E08-2E1 - Preventing DDoS Attacks with P2P Systems - [email protected] - ENS
Preventing DDoS Attacks with P2P SystemsPreventing DDoS Attacks with P2P SystemsXin Sun, Ruben Torres, Sanjay Rao
Vulnerabilities commonly exist in the membership protocols of many P2P systems;
• KAD, BitTorrent-DHT, Overnet, Gnutella, ESM…DDoS attacks are feasible by exploiting those
vulnerabilities;Such attacks can be launched towards any hosts,
even those do not participate in any P2P systems!
Two different P2P systems are exploited:
• DHT-based KAD•Gossip–based ESM
Traffic seen by the victim is shown in the graphs.
ESM (Broadcasting, Gossip)
5 attackers
KAD (File Distribution, DHT)
The large scale of P2P systems (>1M concurrent users) makes such DDoS attacks huge magnitude (~Gbps), hard to stop and hard to trace back.
200 attackers
10% attackers
Preventing such DDoS attacks through
Validation through Multiple Sources Bounding Logical IDs for a Physical IDPull + Direct Validation
Robust Membership ManagementRobust Membership Management
Nodes will not accept anyinformation until learn from at least K members.
An at tacker could repeatedly redirect an innocent node to a victim, using different logical IDs for the same physical ID, to amplify the attack.
Solution: bind the number of logical IDs for a physical ID a node can talk to.
Pull: Any information conveyed by a member is always in response to a prior solicitation
Direct Validation: Immediately probe any new node learned through a third party before considering it as a neighbor.
Pull + Direct Validation: Neither of the two is enough by itself. Combine them for improved system robustness.
A
B
C
X
M
A-REQ: F
M-RESP: V
1
A-REQ: F
B-RESP: X
A-REQ: F
B-RESP: X
2
3
A contacts X 4
Learn from 2 members
A
B
C
X
M
A-REQ: F
M-RESP: V
1
A-REQ: F
B-RESP: X
A-REQ: F
B-RESP: X
2
3
A contacts X 4
Learn from 2 members
ID1 ID2
ID3 ID4
IP-X, Port-Y
A
A-REQ: F
M-RESP: ID1…ID4M
Fake IDs
Bound rate of messages sent to many logical IDs with same IP/Port
ID1 ID2
ID3 ID4
IP-X, Port-Y
A
A-REQ: F
M-RESP: ID1…ID4M
Fake IDs
Bound rate of messages sent to many logical IDs with same IP/Port
Exploiting KAD search mechanism to generate a redirection DDoS attack towards a host that’s not part of KAD.
A
B
C
I
A-REQ: F
B-RESP: CA-REQ: F
C-RESP: I
A-REQ: F
I-RESP: Sources
Index for F
A
A-REQ: F
M-RESP: Victim
M
VictimNormal Search in KAD Redirection Attack
12
3
A-REQ: FA
B
C
I
A-REQ: F
B-RESP: CA-REQ: F
C-RESP: I
A-REQ: F
I-RESP: Sources
Index for F
A
A-REQ: F
M-RESP: Victim
M
VictimNormal Search in KAD Redirection Attack
12
3
A-REQ: F
DDoS attacks are feasible with P2P Systems
E08_2E1.pdf 1 3/1/2007 4:13:09 PM