SlideShare a Scribd company logo
1 of 21
CYBER-SECURITY PRODUCT
DRS-ADAM
Saurabh Verma, Ali Hamieh, Jun Huh Ho, Siva Raj Rajagopalan, Maciej Korczynski, Nina Fefferman.
Jun Ho Huh
Honeywell ACS Labs
© 2016 by Honeywell International Inc. All rights reserved.
1
Motivation
money talks!
8% 8%
26%
16%
42%
LESS THAN $1000 $1001-10,000 $10,000-50,000 $50,000-100,000 MORE THAN
$100,000
2013 COST PER HOUR FOR DDOS
ATTACKS
© 2016 by Honeywell International Inc. All rights reserved.
2
It’s becoming very serious!
(disrupting the internet)
© 2016 by Honeywell International Inc. All rights reserved.
3
What’s the problem?
Amplified DNS DDOS (ADD) Attack
Amplified using DNS resolvers
(could be a open DNS resolver,
open DNS proxies authorative
DNS servers , unknown)
1 Gbps connection
x10
10 compromised
trigger machines with
1Gbps
1 Mbps connection
Amplification factor of
50x
Attacker with 1Mbps
500 Gbps hits target machine from amplifiers
© 2016 by Honeywell International Inc. All rights reserved.
4
Let’s see the existing solutions first...
• Detect attack either by tracking count of DNS responses or keep a
map of DNS request to DNS response (sun et.al, kambourakiset.al).
• Drop packets.
• Won’t work in this age due to large attack size!
Solutions
deployed
on victim
server
• Create machine learning models to detect local patterns of ADD
attacks (rastegari et.al, deshpande et.al).
• Machine learning didn’t work because of lack of influential
features.
• Problem is legitimate request can have same patterns. High false
positive rate!
• Source IP validation which includes authentication-based methods,
trace-back methods or filtering-based methods.
• All these methods are practically limited due to requirement in
fundamental change of internet infrastructure.
• For example, Ingress filtering allows routers to drop packets with
source but adds a measurable delay in router’s which is
unacceptable at high-speed links. Deployment remains a major
issue as well.
Solutions
deployed
on DNS
server
© 2016 by Honeywell International Inc. All rights reserved.
5
Things to realize (design goals)…
There is little victim can do. Attack must be crushed at the source (DNS resolver).
This is really happening now and so solution must be as practical as
possible.
You can’t ask to change internet infrastructure. Wait you can! because it’s a
internet design flaw but you need to be smart about it.
Avoid expensive authentication techniques!
Should be a UDP based solution!
Should be scalable and deployable!
Should not demand a separate infrastructure!
Should be computationally less expensive!
Above all, it should mitigate ADD attacks before target goes down i.e. keep
the ADD attack below victim’s sustainable bandwidth.
© 2016 by Honeywell International Inc. All rights reserved.
6
Key Idea 1
What’s one thing we need to detect
ADD attacks at the source (dns
resolver) with high confidence?
Answer: Accumulated DNS query
rates hitting the target server from all
resolvers!
© 2016 by Honeywell International Inc. All rights reserved.
7
How to get accumulated DNS query
rates before target goes down?
Answer: Share DNS query rates of
target among resolvers involved in
attack.
Key Idea 2
© 2016 by Honeywell International Inc. All rights reserved.
8
Quick look at existing protocols for aggregate
computation
• Gossip protocols – Push-Pull sum protocol, A1/ A2
(Mehyar et.al. ). Converges to true aggregate value in
O(𝑁𝑙𝑜𝑔𝑁) messages in O(𝑙𝑜𝑔𝑁) rounds.
• Problem is most of them requires weak synchronous
communication and “N” should be known in advance,
which is not possible in our case.
• Nevertheless, these existing protocols supports the
theoretical motivation for our approach.
© 2016 by Honeywell International Inc. All rights reserved.
9
We present you DRS-ADAM
Two assumptions of
DRS-ADAM
• We assumed that DNS
resolvers and target hosts
are all discoverable and
connected to global
internet.
• Our second weak
assumption is that the
collected DNS query rates
do not change much
during ADD attack period.
© 2016 by Honeywell International Inc. All rights reserved.
10
© 2016 by Honeywell International Inc. All rights reserved.
11
Iterative Query Rate Sharing Algorithm
𝑆𝐷𝑅 𝑛
𝐷 𝑛+1
𝐷 𝑛 𝐷𝐼𝑃𝑛+1
𝐷𝑛𝑠𝐿𝑖𝑠𝑡𝐷 𝑛
𝐷 𝑛+1
𝐷𝐼𝑃𝑛+1
𝐷 𝑛
𝐷1
𝐷𝐼𝑃𝑛−1
𝐷 𝑛
𝐷 𝑛−1
𝐷𝐼𝑃𝑛+1
𝐷 𝑛
𝐷2
© 2016 by Honeywell International Inc. All rights reserved.
12
Complexity, LAD
• O(N) w.r.t each resolver.
• Overall complexity of our algorithm is
O(𝑁2
). Possible to reduce to O(N) but
have to sacrifice robustness.
• LAD performs threat assessment.
• LAD threat bandwidth= accumulated
DNS query rate × amplification factor ×
average query size. This is self
sufficient to detect attacks
• To save computation, we avoid creating
machine learning models, here.
© 2016 by Honeywell International Inc. All rights reserved.
Economic incentives for network operators
• With DRS-ADAM installed, all resolvers involved in an ADD attack
will consume bandwidth in KBps for a few seconds
- Bandwidth consumed is small compared to 10-300 Gbps consumed
during an ADD attack
- Such network bandwidth costs can be avoided with DRS-ADAM
• An ADD attack could incur network costs up to $1.8M per month
- Cost shared among network operators involved in the attack
- ADD attacks are rapidly growing in size and frequency
- Network operators will benefit from installing DRS-ADAM
13
© 2016 by Honeywell International Inc. All rights reserved.
14
Prototype Implementation
Type Reserved [0] Length
Target IP
Query Rate (IEEE 754 single/binary 32 float)
Resolver 1 IP
Resolver N IP
0 1 2 3
Target Agent
Resolver
Agent
Resolver
Detector
LAD
Resolver
Agent
Resolver
Detector
LAD
Query rate,
DNS IP
DNS
Resolver
DNS
Resolver
Target Host
DRS-ADAM Packet Structure
© 2016 by Honeywell International Inc. All rights reserved.
Security Product Deployment strategies
• DRS-ADAM security product is a pair of small software packages
• First victim package should be small
- Our prototype had just 250 lines of codes
- Should not require frequent updates
• Second package deployed on an existing DNS software
- BIND already provides real-time statistics about DNS queries
- Deploy DRS-ADAM through a single upgrade
- Same manner in which RRL was deployed on BIND
• Fewer challenges than DNSSEC that rely on digital signatures
- DRS-ADAM does not add any complex key management or hardware
upgrade
15
© 2016 by Honeywell International Inc. All rights reserved.
16
Experiment and Results
Emulated Topology
© 2016 by Honeywell International Inc. All rights reserved.
17
© 2016 by Honeywell International Inc. All rights reserved.
18
© 2016 by Honeywell International Inc. All rights reserved.
19
© 2016 by Honeywell International Inc. All rights reserved.
20
Discussion and Conclusion
Satisfying design goals.
Generalization: Can stop NTP
amplification attack.
Theoretical motivation: From Gossip-
based Push-Sum Protocol (GBPS).

More Related Content

What's hot

DDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and MitigationDDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and MitigationCloudflare
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
 
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...Indonesia Network Operators Group
 
Poor mans spy vs spy using open source tools to detect attackers
Poor mans spy vs spy using open source tools to detect attackersPoor mans spy vs spy using open source tools to detect attackers
Poor mans spy vs spy using open source tools to detect attackersDerek Banks
 
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...Dana Gardner
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware Dryden Geary
 
The road to clustered data ontap.
The road to clustered data ontap.The road to clustered data ontap.
The road to clustered data ontap.Scalar Decisions
 

What's hot (7)

DDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and MitigationDDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and Mitigation
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
08 - IDNOG04 - Anton Purba (Amandata) - On-Premise, Cloud or Hybrid? DDoS Mit...
 
Poor mans spy vs spy using open source tools to detect attackers
Poor mans spy vs spy using open source tools to detect attackersPoor mans spy vs spy using open source tools to detect attackers
Poor mans spy vs spy using open source tools to detect attackers
 
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...
How Norway’s Fatland Faced a Ransomware Debacle and Beat It Thanks to Rapid B...
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware
 
The road to clustered data ontap.
The road to clustered data ontap.The road to clustered data ontap.
The road to clustered data ontap.
 

Similar to Cyber-Security Product

DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough? Zscaler
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsPeter Silva
 
Plan a successful enterprise Linux migration
Plan a successful enterprise Linux migrationPlan a successful enterprise Linux migration
Plan a successful enterprise Linux migrationRogue Wave Software
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsMarco Casassa Mont
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 WebinarMen and Mice
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsF5 Networks
 
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionDNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionImperva Incapsula
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolJisc
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsMarco Casassa Mont
 
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...Yankmo
 
OpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform TechnologyOpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform TechnologyCourtland Smith
 
Security intelligence using big data presentation (engineering seminar)
Security intelligence using big data  presentation (engineering seminar)Security intelligence using big data  presentation (engineering seminar)
Security intelligence using big data presentation (engineering seminar)Marco Casassa Mont
 
Cloudshield_DNS Tips_032014
Cloudshield_DNS Tips_032014Cloudshield_DNS Tips_032014
Cloudshield_DNS Tips_032014Laura L. Adams
 
DNS Made Easy Sales Brochure
DNS Made Easy Sales BrochureDNS Made Easy Sales Brochure
DNS Made Easy Sales BrochureDNS Made Easy
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSDevOps.com
 
EfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerabilityEfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerabilityEfficientIP
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfdistortdistort
 
THOTCON - The War over your DNS Queries
THOTCON - The War over your DNS QueriesTHOTCON - The War over your DNS Queries
THOTCON - The War over your DNS QueriesJohn Bambenek
 

Similar to Cyber-Security Product (20)

Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
Plan a successful enterprise Linux migration
Plan a successful enterprise Linux migrationPlan a successful enterprise Linux migration
Plan a successful enterprise Linux migration
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionDNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS Protection
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security tool
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
 
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
 
OpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform TechnologyOpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform Technology
 
Security intelligence using big data presentation (engineering seminar)
Security intelligence using big data  presentation (engineering seminar)Security intelligence using big data  presentation (engineering seminar)
Security intelligence using big data presentation (engineering seminar)
 
Cloudshield_DNS Tips_032014
Cloudshield_DNS Tips_032014Cloudshield_DNS Tips_032014
Cloudshield_DNS Tips_032014
 
DNS Made Easy Sales Brochure
DNS Made Easy Sales BrochureDNS Made Easy Sales Brochure
DNS Made Easy Sales Brochure
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNS
 
EfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerabilityEfficientIP webinar mitigate dns zero day vulnerability
EfficientIP webinar mitigate dns zero day vulnerability
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdf
 
THOTCON - The War over your DNS Queries
THOTCON - The War over your DNS QueriesTHOTCON - The War over your DNS Queries
THOTCON - The War over your DNS Queries
 

Recently uploaded

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdfkeithzhangding
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 

Cyber-Security Product

  • 1. CYBER-SECURITY PRODUCT DRS-ADAM Saurabh Verma, Ali Hamieh, Jun Huh Ho, Siva Raj Rajagopalan, Maciej Korczynski, Nina Fefferman. Jun Ho Huh Honeywell ACS Labs
  • 2. © 2016 by Honeywell International Inc. All rights reserved. 1 Motivation money talks! 8% 8% 26% 16% 42% LESS THAN $1000 $1001-10,000 $10,000-50,000 $50,000-100,000 MORE THAN $100,000 2013 COST PER HOUR FOR DDOS ATTACKS
  • 3. © 2016 by Honeywell International Inc. All rights reserved. 2 It’s becoming very serious! (disrupting the internet)
  • 4. © 2016 by Honeywell International Inc. All rights reserved. 3 What’s the problem? Amplified DNS DDOS (ADD) Attack Amplified using DNS resolvers (could be a open DNS resolver, open DNS proxies authorative DNS servers , unknown) 1 Gbps connection x10 10 compromised trigger machines with 1Gbps 1 Mbps connection Amplification factor of 50x Attacker with 1Mbps 500 Gbps hits target machine from amplifiers
  • 5. © 2016 by Honeywell International Inc. All rights reserved. 4 Let’s see the existing solutions first... • Detect attack either by tracking count of DNS responses or keep a map of DNS request to DNS response (sun et.al, kambourakiset.al). • Drop packets. • Won’t work in this age due to large attack size! Solutions deployed on victim server • Create machine learning models to detect local patterns of ADD attacks (rastegari et.al, deshpande et.al). • Machine learning didn’t work because of lack of influential features. • Problem is legitimate request can have same patterns. High false positive rate! • Source IP validation which includes authentication-based methods, trace-back methods or filtering-based methods. • All these methods are practically limited due to requirement in fundamental change of internet infrastructure. • For example, Ingress filtering allows routers to drop packets with source but adds a measurable delay in router’s which is unacceptable at high-speed links. Deployment remains a major issue as well. Solutions deployed on DNS server
  • 6. © 2016 by Honeywell International Inc. All rights reserved. 5 Things to realize (design goals)… There is little victim can do. Attack must be crushed at the source (DNS resolver). This is really happening now and so solution must be as practical as possible. You can’t ask to change internet infrastructure. Wait you can! because it’s a internet design flaw but you need to be smart about it. Avoid expensive authentication techniques! Should be a UDP based solution! Should be scalable and deployable! Should not demand a separate infrastructure! Should be computationally less expensive! Above all, it should mitigate ADD attacks before target goes down i.e. keep the ADD attack below victim’s sustainable bandwidth.
  • 7. © 2016 by Honeywell International Inc. All rights reserved. 6 Key Idea 1 What’s one thing we need to detect ADD attacks at the source (dns resolver) with high confidence? Answer: Accumulated DNS query rates hitting the target server from all resolvers!
  • 8. © 2016 by Honeywell International Inc. All rights reserved. 7 How to get accumulated DNS query rates before target goes down? Answer: Share DNS query rates of target among resolvers involved in attack. Key Idea 2
  • 9. © 2016 by Honeywell International Inc. All rights reserved. 8 Quick look at existing protocols for aggregate computation • Gossip protocols – Push-Pull sum protocol, A1/ A2 (Mehyar et.al. ). Converges to true aggregate value in O(𝑁𝑙𝑜𝑔𝑁) messages in O(𝑙𝑜𝑔𝑁) rounds. • Problem is most of them requires weak synchronous communication and “N” should be known in advance, which is not possible in our case. • Nevertheless, these existing protocols supports the theoretical motivation for our approach.
  • 10. © 2016 by Honeywell International Inc. All rights reserved. 9 We present you DRS-ADAM Two assumptions of DRS-ADAM • We assumed that DNS resolvers and target hosts are all discoverable and connected to global internet. • Our second weak assumption is that the collected DNS query rates do not change much during ADD attack period.
  • 11. © 2016 by Honeywell International Inc. All rights reserved. 10
  • 12. © 2016 by Honeywell International Inc. All rights reserved. 11 Iterative Query Rate Sharing Algorithm 𝑆𝐷𝑅 𝑛 𝐷 𝑛+1 𝐷 𝑛 𝐷𝐼𝑃𝑛+1 𝐷𝑛𝑠𝐿𝑖𝑠𝑡𝐷 𝑛 𝐷 𝑛+1 𝐷𝐼𝑃𝑛+1 𝐷 𝑛 𝐷1 𝐷𝐼𝑃𝑛−1 𝐷 𝑛 𝐷 𝑛−1 𝐷𝐼𝑃𝑛+1 𝐷 𝑛 𝐷2
  • 13. © 2016 by Honeywell International Inc. All rights reserved. 12 Complexity, LAD • O(N) w.r.t each resolver. • Overall complexity of our algorithm is O(𝑁2 ). Possible to reduce to O(N) but have to sacrifice robustness. • LAD performs threat assessment. • LAD threat bandwidth= accumulated DNS query rate × amplification factor × average query size. This is self sufficient to detect attacks • To save computation, we avoid creating machine learning models, here.
  • 14. © 2016 by Honeywell International Inc. All rights reserved. Economic incentives for network operators • With DRS-ADAM installed, all resolvers involved in an ADD attack will consume bandwidth in KBps for a few seconds - Bandwidth consumed is small compared to 10-300 Gbps consumed during an ADD attack - Such network bandwidth costs can be avoided with DRS-ADAM • An ADD attack could incur network costs up to $1.8M per month - Cost shared among network operators involved in the attack - ADD attacks are rapidly growing in size and frequency - Network operators will benefit from installing DRS-ADAM 13
  • 15. © 2016 by Honeywell International Inc. All rights reserved. 14 Prototype Implementation Type Reserved [0] Length Target IP Query Rate (IEEE 754 single/binary 32 float) Resolver 1 IP Resolver N IP 0 1 2 3 Target Agent Resolver Agent Resolver Detector LAD Resolver Agent Resolver Detector LAD Query rate, DNS IP DNS Resolver DNS Resolver Target Host DRS-ADAM Packet Structure
  • 16. © 2016 by Honeywell International Inc. All rights reserved. Security Product Deployment strategies • DRS-ADAM security product is a pair of small software packages • First victim package should be small - Our prototype had just 250 lines of codes - Should not require frequent updates • Second package deployed on an existing DNS software - BIND already provides real-time statistics about DNS queries - Deploy DRS-ADAM through a single upgrade - Same manner in which RRL was deployed on BIND • Fewer challenges than DNSSEC that rely on digital signatures - DRS-ADAM does not add any complex key management or hardware upgrade 15
  • 17. © 2016 by Honeywell International Inc. All rights reserved. 16 Experiment and Results Emulated Topology
  • 18. © 2016 by Honeywell International Inc. All rights reserved. 17
  • 19. © 2016 by Honeywell International Inc. All rights reserved. 18
  • 20. © 2016 by Honeywell International Inc. All rights reserved. 19
  • 21. © 2016 by Honeywell International Inc. All rights reserved. 20 Discussion and Conclusion Satisfying design goals. Generalization: Can stop NTP amplification attack. Theoretical motivation: From Gossip- based Push-Sum Protocol (GBPS).