preventing denial of service attacks

61
Preventing Denial of Service Attacks by N.V.Krishna Rao (08034D0501) Under Supervision and Guidance of Dr. S.Durga Bhavani S.V.S.Hanumantha Rao (Internal Guide) (External Guide)

Upload: amalia

Post on 16-Jan-2016

116 views

Category:

Documents


0 download

DESCRIPTION

Preventing Denial of Service Attacks. by N.V.Krishna Rao (08034D0501) Under Supervision and Guidance of Dr. S.Durga Bhavani S.V.S.Hanumantha Rao (Internal Guide) (External Guide). ABSTRACT(MDAF Scheme): - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Preventing Denial of Service Attacks

Preventing Denial of Service Attacks

by

N.V.Krishna Rao (08034D0501)

Under Supervision and Guidance of

Dr. S.Durga Bhavani S.V.S.Hanumantha Rao

(Internal Guide) (External Guide)

Page 2: Preventing Denial of Service Attacks

ABSTRACT(MDAF Scheme):

This Project proposes a scheme for detecting and preventing the most harmful and difficult to detect DoS Attacks those that use IP address spoofing to disguise the attack flow. The scheme allows the system to configure itself based on the normal traffic of a Web server, so that the occurrence of an attack can be quickly and precisely detected. The MDAF scheme scans the marking field of all incoming packets to selectively filter-out the attack packets.

On employing this marking scheme, when a packet arrives at its destination, its marking depends only on the path it has traversed. If the source IP address of a packet is spoofed, this packet must have a marking that is different from that of a genuine packet coming from the same address. The spoofed packets can thus be easily identified and dropped by the filter, while the legitimate packets containing the correct markings are accepted.

Page 3: Preventing Denial of Service Attacks

Approaches for Defending DoS Attacks

Preventive Source Tracking Reactive Defense SolutionsProactive Server - Packet Marking Schemes Path Identifier scheme (Pi) Roaming Scheme Probabilistic Packet Marking(PPM) Pushback method

Deterministic Marking Approach(DPM) D-WARD Message Traceback Method Packet Score Logging Neighbor Stranger- Traffic Observation Method Discrimination (NSD)

Existing System:

Page 4: Preventing Denial of Service Attacks

Proposed System:

• Distinguishing the Attack Packets

• Learning Phase

• Filtering Phase

• Marking Verification

• Attack Detection

• Complete Filtering Scheme

• Route Change Consideration

• Pushback Implementation

Page 5: Preventing Denial of Service Attacks

• Distinguishing the Attack Packets • Marking Scheme:

Marking algorithm:k <- a 16-bit random number,

secretly maintained by the Router M(R) <- k XOR h(A) For each packet w { If W.ID = 0 Then w.ID <- M(R) Else { M_old <- w.ID M_new <- M(R) XOR SL(M_old) w.ID <- M_new } }

Page 6: Preventing Denial of Service Attacks

• Learning Phase The (IP-address, Marking) pairs are stored in a Filter Table, which are later used to verify each incoming packet and filter-out the spoofed ones.

• Filtering Phase To the packet from an IP address recorded in the Filter Table, it is

accepted if it has a consistent marking otherwise, it is dropped . For the packet from a new IP address, scheme accept it with probability p and put the (IP-address, Marking) pair to a Check List, so that the marking can be verified.

• Marking Verification If there is a consistent marking from unknown IP address till the

threshold value then the (IP-address, Marking) from check table is moved to Filter table.

• Attack Detection A counter known as TMC is maintained by server, it is incremented

each time packets with incorrect markings as well as packets from unknown source addresses that are not recorded if counter reaches the threshold value then attack is signaled.

Page 7: Preventing Denial of Service Attacks

• Complete Filtering Scheme:

1)If the (IP-address, Marking) pair is same with one of the records in the Filter Table, the packet is received.2) If the source IP address of the packet exists in theFilter Table, but the marking does not match, this packet is considered to be a spoofed packet and is dropped. TMC is incremented.3) If the source IP address does not appear in the Filter Table, then this packet is accepted with a probability p. TMC is incremented.4) If the TMC value exceeds the threshold, an attack is signaled.5) All echo reply messages that are received as responses to the firewall’s requests are handled by the Check List verification process. They are not passed through the filter.

Page 8: Preventing Denial of Service Attacks

• Pushback Implementation

In the Pushback method, the victim of a DoS attack sends the signatures of attack to upstream routers and ask them to help filtering out these packets.

• Route Change Consideration

SMC, to count the number of mismatching packets for any IP address A. When the value of SMCA reaches a threshold value, the entry (A, MarkingA) is copied to the Check List to test whether the route from this source has changed.

Page 9: Preventing Denial of Service Attacks

• Software Requirements:

WINDOWS/LINUX OSJ2SE 5.0MS ACCESS

• Hardware requirements:

Intel Pentium based Micro-Processor with a minimum speed of500MHz or higher

Ram memory of 256MB or higherNetwork Interface Card(NIC)

Page 10: Preventing Denial of Service Attacks

Use Case diagram

Page 11: Preventing Denial of Service Attacks

Class Diagram

Page 12: Preventing Denial of Service Attacks

Sequential diagramclient node Router server

1: sends

2: marks

3: sends

4: verifies

5: response

6: spoofs

7: sends

8: marks

9: sends

10: verifies

Page 13: Preventing Denial of Service Attacks

collaboration

client

node

Router

server

4: verifies10: verifies

2: marks8: marks

6: spoofs

5: response

1: sends

7: sends

3: sends9: sends

Page 14: Preventing Denial of Service Attacks

Scheme Topology for packet flow

Scheme Topology for packet flow in Route change consideration.

Page 15: Preventing Denial of Service Attacks

The Screens of this Project is illustrated using following tasks.

1. In Learning Phase adding the new client1 to the marking table

2. In Filtering phase handling the new client2 with verification process using check table.

3. Preventing the Attacker performing Spoofed attack with the client2’s ip address.

4. Preventing the Attacker performing Randomized attack.

5. Preventing the Attacker performing Flood attack.

6. Illustrating the attack signal and processing only legitimate user packets.

7. Showing the decrease in probability of acceptance of packets from new IP address.

8. Route change considerations of Client1 using smc table and path marking.

Page 16: Preventing Denial of Service Attacks

16/42

Learning Phase: Client 1 sending packet.

Page 17: Preventing Denial of Service Attacks

• Learning Phase: Client1 window showing the Data transmission from Client1 to router1.

Page 18: Preventing Denial of Service Attacks

Learning Phase: Router1 window showing the marking value and the details of Data Transmission to Router6.

Page 19: Preventing Denial of Service Attacks

Learning Phase: Router6 window showing the marking value and the details of Data Transmission to server

Page 20: Preventing Denial of Service Attacks

Learning Phase: Server window showing the packet acceptance details, packet details and authentication.

Page 21: Preventing Denial of Service Attacks

Learning Phase: Client 1 window showing input data and the server response message with the authentication message.

Page 22: Preventing Denial of Service Attacks

Learning Phase: Mark table reflecting the addition of Client 1 IPaddress and marking

Page 23: Preventing Denial of Service Attacks

Learning Phase: Login table showing the Client 1 authentication details

Page 24: Preventing Denial of Service Attacks

Filtering Phase: Client2 window showing sending a packet.

Page 25: Preventing Denial of Service Attacks

Filtering Phase: Client2 window showing echo message responses and adding of record to mark & login tables after the verification process in filtering phase.

Page 26: Preventing Denial of Service Attacks

Server window showing the Client 2 packet details, adding to Checklist and sending the echo packets in verification process in filtering phase.

Page 27: Preventing Denial of Service Attacks

Filtering Phase: Server window showing the Client 2 packet details, echo packets and adding record to Mark table and login table after verification process

Page 28: Preventing Denial of Service Attacks

Check table with the Client 2 path marking in Filtering Phase – verification process

Page 29: Preventing Denial of Service Attacks

Mark table reflecting the addition of Client 2 path marking in filtering phase.

Page 30: Preventing Denial of Service Attacks

Attacker window showing the Spoofing the Client2’s IP address and sending data packets (Spoofed Attack).

Page 31: Preventing Denial of Service Attacks

Router6 window showing the details of sending the spoofed data packet to Server and showing the marking value (37992) which is different from the actual value (41184).

Page 32: Preventing Denial of Service Attacks

.

Server window showing the spoofed details which has the different marking value than the actual marking value stored in the mark table for the IP address and packet details

Page 33: Preventing Denial of Service Attacks

Attacker window performing the Randomized Attack.

Page 34: Preventing Denial of Service Attacks

Server window showing packet details in Filtering phase - verification process, the IP address accepted and stored in checklist for the verification.

Page 35: Preventing Denial of Service Attacks

Server window showing the deletion of the record from Check list

Page 36: Preventing Denial of Service Attacks

Mark table showing the Fake IP address with special symbol (null) so that it can filter all the packets coming from IP address

Page 37: Preventing Denial of Service Attacks

Attacker window performing the Flood Attack.

Page 38: Preventing Denial of Service Attacks

Mark table showing the Fake IP address with special symbol (null) so that it can filter all the packets coming from IP address.

Page 39: Preventing Denial of Service Attacks

Attacker window showing the flood packets transmission

Page 40: Preventing Denial of Service Attacks

Server window showing the Attack Signal

Page 41: Preventing Denial of Service Attacks

Server window showing Push back method implementation

Page 42: Preventing Denial of Service Attacks

Router6 implementing the packet filtration after push back method implementation.

Page 43: Preventing Denial of Service Attacks

Client2 (legitimate user) window showing data packets authentication and acceptance of the packet after pushback method implementation

Page 44: Preventing Denial of Service Attacks

Router6 Forwarding only the legitimate user packers after push back implementation.

Page 45: Preventing Denial of Service Attacks

Server window showing the processing only legitimate user packets after push back method implementation.

Page 46: Preventing Denial of Service Attacks

Attacker performing Randomized attack

Page 47: Preventing Denial of Service Attacks

Router6 Forwarding only legitimate user packers and filtering the fake IP address packets.

Page 48: Preventing Denial of Service Attacks

Server window showing the processing only legitimate user packets after push back method implementation.

Page 49: Preventing Denial of Service Attacks

Client3 window showing the details of Data Transmission.

Page 50: Preventing Denial of Service Attacks

Router6 showing the filtration of the packet after push back method implementation

Page 51: Preventing Denial of Service Attacks

Server processing only legitimate user packets after push back implementation.

Page 52: Preventing Denial of Service Attacks

Client1 window showing the details of sending data packet through router5 instead of Router1.

Page 53: Preventing Denial of Service Attacks

Route change consideration: Router5 window showing the details of Data Transmission to Router6 and marking value.

Page 54: Preventing Denial of Service Attacks

Route change consideration: Server window showing the denial of packet due to the difference in the marking value that is recorded in mark table for this IP address

Page 55: Preventing Denial of Service Attacks

Route change consideration: SMC table reflecting the addition of Client 1 path marking with IP address and count.

Page 56: Preventing Denial of Service Attacks

Route change consideration: Check table reflecting the Client1 new path marking and its count in verification process

Page 57: Preventing Denial of Service Attacks

Route change consideration: Mark table reflecting the Updating of Client 1 path marking (38112 to 38768).

Page 58: Preventing Denial of Service Attacks

Route change consideration: Client1 window showing the updating of record in Mark table.

Page 59: Preventing Denial of Service Attacks

conclusion

• The MDAF scheme can distinguish the attack packets (containing spoofed source addresses) from the packets sent by legitimate users, and thus filters out most of the attack packets before they reach the victim.

• On employing this marking scheme, when a packet arrives at its destination, its marking depends only on the path it has traversed. If the source IP address of a packet is spoofed, this packet must have a marking that is different from that of a genuine packet coming from the same address. The spoofed packets can thus be easily identified and dropped by the filter, while the legitimate packets containing the correct markings are accepted.

Page 60: Preventing Denial of Service Attacks

FUTURE ENHANCEMENTS

In Future following enhancements can be done:

• Making the packet marking more effective.

• Router Intelligent systems can be implemented to identify the Route changes.

• This scheme can be implemented with Web Servers.

Page 61: Preventing Denial of Service Attacks

BIBLIOGRAPHY[1] Deital & Deital , Java How To Program, PHI, Sixth Edition,2005. [2] Grady Booch, Unified Modelling Language user guide, Addison Wesley, Second Edition, 2005. [3] Herbert Schieldt , Java2 The Complete Reference, Tata McGrawHill, Seventh Edition, 2006. [4] Elliotte Rusty Harold, Java Network Programming, O’Reilly&Associates,

SecondEdition, 2005.[5] Roger Pressman, Software Engineering,McGraw Hill,Sixth Edition,2005.[6] William Stallings, Network Security Essentials (Applications and Standards),

Pearson Education, First Edition, 2006.[7] www.en.wikipedia.org/wiki/Ipspoofing.[8] www.securityfocus.com/infocus/1674[9] www.sun.com[10] Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb El Saddik, and Amiya

Nayak,“Detecting and Preventing IP spoofed Distributed DoS Attacks” , International Journal of Network Security, Vol.7, No.1, PP.70-81, July2008.