poc report of intra-domain ddos orchestration usecase in

12
PoC report of intra-domain DDoS Orchestration usecase in draft-ietf-dots-use-cases-12 Yuhei Hayashi , Takeaki Nishioka (NTT Network Service Systems Labs) {hayashi.yuhei, nishioka.takeaki} @lab.ntt.co.jp

Upload: others

Post on 05-Jan-2022

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PoC report of intra-domain DDoS Orchestration usecase in

PoC report of intra-domain DDoS Orchestration usecase in draft-ietf-dots-use-cases-12

Yuhei Hayashi , Takeaki Nishioka (NTT Network Service Systems Labs) {hayashi.yuhei, nishioka.takeaki} @lab.ntt.co.jp

Page 2: PoC report of intra-domain DDoS Orchestration usecase in

Summary

・We have demonstrated a PoC of intra-domain use case using go-dots. ・We would like DOTS Clients to send attacker’s info (e.g. top talker).

Page 3: PoC report of intra-domain DDoS Orchestration usecase in

Core NW Scrubbing Center

Motivation

PE Router

PE Router

Orchestrator

Target GRE Endpoint Router

Attacker

DDoS Mitigation Systems

・We would like to automate DDoS Mitigation in intra-domain NW with an Orchestrator. ・We also would like to try DOTS as standardized IF between the Orchestrator and (Flow collectors | DDoS Mitigation Systems).

DOTS Flow collectors

DOTS

This automates … - Collecting information - Deciding what to do - Ordering to mitigate

BGP

Page 4: PoC report of intra-domain DDoS Orchestration usecase in

Report: PoC Overview

Our PoC usecase draft-ietf-dots-use-cases-12

DDoS Orchestration

Flow collector

Orchestrator DMS

PE Router

BGP (Redirect)

DOTS Signal (Mitigation Request)

DOTS Signal (Offload Request)

BGP (RTBH)

Orchestrator DMS

BGP (Redirect)

DOTS Signal (Mitigation Request)

PE Router

Flow collector

DOTS Signal (Mitigation Request)

Mitigate

Mitigate

Mitigate

DOTS Signal (Mitigation Request)

Admin

Analyze

Page 5: PoC report of intra-domain DDoS Orchestration usecase in

Report: Environment

Core NW Scrubbing Center

DOTS Client VM for vAPS

DOTS Client VM for flow collector DOTS Server VM

PE Router (MX104/Juniper)

PE Router (7750 / Nokia)

Orchestrator

Pseudo target (IXIA)

GRE Endpoint Router (ASR1009 / Cisco)

Pseudo attacker (IXIA)

goBGP

go-dots Server

Fluentd

Flow collector Plugin

Fluentd go-dots Client

DDoS Mitigation System (vAPS / Arbor)

go-dots Server

go-dots Client

Controller

vAPS Plugin

go-dots Client

Controller

go-dots Client

Flow collector

Page 6: PoC report of intra-domain DDoS Orchestration usecase in

Report: Action 1/5

Core NW Scrubbing Center

DOTS Client VM for vAPS

DOTS Client VM for flow collector DOTS Server VM

PE Router (MX104/Juniper)

PE Router (7750 / Nokia)

Orchestrator

Pseudo target (IXIA)

Pseudo attacker (IXIA)

goBGP

go-dots Server

Fluentd

Flow collector Plugin

Fluentd go-dots Client

DDoS Mitigation System (vAPS / Arbor)

go-dots Server

go-dots Client

Controller

vAPS Plugin

go-dots Client

Controller

go-dots Client

Flow collector

NetFlow v9

Action #1: Send netflow to flow collector

GRE Endpoint Router (ASR1009 / Cisco)

Page 7: PoC report of intra-domain DDoS Orchestration usecase in

Report: Action 2/5

Core NW Scrubbing Center

DOTS Client VM for vAPS

DOTS Client VM for flow collector DOTS Server VM

PE Router (MX104/Juniper)

PE Router (7750 / Nokia)

Orchestrator

Pseudo target (IXIA)

Pseudo attacker (IXIA)

goBGP

go-dots Server

Fluentd

Flow collector Plugin

Fluentd go-dots Client

DDoS Mitigation System (vAPS / Arbor)

go-dots Server

go-dots Client

Controller

vAPS Plugin

go-dots Client

Controller

go-dots Client

Flow collector

syslog

DOTS signal

syslog

Action #2-1: (When volume attack is detected )

Request DDoS Mitigation

Action #2-2: Extract target ip address from the syslog

and transform it into input of go-dots client controller.

Action #2-3: Send DOTS signal

GRE Endpoint Router (ASR1009 / Cisco)

Page 8: PoC report of intra-domain DDoS Orchestration usecase in

Report: Action 3/5

Core NW Scrubbing Center

DOTS Client VM for vAPS

DOTS Client VM for flow collector DOTS Server VM

PE Router (MX104/Juniper)

PE Router (7750 / Nokia)

Orchestrator

Pseudo target (IXIA)

Pseudo attacker (IXIA)

goBGP

go-dots Server

Fluentd

Flow collector Plugin

Fluentd go-dots Client

DDoS Mitigation System (vAPS / Arbor)

go-dots Server

go-dots Client

Controller

vAPS Plugin

go-dots Client

Controller

go-dots Client

Flow collector

BGP

BGP Action #3-1:

Invoke goBGP

Action #3-2: Redirect attack traffic

to DDoS Mitigation Systems

GRE Endpoint Router (ASR1009 / Cisco)

Page 9: PoC report of intra-domain DDoS Orchestration usecase in

Report: Action 4/5

Core NW Scrubbing Center

DOTS Client VM for vAPS

DOTS Client VM for flow collector DOTS Server VM

PE Router (MX104/Juniper)

PE Router (7750 / Nokia)

Orchestrator

Pseudo target (IXIA)

Pseudo attacker (IXIA)

goBGP

go-dots Server

Fluentd

Flow collector Plugin

Fluentd go-dots Client

DDoS Mitigation System (vAPS / Arbor)

go-dots Server

go-dots Client

Controller

vAPS Plugin

go-dots Client

Controller

go-dots Client

Flow collector

syslog

DOTS signal

syslog

Action #4-1: (When attack is detected) Mitigation offload request

Action #4-2: Extract target ip address

and transform it into input of go-dots client controller.

Action #4-3: Send DOTS signal

GRE Endpoint Router (ASR1009 / Cisco)

Page 10: PoC report of intra-domain DDoS Orchestration usecase in

Report: Action 5/5

Core NW Scrubbing Center

DOTS Client VM for vAPS

DOTS Client VM for flow collector DOTS Server VM

PE Router (MX104/Juniper)

PE Router (7750 / Nokia)

Orchestrator

Pseudo target (IXIA)

Pseudo attacker (IXIA)

goBGP

go-dots Server

Fluentd

Flow collector Plugin

Fluentd go-dots Client

DDoS Mitigation System (vAPS / Arbor)

go-dots Server

go-dots Client

Controller

vAPS Plugin

go-dots Client

Controller

go-dots Client

Flow collector

RTBH

RTBH

Action #5-2: RTBH by BGP

Action #5-1: Invoke goBGP

GRE Endpoint Router (ASR1009 / Cisco)

Page 11: PoC report of intra-domain DDoS Orchestration usecase in

Requirement

Now

Flow collector

Orchestrator DMS

PE Router

BGP (Redirect)

DOTS Signal (Mitigation Request)

DOTS Signal (Offload Request)

BGP (RTBH)

Orchestrator DMS

PE Router

BGP (Redirect)

DOTS Signal (Mitigation Request)

DOTS Signal (Offload Request)

BGP Flowspec (Block)

Future

Requirement: We want DOTS Clients to send attacker information (e.g. top

talker) to block attack traffic at PE routers more correctly.

Target info

Target info

Target info

Mitigate

Mitigate

Mitigate

Target info Attacker info

Page 12: PoC report of intra-domain DDoS Orchestration usecase in

Discussion

・Does our PoC use-case attract you? ・If it does, what do you think about our requirement?