Concept 23 ● Focused on mitigation phases ○ Prefix identification, DTA, culprit AS identification ● Four different scenarios ○ Peered with RS: ■ 2.1 ✔ ■ 2.1 ✘, 2.2 ✔ ■ 2.1 ✘, 2.2 ✘, 2.3 ✔ ○ Not peered with RS: ■ 2.3 ✔
  • 24. DDoS Defense Mechanisms for IXP Infrastructures Proof of Concept cont'd 24 The DTM here also functions as the statistics collector FastNetMon: DDoS detector that supports multiple packet capture engines iPerf to generate traffic
  • 25. DDoS Defense Mechanisms for IXP Infrastructures ● Culprit AS is peered with RS ● BGP route withdrawal mitigation (2.1) ● Converge timeout: 10s, analysis: 4s ● 50Mbit normal traffic, 150Mbit threshold Proof of Concept cont'd 25 BPS (Mbit) Threshold (Mbit) BPS(Mbit) Time (s) Mitigation Scenario 1 Threshold detected and performing 2.1 mitigation at 27s 2.1 converge timeout at 37s2.1 mitigation successful at 41s
  • 26. DDoS Defense Mechanisms for IXP Infrastructures Proof of Concept cont'd ● Culprit AS is peered with RS ● BGP route withdrawal mitigation unsuccessful (2.1) ● BGP blackhole next-hop mitigation (2.2) 26 BPS (Mbit) Threshold (Mbit) BPS(Mbit) Time (s) Mitigation Scenario 2 Threshold detected and performing 2.1 mitigation at 26s 2.1 NOT successful and performing 2.2 mitigation at 40s 2.1 converge timeout at 36s2.2 converge timeout at 44s2.2 mitigation successful at 55s
  • 27. DDoS Defense Mechanisms for IXP Infrastructures Proof of Concept cont'd ● Culprit AS is peered with RS ● BGP route withdrawal mitigation unsuccessful (2.1) ● BGP blackhole next-hop mitigation unsuccessful (2.2) ● Ingress PE L2 ACL mitigation (2.3) 27 BPS (Mbit) Threshold (Mbit) BPS(Mbit) Time (s) Mitigation Scenario 3 2.1 mitigation NOT successful and performing 2.2 mitigation at 41s Threshold detected and performing 2.1 mitigation at 27s 2.1 converge timeout at 37s 2.2 mitigation NOT successful and performing 2.3 mitigation at 55s 2.2 converge timeout at 51s
  • 28. DDoS Defense Mechanisms for IXP Infrastructures Proof of Concept cont'd ● Culprit AS is NOT peered with RS ● Ingress PE L2 ACL mitigation (2.3) 28 Mitigation Scenario 4 BPS (Mbit) Threshold (Mbit) BPS(Mbit) Time (s) Threshold detected and 2.3 mitigation at 25s
  • 29. DDoS Defense Mechanisms for IXP Infrastructures Discussion ● Usage of route server and statistics collector ● BGP convergence time (too long?) ● Layer 3 ACL ○ IXP environment: focus on layer 2 mitigation ● Fine-grained thresholds (time of day) ● Present more details to customer 29
  • 30. DDoS Defense Mechanisms for IXP Infrastructures Conclusion ● Thresholds and Three-way mitigation ● Identification requires layer 3 analysis (prefixes) ● Mitigation achieved on layer 2 ○ BGP TE ○ IXP perspective 30
  • 31. DDoS Defense Mechanisms for IXP Infrastructures Future Work ● Different mitigations per type of attack ○ More advanced threshold metrics ● Testing with different sample rates ● Test scalability of the design ● Expand proof of concept ○ Identification phase ● Other methods of identification ○ Unsupervised/supervised learning 31
  • 32. DDoS Defense Mechanisms for IXP Infrastructures Questions Image source - thenounproject.com
  • 33. DDoS Defense Mechanisms for IXP Infrastructures References [1] ABN AMRO Group. Service temporarily disrupted by DDoS attacks (Jan 2018). Available at https://www.abnamro.com/en/newsroom/newsarticles/2018/service-temporarily-disrupted-by-ddos-atta cks.html (Accessed on 01/06/2018) [2] Cyberscoop. Arbor: DDoS attacks growing faster in size, complexity (Jan 2018). Available at https://www.cyberscoop.com/ddos-attacks-growing-arbor-networks/ (Accessed on 01/06/2018) [3] DDoSDB. Collecting and Sharing the most important information of DDoS attacks. https://ddosdb.org/ (Accessed on 14/06/2018) 33