
Peer-to-Peer Netw Appl DOI 10.1007/s12083-009-0046-6 On the feasibility of exploiting P2P systems to launch DDoS attacks Xin Sun · Ruben Torres · Sanjay G. Rao Received: 7 November 2008 / Accepted: 25 March 2009 © Springer Science + Business Media, LLC 2009 Abstract We show that malicious nodes in a peer-to- Keywords Peer-to-Peer · Security · DDoS · peer (P2P) system may impact the external Internet Evaluation · Measurement environment, by causing large-scale distributed denial of service (DDoS) attacks on nodes not even part of the overlay system. This is in contrast to attacks that disrupt 1 Introduction the normal functioning, and performance of the overlay system itself. We demonstrate the significance of the at- Peer-to-peer (P2P) systems are rapidly maturing from tacks in the context of mature and extensively deployed being narrowly associated with copyright violations, to P2P systems with representative and contrasting mem- a technology that offers tremendous potential to deploy bership management algorithms—Kad, a DHT-based new services over the Internet. The recently released file-sharing system, and ESM, a gossip-based video Windows Vista is equipped with its own, under-the- broadcasting system. We then present an evaluation hood P2P networking system [3], and several commer- study of three possible mitigation schemes and discuss cial efforts are exploring the use of P2P systems for live their strength and weakness. These schemes include media streaming [4, 15, 16]. Recent studies [9] indicate (i) preferring pull-based membership propagation over that over 60% of network traffic is dominated by P2P push-based; (ii) corroborating membership information systems, and the emergence of these systems has dras- through multiple sources; and (iii) bounding multiple tically affected traffic usage and capacity engineering. references to the same network entity. We evaluate With the proliferation of P2P systems, it becomes the schemes through both experiments on PlanetLab critical to consider how they can be deployed in a safe, with real and synthetic traces, and measurement of the secure and robust manner, and understand their im- real deployments. Our results show the potential of pact on an Internet environment already suffering from the schemes in enhancing the DDoS resilience of P2P several security problems. P2P systems enable rapid systems, and also reveal the weakness in the schemes deployment by moving functionality to end-systems. and regimes where they may not be sufficient. However, they are vulnerable to insider attacks coming from (potentially colluding) attackers that infiltrate the overlay or compromise member nodes. Several works [8, 12, 32, 33, 38] have studied how malicious nodes in a P2P system may disrupt the normal B · · X. Sun ( ) R. Torres S. G. Rao functioning, and performance of the system itself. In Purdue University, 465 Northwestern Avenue, West Lafayette, IN 47907, USA this paper, however, we focus on attacks where mali- e-mail: [email protected] cious nodes in a P2P system may impact the external In- R. Torres ternet environment, by causing large-scale distributed e-mail: [email protected] denial of service (DDoS) attacks on nodes not even S. G. Rao part of the overlay system. In particular, an attacker e-mail: [email protected] could subvert membership management mechanisms, Peer-to-Peer Netw Appl and force a large fraction of nodes in the system to describes the methodology we use to evaluate the believe in the existence of, and communicate with a schemes, and Section 6 presents the results. We discuss potentially arbitrary node in the Internet. Such attacks relatedworkinSection7, and finally conclude our may be hard to detect as the packets arriving at a victim paper in Section 8. are not distinguishable from normal protocol packets. These attacks may be viewed as a particular kind of reflector attacks [27], however the scale and unique 2 Vulnerabilities in P2P systems properties of P2P systems make them worthy of study in their own right. These attacks are in contrast to In this paper, we focus on DDoS attacks triggered by the traditional botnet-based DDoS attacks, where the exploiting the membership management algorithms of attacker has control over a large number of machines P2P systems. The membership management algorithms by infecting them with a malicious program that takes in a P2P system enable a node to join the group, instructions from her [17]. and maintain information about other members, even In this paper, as a first contribution, we show that though nodes may join or leave the system. To scale a potential attacker can launch attacks of hundreds to large group sizes, typical nodes maintain knowledge of megabits a second on an arbitrary Internet node of only a small subset of group members. While a such as a web server, by exploiting the popularly de- large number of P2P systems have emerged in recent ployed file distribution system Kad [13], and the exten- years, two of the most common approaches for mem- sively deployed video broadcasting system ESM [10]. bership management involve the use of distributed hash The systems represent contrasting applications, and tables (DHTs) [24, 28, 29, 34, 42], and gossip-based involve different and representative membership man- algorithms. While popular file-distribution systems like agement designs - structured DHT-based and unstruc- BitTorrent [7] and eMule [13] originally relied on cen- tured gossip-based. Our attacks exploit fundamental tralized servers (trackers) for group management, more design choices made by P2P system designers, and shed recent versions use decentralized mechanisms based on new insights on the interplay between membership DHTs. Many other systems such as ESM and Cool- management mechanisms, and the feasibility of exploit- Streaming [10, 41] employ gossip-like mechanisms to ing P2P systems to cause DDoS attacks. maintain group membership information. As a second contribution of the paper, we present To demonstrate the generality of the issues dis- an evaluation study of possible mitigation schemes, and cussed, we consider P2P systems targeted at applica- discuss their strength and weakness. These schemes tions with very contrasting properties and very different include (i) preferring pull-based membership propaga- membership management designs. In particular, we tion over push-based; (ii) corroborating membership consider file distribution and video broadcasting appli- information through multiple sources; and (iii) bound- cations. Video broadcast applications are distinguished ing multiple references to the same network entity. by their stringent real-time constraints requiring timely We evaluate the schemes through both experiments and continuously streaming delivery. Both applications on the PlanetLab and measurement studies of the real are bandwidth-intensive, and large scale, corresponding deployments. Our results shed light on the potential of to tens of thousands of users simultaneously participat- the schemes and in what scenarios and regimes they ing in the application. may be useful, and also point to the potential weakness The particular systems we consider in this work in- in the schemes. clude Kad[13] for file distribution and ESM [10]for This paper extends our preliminary work which ap- video broadcasting. Kad is a DHT based on Kademlia peared in the workshop paper [39]. While [39]pre- [24], add is supported by the popular eMule [13] clients sented attack heuristics on Kad and ESM, in this paper and other eMule-like clients such as aMule [5]and we also present an evaluation study of several mitiga- xMule [40]. To the extent of our knowledge, Kad is tion schemes (Section 4 to Section 6). the largest DHT currently used, with more than one The rest of the paper is organized as follows. million concurrent nodes [35]. ESM is a video broad- Section 2 presents vulnerabilities that we identified in casting system that employs gossip-based membership the Kad and ESM systems. Section 3 shows results algorithms. It is one of the first operationally deployed demonstrating the feasibility of exploiting these sys- systems and has seen significant real-world deployment tems for DDoS attacks. Section 4 discusses the strength [10]. We are motivated to use these systems given their and weakness of several mitigation schemes. Section 5 extensive deployment, the contrasting applications they Peer-to-Peer Netw Appl represent, and the different yet representative member- by creating a redirection attack. Whenever the attacker ship algorithms they employ. node receives a query from a benign node, it returns a (fake) response that contains the IP and port of the 2.1 DHT-based file distribution:Kad victim node (indicating that the victim is part of the system)alongwithafakeIDforthevictimwhichis In Kad, nodes and files have IDs that are globally closer to the target ID. This tricks the benign node into unique and randomly chosen from the same ID space thinking that the victim node is part of the Kad system of 128 bits. Each node maintains a routing table with and is likely to be an index node. Hence the benign a subset of peers that are part of the system. For any node may contact the victim for searches as well as file F, there are “index nodes” which maintain a list of other normal protocol operations. For example, Fig. 1b members that own a partial or complete copy of the file. shows how a malicious node M can make a benign These members are called “sources” of the file. Index node A send a query to the victim V, which can be an nodes are not dedicated nodes but regular participants, arbitrary Internet host (may not participate in Kad). who have an ID close to a file ID. For example, in The attack can be magnified if many benign nodes Fig. 1a, node A wishes to download a file F. A must query the malicious node when they conduct searches. first discover I, the index-node for file F, and obtain In addition, a coalition of malicious nodes could further a list of sources from I.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages16 Page
-
File Size-