SlideShare a Scribd company logo
1 of 33
Download to read offline
DDoS Defense Mechanisms
for IXP Infrastructures
Tim Dijkhuizen
Lennart van Gijtenbeek
SNE: Research Project II
03-07-2018
Supervisor: Stavros Konstantaras (AMS-IX)
DDoS Defense Mechanisms for IXP Infrastructures
Introduction
2
● Distributed Denial of Service
● DDoS attacks on banks in NL [1]
● DDoS launched via botnets/booters
● Increase in size and complexity [2]
● IXP is a central entity
● Challenges:
○ High traffic loads
○ IXP neutrality
○ Complex infrastructure
DDoS Defense Mechanisms for IXP Infrastructures
Research Question
3
What (automated) solution can be developed to
identify and mitigate DDoS attacks in an IXP network?
Image source - thenounproject.com
DDoS Defense Mechanisms for IXP Infrastructures
Internet eXchange Points (IXPs)
● Peering LAN (BGP)
● Exchange of traffic
● Wide range of networks connected
○ Such as banks, content providers, etc.
● Layer 2 forwarding (no routing)
● Route servers
4
DDoS Defense Mechanisms for IXP Infrastructures
Amsterdam Internet Exchange (AMS-IX)
● ~820 peers
● 5 Tbit/s peaks each day
● Traffic forwarding: MPLS/VPLS
● Statistics collector: sFlow
● Route server: BIRD
● Current DDoS solution
○ Disable port(s), NaWas
5
DDoS Defense Mechanisms for IXP Infrastructures
Types of DDoS Attacks
6Image source - nbip.nl/nl/2018/05/16/nbip-ddos-data-report-2017-now-available/
DDoS Defense Mechanisms for IXP Infrastructures
Types of DDoS Attacks cont'd
● Volumetric attacks
○ Amplification attacks
■ E.g. DNS amplification
■ Small request, large response
● Protocol attacks
○ E.g. TCP SYN flood
○ State exhaustion
● Application attacks
○ Layer 7
● No single detection method
● Distinct in: bandwidth and packets per second
7Image source - thenounproject.com
DDoS Defense Mechanisms for IXP Infrastructures
Design Principles
1. Mitigate as close to the source as possible
2. No configuration required on the CEs
3. No congestion in the IXP core
4. Identification and mitigation on
lower layers is preferred
5. Detect most common DDoS attacks
6. Intelligence resides in the IXP
7. Minimal impact on good traffic
8. IXP neutrality
9. Compatibility
8
DDoS Defense Mechanisms for IXP Infrastructures
Detection Methods
● Traffic monitoring needed
○ PE switches
○ Sample data: sFlow/Netflow
● L2 detection
○ L2 headers are too limited
■ Frame size, CRC
○ Other parameters
■ Send rate, arrival interval
● L3/L4 detection
9
DDoS Defense Mechanisms for IXP Infrastructures
Detection Methods cont'd
● Threshold-based detection
○ Calculate thresholds based on destination IP(s)
■ Scalability: thresholds on prefixes
■ IXP environment: per source AS
○ Metrics:
■ L2/L3: BPS, PPS
■ L4: TCP flags, source ports, destination ports
● Fingerprint-based detection
○ DDoSDB [3]
○ False negatives
10
DDoS Defense Mechanisms for IXP Infrastructures
Mitigation Methods
● Scrubbing
○ On-site
■ Proprietary box
○ Off-site
■ NaWas
● Access Control Lists
● Software Defined Networking (SDN)
● BGP Blackholing
11
DDoS Defense Mechanisms for IXP Infrastructures
Blackholing Techniques with BGP
● Source-based blackholing
○ IXP neutrality
○ IP spoofing / false positives
● Destination-based blackholing on the CE
1. Route withdrawal
2. Static routing entry for prefix to Null0
and announce next-hop
● Destination-based blackholing on the PE
○ Set CE next-hop to ARP-dummy
○ L2 ACL
12
DDoS Defense Mechanisms for IXP Infrastructures
Design Proposal
13Image source - thenounproject.com
DDoS Defense Mechanisms for IXP Infrastructures
Added Components to IXP
14
DTM = DDoS Threat Mitigator
DDoS Defense Mechanisms for IXP Infrastructures
Component Interaction
15
DTM = DDoS Threat Mitigator
DTA = DDoS Threshold Adviser
CTA = Current Traffic Analyzer
DDoS Defense Mechanisms for IXP Infrastructures
Design Proposal
16
Threshold-based detection
Three-way mitigation
DDoS Defense Mechanisms for IXP Infrastructures
Design Workflow
17
DDoS Defense Mechanisms for IXP Infrastructures
Identification Start Phase (1.1)
1. Peer starts the process
2. Identify PE port(s) of the victim
3. Get the CE IP, and announced prefixes (RS)
4. Start the DTA/CTA
○ Based on victim ports, and destination prefixes
5. Perform threshold comparisons
6. Present customer with exceeded prefixes
○ Customer decides which prefixes to mitigate
18
DDoS Defense Mechanisms for IXP Infrastructures
Mitigation Start Phase (1.2)
1. Determine the culprit AS(es)
○ Compare current to historical traffic
○ ASes to mitigation prefix
2. Determine mitigation workflow
○ Culprit AS is peered with RS:
■ Perform mitigation via BGP route withdrawal (phase 2.1)
○ Culprit AS is NOT peered with RS:
■ Perform mitigation via ACL on the ingress PE
(phase 2.3)
19
DDoS Defense Mechanisms for IXP Infrastructures
CE Route Withdrawal Mitigation (2.1)
● Instruct the RS to withdraw
the destination prefix to culprit
○ Wait for <BGP_convergence_timeout>
● Threshold is still exceeded:
○ Method unsuccessful, restore original BGP announcement
○ Perform mitigation via BGP blackhole nexthop (phase 2.2 )
● Threshold is NOT exceeded:
○ Continue mitigation until DDoS no longer active
○ DDoS stopped or mitigation still working?
20
DDoS Defense Mechanisms for IXP Infrastructures
CE Blackhole Next-hop Mitigation (2.2)
● Instruct the RS to announce
blackhole next-hop to culprit
○ Wait for <BGP_convergence_timeout>
● Threshold is still exceeded:
○ Method unsuccessful, restore original BGP announcement
○ Perform mitigation via L2 ACL (phase 2.3)
● Threshold is NOT exceeded:
○ Continue mitigation until DDoS no longer active
○ Monitor on ingress PE
21
DDoS Defense Mechanisms for IXP Infrastructures
PE L2 ACL Mitigation (2.3)
● Determine MAC addresses
and DDoS ingress PE
● Instruct the PE to set up L2 ACL on the ingress PE
○ Based on source CE and destination CE
○ Wait for <ACL_timeout>
● Threshold is still exceeded:
○ Identification unsuccessful, remove ACL and go to phase 1.1
● Threshold is NOT exceeded:
○ Continue mitigation until DDoS no longer active
○ Monitor on ingress PE
22
DDoS Defense Mechanisms for IXP Infrastructures
Proof of Concept
23
● Focused on mitigation phases
○ Prefix identification, DTA, culprit AS identification
● Four different scenarios
○ Peered with RS:
■ 2.1 ✔
■ 2.1 ✘, 2.2 ✔
■ 2.1 ✘, 2.2 ✘, 2.3 ✔
○ Not peered with RS:
■ 2.3 ✔
DDoS Defense Mechanisms for IXP Infrastructures
Proof of Concept cont'd
24
The DTM here also functions as the statistics collector
FastNetMon: DDoS detector that supports multiple packet capture engines
iPerf to generate traffic
DDoS Defense Mechanisms for IXP Infrastructures
● Culprit AS is peered with RS
● BGP route withdrawal mitigation (2.1)
● Converge timeout: 10s, analysis: 4s
● 50Mbit normal traffic, 150Mbit threshold
Proof of Concept cont'd
25
BPS (Mbit)
Threshold (Mbit)
BPS(Mbit)
Time (s)
Mitigation Scenario 1
Threshold detected
and performing 2.1 mitigation at 27s
2.1 converge timeout at 37s2.1 mitigation successful at 41s
DDoS Defense Mechanisms for IXP Infrastructures
Proof of Concept cont'd
● Culprit AS is peered with RS
● BGP route withdrawal mitigation unsuccessful (2.1)
● BGP blackhole next-hop mitigation (2.2)
26
BPS (Mbit)
Threshold (Mbit)
BPS(Mbit)
Time (s)
Mitigation Scenario 2
Threshold detected
and performing 2.1 mitigation at 26s
2.1 NOT successful and
performing 2.2 mitigation at 40s
2.1 converge timeout at 36s2.2 converge timeout at 44s2.2 mitigation successful at 55s
DDoS Defense Mechanisms for IXP Infrastructures
Proof of Concept cont'd
● Culprit AS is peered with RS
● BGP route withdrawal mitigation unsuccessful (2.1)
● BGP blackhole next-hop mitigation unsuccessful (2.2)
● Ingress PE L2 ACL mitigation (2.3)
27
BPS (Mbit)
Threshold (Mbit)
BPS(Mbit)
Time (s)
Mitigation Scenario 3
2.1 mitigation NOT successful and
performing 2.2 mitigation at 41s
Threshold detected
and performing 2.1 mitigation at 27s
2.1 converge timeout at 37s
2.2 mitigation NOT successful and
performing 2.3 mitigation at 55s
2.2 converge timeout at 51s
DDoS Defense Mechanisms for IXP Infrastructures
Proof of Concept cont'd
● Culprit AS is NOT peered with RS
● Ingress PE L2 ACL mitigation (2.3)
28
Mitigation Scenario 4
BPS (Mbit)
Threshold (Mbit)
BPS(Mbit)
Time (s)
Threshold detected
and 2.3 mitigation at 25s
DDoS Defense Mechanisms for IXP Infrastructures
Discussion
● Usage of route server and statistics collector
● BGP convergence time (too long?)
● Layer 3 ACL
○ IXP environment: focus on layer 2 mitigation
● Fine-grained thresholds (time of day)
● Present more details to customer
29
DDoS Defense Mechanisms for IXP Infrastructures
Conclusion
● Thresholds and Three-way mitigation
● Identification requires layer 3 analysis (prefixes)
● Mitigation achieved on layer 2
○ BGP TE
○ IXP perspective
30
DDoS Defense Mechanisms for IXP Infrastructures
Future Work
● Different mitigations per type of attack
○ More advanced threshold metrics
● Testing with different sample rates
● Test scalability of the design
● Expand proof of concept
○ Identification phase
● Other methods of identification
○ Unsupervised/supervised learning
31
DDoS Defense Mechanisms for IXP Infrastructures
Questions
Image source - thenounproject.com
DDoS Defense Mechanisms for IXP Infrastructures
References
[1] ABN AMRO Group. Service temporarily disrupted by DDoS attacks (Jan 2018). Available at
https://www.abnamro.com/en/newsroom/newsarticles/2018/service-temporarily-disrupted-by-ddos-atta
cks.html (Accessed on 01/06/2018)
[2] Cyberscoop. Arbor: DDoS attacks growing faster in size, complexity (Jan 2018). Available at
https://www.cyberscoop.com/ddos-attacks-growing-arbor-networks/ (Accessed on 01/06/2018)
[3] DDoSDB. Collecting and Sharing the most important information of DDoS attacks.
https://ddosdb.org/ (Accessed on 14/06/2018)
33

More Related Content

What's hot

Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationPavel Odintsov
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdPavel Odintsov
 
FastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigationFastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigationPavel Odintsov
 
DDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentDDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentPavel Odintsov
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool Pavel Odintsov
 
Protect your edge BGP security made simple
Protect your edge BGP security made simpleProtect your edge BGP security made simple
Protect your edge BGP security made simplePavel Odintsov
 
Implementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkImplementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkPavel Odintsov
 
Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonPavel Odintsov
 
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)Pavel Odintsov
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionRedge Technologies
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecShortestPathFirst
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationWilson Rogerio Lopes
 
FastNetMonを試してみた
FastNetMonを試してみたFastNetMonを試してみた
FastNetMonを試してみたYutaka Ishizaki
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricBangladesh Network Operators Group
 
Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)Juniper Networks
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиPositive Hack Days
 

What's hot (20)

Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And Mitigation
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPd
 
9534715
95347159534715
9534715
 
FastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigationFastNetMon - ENOG9 speech about DDoS mitigation
FastNetMon - ENOG9 speech about DDoS mitigation
 
DDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentDDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environment
 
Jon Nield FastNetMon
Jon Nield FastNetMonJon Nield FastNetMon
Jon Nield FastNetMon
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
 
Protect your edge BGP security made simple
Protect your edge BGP security made simpleProtect your edge BGP security made simple
Protect your edge BGP security made simple
 
Implementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkImplementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit network
 
Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmon
 
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solution
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow Spec
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and Mitigation
 
FastNetMonを試してみた
FastNetMonを試してみたFastNetMonを試してみた
FastNetMonを試してみた
 
Preventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP addressPreventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP address
 
Make the internet safe with DNS Firewall
Make the internet safe with DNS FirewallMake the internet safe with DNS Firewall
Make the internet safe with DNS Firewall
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
 
Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атаки
 

Similar to DDoS Defense Mechanisms for IXP Infrastructures

EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7allanjude
 
Cilium - BPF & XDP for containers
 Cilium - BPF & XDP for containers Cilium - BPF & XDP for containers
Cilium - BPF & XDP for containersDocker, Inc.
 
Internet Protocol Deep-Dive
Internet Protocol Deep-DiveInternet Protocol Deep-Dive
Internet Protocol Deep-DiveGLC Networks
 
packet traveling (pre cloud)
packet traveling (pre cloud)packet traveling (pre cloud)
packet traveling (pre cloud)iman darabi
 
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)Kevin Lynch
 
Kubernetes from scratch at veepee sysadmins days 2019
Kubernetes from scratch at veepee   sysadmins days 2019Kubernetes from scratch at veepee   sysadmins days 2019
Kubernetes from scratch at veepee sysadmins days 2019🔧 Loïc BLOT
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m Agus Awaludin
 
Best Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for SecurityBest Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for SecurityGLC Networks
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityMikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityGLC Networks
 
Tutorial: Network State Awareness Troubleshooting
Tutorial: Network State Awareness TroubleshootingTutorial: Network State Awareness Troubleshooting
Tutorial: Network State Awareness TroubleshootingAPNIC
 
BGP Services IP Transit vs IP Peering
BGP Services  IP Transit vs IP PeeringBGP Services  IP Transit vs IP Peering
BGP Services IP Transit vs IP PeeringGLC Networks
 
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
BPF  & Cilium - Turning Linux into a Microservices-aware Operating SystemBPF  & Cilium - Turning Linux into a Microservices-aware Operating System
BPF & Cilium - Turning Linux into a Microservices-aware Operating SystemThomas Graf
 
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Ontico
 
Accelerating Networked Applications with Flexible Packet Processing
Accelerating Networked Applications with Flexible Packet ProcessingAccelerating Networked Applications with Flexible Packet Processing
Accelerating Networked Applications with Flexible Packet ProcessingOpen-NFP
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityMahipesh Satija
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network securityMahipesh Satija
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityMahipesh Satija
 

Similar to DDoS Defense Mechanisms for IXP Infrastructures (20)

EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
 
Cilium - BPF & XDP for containers
 Cilium - BPF & XDP for containers Cilium - BPF & XDP for containers
Cilium - BPF & XDP for containers
 
Internet Protocol Deep-Dive
Internet Protocol Deep-DiveInternet Protocol Deep-Dive
Internet Protocol Deep-Dive
 
packet traveling (pre cloud)
packet traveling (pre cloud)packet traveling (pre cloud)
packet traveling (pre cloud)
 
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
 
Kubernetes from scratch at veepee sysadmins days 2019
Kubernetes from scratch at veepee   sysadmins days 2019Kubernetes from scratch at veepee   sysadmins days 2019
Kubernetes from scratch at veepee sysadmins days 2019
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m
 
Best Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for SecurityBest Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for Security
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityMikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and Security
 
SFMap (TMA 2015)
SFMap (TMA 2015)SFMap (TMA 2015)
SFMap (TMA 2015)
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Tutorial: Network State Awareness Troubleshooting
Tutorial: Network State Awareness TroubleshootingTutorial: Network State Awareness Troubleshooting
Tutorial: Network State Awareness Troubleshooting
 
BGP Services IP Transit vs IP Peering
BGP Services  IP Transit vs IP PeeringBGP Services  IP Transit vs IP Peering
BGP Services IP Transit vs IP Peering
 
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
BPF  & Cilium - Turning Linux into a Microservices-aware Operating SystemBPF  & Cilium - Turning Linux into a Microservices-aware Operating System
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
 
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
 
Accelerating Networked Applications with Flexible Packet Processing
Accelerating Networked Applications with Flexible Packet ProcessingAccelerating Networked Applications with Flexible Packet Processing
Accelerating Networked Applications with Flexible Packet Processing
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 

More from Pavel Odintsov

Network telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationNetwork telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationPavel Odintsov
 
VietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedVietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedPavel Odintsov
 
Flowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoiseFlowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoisePavel Odintsov
 
Detectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSDetectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSPavel Odintsov
 
Lekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flLekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flPavel Odintsov
 
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersLekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersPavel Odintsov
 
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiJanog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiPavel Odintsov
 
DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaPavel Odintsov
 
Containers in real world презентация
Containers in real world презентацияContainers in real world презентация
Containers in real world презентацияPavel Odintsov
 
Containers are the future of the Cloud
Containers are the future of the CloudContainers are the future of the Cloud
Containers are the future of the CloudPavel Odintsov
 

More from Pavel Odintsov (12)

Network telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationNetwork telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentation
 
VietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedVietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume Based
 
Flowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoiseFlowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoise
 
Detectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSDetectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOS
 
Lekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flLekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_fl
 
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersLekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
 
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiJanog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka Ishizaki
 
SIG-NOC Tools Survey
SIG-NOC Tools SurveySIG-NOC Tools Survey
SIG-NOC Tools Survey
 
DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner Maia
 
03 estrategia-ddos
03 estrategia-ddos03 estrategia-ddos
03 estrategia-ddos
 
Containers in real world презентация
Containers in real world презентацияContainers in real world презентация
Containers in real world презентация
 
Containers are the future of the Cloud
Containers are the future of the CloudContainers are the future of the Cloud
Containers are the future of the Cloud
 

Recently uploaded

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 

Recently uploaded (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 

DDoS Defense Mechanisms for IXP Infrastructures

  • 1. DDoS Defense Mechanisms for IXP Infrastructures Tim Dijkhuizen Lennart van Gijtenbeek SNE: Research Project II 03-07-2018 Supervisor: Stavros Konstantaras (AMS-IX)
  • 2. DDoS Defense Mechanisms for IXP Infrastructures Introduction 2 ● Distributed Denial of Service ● DDoS attacks on banks in NL [1] ● DDoS launched via botnets/booters ● Increase in size and complexity [2] ● IXP is a central entity ● Challenges: ○ High traffic loads ○ IXP neutrality ○ Complex infrastructure
  • 3. DDoS Defense Mechanisms for IXP Infrastructures Research Question 3 What (automated) solution can be developed to identify and mitigate DDoS attacks in an IXP network? Image source - thenounproject.com
  • 4. DDoS Defense Mechanisms for IXP Infrastructures Internet eXchange Points (IXPs) ● Peering LAN (BGP) ● Exchange of traffic ● Wide range of networks connected ○ Such as banks, content providers, etc. ● Layer 2 forwarding (no routing) ● Route servers 4
  • 5. DDoS Defense Mechanisms for IXP Infrastructures Amsterdam Internet Exchange (AMS-IX) ● ~820 peers ● 5 Tbit/s peaks each day ● Traffic forwarding: MPLS/VPLS ● Statistics collector: sFlow ● Route server: BIRD ● Current DDoS solution ○ Disable port(s), NaWas 5
  • 6. DDoS Defense Mechanisms for IXP Infrastructures Types of DDoS Attacks 6Image source - nbip.nl/nl/2018/05/16/nbip-ddos-data-report-2017-now-available/
  • 7. DDoS Defense Mechanisms for IXP Infrastructures Types of DDoS Attacks cont'd ● Volumetric attacks ○ Amplification attacks ■ E.g. DNS amplification ■ Small request, large response ● Protocol attacks ○ E.g. TCP SYN flood ○ State exhaustion ● Application attacks ○ Layer 7 ● No single detection method ● Distinct in: bandwidth and packets per second 7Image source - thenounproject.com
  • 8. DDoS Defense Mechanisms for IXP Infrastructures Design Principles 1. Mitigate as close to the source as possible 2. No configuration required on the CEs 3. No congestion in the IXP core 4. Identification and mitigation on lower layers is preferred 5. Detect most common DDoS attacks 6. Intelligence resides in the IXP 7. Minimal impact on good traffic 8. IXP neutrality 9. Compatibility 8
  • 9. DDoS Defense Mechanisms for IXP Infrastructures Detection Methods ● Traffic monitoring needed ○ PE switches ○ Sample data: sFlow/Netflow ● L2 detection ○ L2 headers are too limited ■ Frame size, CRC ○ Other parameters ■ Send rate, arrival interval ● L3/L4 detection 9
  • 10. DDoS Defense Mechanisms for IXP Infrastructures Detection Methods cont'd ● Threshold-based detection ○ Calculate thresholds based on destination IP(s) ■ Scalability: thresholds on prefixes ■ IXP environment: per source AS ○ Metrics: ■ L2/L3: BPS, PPS ■ L4: TCP flags, source ports, destination ports ● Fingerprint-based detection ○ DDoSDB [3] ○ False negatives 10
  • 11. DDoS Defense Mechanisms for IXP Infrastructures Mitigation Methods ● Scrubbing ○ On-site ■ Proprietary box ○ Off-site ■ NaWas ● Access Control Lists ● Software Defined Networking (SDN) ● BGP Blackholing 11
  • 12. DDoS Defense Mechanisms for IXP Infrastructures Blackholing Techniques with BGP ● Source-based blackholing ○ IXP neutrality ○ IP spoofing / false positives ● Destination-based blackholing on the CE 1. Route withdrawal 2. Static routing entry for prefix to Null0 and announce next-hop ● Destination-based blackholing on the PE ○ Set CE next-hop to ARP-dummy ○ L2 ACL 12
  • 13. DDoS Defense Mechanisms for IXP Infrastructures Design Proposal 13Image source - thenounproject.com
  • 14. DDoS Defense Mechanisms for IXP Infrastructures Added Components to IXP 14 DTM = DDoS Threat Mitigator
  • 15. DDoS Defense Mechanisms for IXP Infrastructures Component Interaction 15 DTM = DDoS Threat Mitigator DTA = DDoS Threshold Adviser CTA = Current Traffic Analyzer
  • 16. DDoS Defense Mechanisms for IXP Infrastructures Design Proposal 16 Threshold-based detection Three-way mitigation
  • 17. DDoS Defense Mechanisms for IXP Infrastructures Design Workflow 17
  • 18. DDoS Defense Mechanisms for IXP Infrastructures Identification Start Phase (1.1) 1. Peer starts the process 2. Identify PE port(s) of the victim 3. Get the CE IP, and announced prefixes (RS) 4. Start the DTA/CTA ○ Based on victim ports, and destination prefixes 5. Perform threshold comparisons 6. Present customer with exceeded prefixes ○ Customer decides which prefixes to mitigate 18
  • 19. DDoS Defense Mechanisms for IXP Infrastructures Mitigation Start Phase (1.2) 1. Determine the culprit AS(es) ○ Compare current to historical traffic ○ ASes to mitigation prefix 2. Determine mitigation workflow ○ Culprit AS is peered with RS: ■ Perform mitigation via BGP route withdrawal (phase 2.1) ○ Culprit AS is NOT peered with RS: ■ Perform mitigation via ACL on the ingress PE (phase 2.3) 19
  • 20. DDoS Defense Mechanisms for IXP Infrastructures CE Route Withdrawal Mitigation (2.1) ● Instruct the RS to withdraw the destination prefix to culprit ○ Wait for <BGP_convergence_timeout> ● Threshold is still exceeded: ○ Method unsuccessful, restore original BGP announcement ○ Perform mitigation via BGP blackhole nexthop (phase 2.2 ) ● Threshold is NOT exceeded: ○ Continue mitigation until DDoS no longer active ○ DDoS stopped or mitigation still working? 20
  • 21. DDoS Defense Mechanisms for IXP Infrastructures CE Blackhole Next-hop Mitigation (2.2) ● Instruct the RS to announce blackhole next-hop to culprit ○ Wait for <BGP_convergence_timeout> ● Threshold is still exceeded: ○ Method unsuccessful, restore original BGP announcement ○ Perform mitigation via L2 ACL (phase 2.3) ● Threshold is NOT exceeded: ○ Continue mitigation until DDoS no longer active ○ Monitor on ingress PE 21
  • 22. DDoS Defense Mechanisms for IXP Infrastructures PE L2 ACL Mitigation (2.3) ● Determine MAC addresses and DDoS ingress PE ● Instruct the PE to set up L2 ACL on the ingress PE ○ Based on source CE and destination CE ○ Wait for <ACL_timeout> ● Threshold is still exceeded: ○ Identification unsuccessful, remove ACL and go to phase 1.1 ● Threshold is NOT exceeded: ○ Continue mitigation until DDoS no longer active ○ Monitor on ingress PE 22
  • 23. DDoS Defense Mechanisms for IXP Infrastructures Proof of Concept 23 ● Focused on mitigation phases ○ Prefix identification, DTA, culprit AS identification ● Four different scenarios ○ Peered with RS: ■ 2.1 ✔ ■ 2.1 ✘, 2.2 ✔ ■ 2.1 ✘, 2.2 ✘, 2.3 ✔ ○ Not peered with RS: ■ 2.3 ✔
  • 24. DDoS Defense Mechanisms for IXP Infrastructures Proof of Concept cont'd 24 The DTM here also functions as the statistics collector FastNetMon: DDoS detector that supports multiple packet capture engines iPerf to generate traffic
  • 25. DDoS Defense Mechanisms for IXP Infrastructures ● Culprit AS is peered with RS ● BGP route withdrawal mitigation (2.1) ● Converge timeout: 10s, analysis: 4s ● 50Mbit normal traffic, 150Mbit threshold Proof of Concept cont'd 25 BPS (Mbit) Threshold (Mbit) BPS(Mbit) Time (s) Mitigation Scenario 1 Threshold detected and performing 2.1 mitigation at 27s 2.1 converge timeout at 37s2.1 mitigation successful at 41s
  • 26. DDoS Defense Mechanisms for IXP Infrastructures Proof of Concept cont'd ● Culprit AS is peered with RS ● BGP route withdrawal mitigation unsuccessful (2.1) ● BGP blackhole next-hop mitigation (2.2) 26 BPS (Mbit) Threshold (Mbit) BPS(Mbit) Time (s) Mitigation Scenario 2 Threshold detected and performing 2.1 mitigation at 26s 2.1 NOT successful and performing 2.2 mitigation at 40s 2.1 converge timeout at 36s2.2 converge timeout at 44s2.2 mitigation successful at 55s
  • 27. DDoS Defense Mechanisms for IXP Infrastructures Proof of Concept cont'd ● Culprit AS is peered with RS ● BGP route withdrawal mitigation unsuccessful (2.1) ● BGP blackhole next-hop mitigation unsuccessful (2.2) ● Ingress PE L2 ACL mitigation (2.3) 27 BPS (Mbit) Threshold (Mbit) BPS(Mbit) Time (s) Mitigation Scenario 3 2.1 mitigation NOT successful and performing 2.2 mitigation at 41s Threshold detected and performing 2.1 mitigation at 27s 2.1 converge timeout at 37s 2.2 mitigation NOT successful and performing 2.3 mitigation at 55s 2.2 converge timeout at 51s
  • 28. DDoS Defense Mechanisms for IXP Infrastructures Proof of Concept cont'd ● Culprit AS is NOT peered with RS ● Ingress PE L2 ACL mitigation (2.3) 28 Mitigation Scenario 4 BPS (Mbit) Threshold (Mbit) BPS(Mbit) Time (s) Threshold detected and 2.3 mitigation at 25s
  • 29. DDoS Defense Mechanisms for IXP Infrastructures Discussion ● Usage of route server and statistics collector ● BGP convergence time (too long?) ● Layer 3 ACL ○ IXP environment: focus on layer 2 mitigation ● Fine-grained thresholds (time of day) ● Present more details to customer 29
  • 30. DDoS Defense Mechanisms for IXP Infrastructures Conclusion ● Thresholds and Three-way mitigation ● Identification requires layer 3 analysis (prefixes) ● Mitigation achieved on layer 2 ○ BGP TE ○ IXP perspective 30
  • 31. DDoS Defense Mechanisms for IXP Infrastructures Future Work ● Different mitigations per type of attack ○ More advanced threshold metrics ● Testing with different sample rates ● Test scalability of the design ● Expand proof of concept ○ Identification phase ● Other methods of identification ○ Unsupervised/supervised learning 31
  • 32. DDoS Defense Mechanisms for IXP Infrastructures Questions Image source - thenounproject.com
  • 33. DDoS Defense Mechanisms for IXP Infrastructures References [1] ABN AMRO Group. Service temporarily disrupted by DDoS attacks (Jan 2018). Available at https://www.abnamro.com/en/newsroom/newsarticles/2018/service-temporarily-disrupted-by-ddos-atta cks.html (Accessed on 01/06/2018) [2] Cyberscoop. Arbor: DDoS attacks growing faster in size, complexity (Jan 2018). Available at https://www.cyberscoop.com/ddos-attacks-growing-arbor-networks/ (Accessed on 01/06/2018) [3] DDoSDB. Collecting and Sharing the most important information of DDoS attacks. https://ddosdb.org/ (Accessed on 14/06/2018) 33