The present disclosure relates generally to security solutions for edge-networks and, more specifically, to protection against DDoS attacks.
The 5G standard is the fifth generation technology standard for broadband cellular networks. As 5G standard grows in popularity, the technology is expected to bring new use cases and business models for consumers, businesses, and the telecommunication industry as a whole. In addition, the 5G standard will lay the foundation for massive adoption of Internet of Things (IoT) devices everywhere, including environmental sensors, gaming, telemedicine, manufacturing, agriculture, autonomous cars, and so on.
To support the expected diversity of new applications over a 5G network, communication service providers (CSPs) or Internet service providers (ISPs) adapt technologies and methodologies initially developed for data centers and cloud computing platforms. Such technologies include network function virtualization (NFV), software defined networks (SDN), and virtual entities (such as software containers and micro-services). By adopting such technologies, CSPs and ISPs can provide the scale and performance required by applications carried over the 5G network (hereinafter “5G applications”).
Further, the 5G network and supporting infrastructure are required to provide low latency and high bandwidth in order to support 5G applications. To this aim, 5G networks are designed to be integrated with multi-access (mobile) edge computing (MEC). The MEC architecture creates a critical bridge between 5G networks and cloud computing infrastructure. By deploying computing and storage resources close to the Radio Access Network (RAN), CSPs and ISPs can optimize the delivery of latency-sensitive content and services to their end users.
The new infrastructure emerging from adopting the 5G standard introduces significant cyber threats, and, specifically, distributed denial of service (DDoS) threats against the network infrastructure. For example, connectivity of millions of IoT devices deployed everywhere may be exploited to execute a DDoS attack. As such devices are generally distributed, the traditional model for perimeter-based or appliance-based cyber protection is impractical for detecting and mitigating such threats.
Once baselines are established, at S120, during an operation phase, abnormal behavior is detected based on the incoming traffic and the computed baselines. For example, a threshold for a packets per second feature is computed based on the respective threshold. The packets per second of incoming traffic is compared to the computed threshold to determine abnormal behavior. Based on a detected anomaly, at S130, the anomaly (hence, a potential cyber-attack) is characterized to create a policy to mitigate any malicious traffic. The mitigation action, performed at the mitigation phase S140, may include cleaning valid traffic from malicious traffic, blocking traffic from reaching a protected entity 101, rate limiting the traffic, and so on.
The traditional security model discussed herein is typically implemented by a security system deployed in-line of traffic between a network and protected entities. That is, all traffic should be directed through such a system for inspection. Such a deployment may be efficient for resources of a centralized data center, but not for distributed and disaggregated network infrastructures.
It would, therefore, be advantageous to provide a cybersecurity solution that would overcome the deficiencies noted above.
A summary of several example embodiments of the disclosure follows. This summary is provided for the convenience of the reader to provide a basic understanding of such embodiments and does not wholly define the breadth of the disclosure. This summary is not an extensive overview of all contemplated embodiments, and is intended to neither identify key or critical elements of all embodiments nor to delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more embodiments in a simplified form as a prelude to the more detailed description that is presented later. For convenience, the term “some embodiments” or “certain embodiments” may be used herein to refer to a single embodiment or multiple embodiments of the disclosure.
Certain embodiments disclosed herein include a system for disaggregated detection denial-of-service (DDoS) attacks. The system comprises a plurality of detectors deployed on a plurality of network nodes, wherein each network node is connected to an edge network, wherein one detector of the plurality of detectors is deployed in each of the plurality of network nodes, wherein each of the plurality of detectors is configured to detect and characterize at least a DDoS attack by analyzing telemetries received by the respective network node in which the detector is deployed.
Certain embodiments disclosed herein include a method a method for disaggregated detection denial-of-service (DDoS) attacks. The method comprises deploying a plurality of detectors on a plurality of network nodes, wherein each network node is connected to an edge network; and instantiating a plurality of security functions on each of the plurality of detectors, wherein the plurality of security functions; activating a first security function to detect anomalies in the telemetries received by the respective network node, wherein the detected anomalies are indicative of a potential DDoS attack; activating a second security function to generate attack signatures based on the detected anomalies; and activating a third security function to generate at least one mitigation policy based on the generated attack signatures.
The subject matter disclosed herein is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other objects, features, and advantages of the disclosed embodiments will be apparent from the following detailed description taken in conjunction with the accompanying drawings.
A summary of several example embodiments of the disclosure follows. This summary is provided for the convenience of the reader to provide a basic understanding of such embodiments and does not wholly define the breadth of the disclosure. This summary is not an extensive overview of all contemplated embodiments and is intended to neither identify key or critical elements of all embodiments nor to delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more embodiments in a simplified form as a prelude to the more detailed description that is presented later. For convenience, the terms “some embodiments” or “certain embodiments” may be used herein to refer to a single embodiment or multiple embodiments of the disclosure.
Certain embodiments disclosed herein include a method for [PURPOSE]. The method comprises [STEPS]
Certain embodiments disclosed herein also include a non-transitory computer readable medium having stored thereon instructions for causing a processing circuitry to execute a process for [PURPOSE], the process comprising [STEPS].
In addition, certain embodiments disclosed herein include a system for [PURPOSE]. The system comprises: a processing circuitry; and a memory, the memory containing instructions that, when executed by the processing circuitry, configure the system to: [STEPS].
It is important to note that the embodiments disclosed herein are only examples of the many advantageous uses of the innovative teachings herein. In general, statements made in the specification of the present application do not necessarily limit any of the various claimed embodiments. Moreover, some statements may apply to some inventive features but not to others. In general, unless otherwise indicated, singular elements may be in plural and vice versa with no loss of generality. In the drawings, like numerals refer to like parts through several views.
The various disclosed embodiments include techniques for providing cyber security protection for distributed and disaggregated networks. Specifically, the disclosed embodiments include a decentralized security system based on multiple security functional components (hereinafter security functions) deployed at different points in the network. Insights generated by such security functions can be combined to provide overall protection for the network. A security function can be implemented as a virtual entity including a microservice, a software container, any other type of virtual entity, and the like. In an embodiment, the security functions are configured to detect and mitigate cyber-attacks, such DoS/DDoS attacks, various type malware attack, and the like. The processing latency of the security function is minimal, allowing inspection of traffic at wire-speed.
The volume and rate of traffic in networks, such as 5G, are expected to grow exponentially. Implementing the distributed and disaggregated cyber-security model on such traffic volumes and rates, using existing solutions, may require extensive computing resources to inspect and analyze traffic at the higher layers (e.g., layers 3-4 to layer 7 of the OSI model). According to the disclosed embodiments, a novel method for allowing on-demand inspection of traffic is provided.
An edge network 220 may be a datacenter, an enterprise network, a private cloud, a public cloud, and the like. Each edge network 220 allows access to a plurality of computing resources, such as IoT devices, end-user devices (e.g., smartphones, wearable devices, tablet computers, etc.), servers (virtual or physical), edge computing nodes, and virtual entities (e.g., virtual machines, software containers, micro services, etc.) configured to execute applications, services, or both.
Any computing resource (not shown) connect to an edge network 220 can, potentially, communicate with other computing resources connected to the same or different edge networks 200. An example for such a compute resource may be, but is not limited to, a server, a computer, an IoT device, and storage device, or any device with a network connectivity. In most cases, traffic flows to and from such computing resources are not secured. As such, new cyber threats can be utilized to attack the infrastructure of the network 210 and the edge networks 220 as attacks are executed against computing resources connected to the network.
To defend the distributed and disaggregated network 200, detectors 230 (hereinafter detectors) are deployed in nodes 240-1 through 240-M (where M is an integer having a value of 1 or greater) on the edges of the backbone network 210, i.e., between each edge network 220 and the network 210. Although not specifically shown in
Each detector 230 is configured to inspect telemetries at essentially wire-speed, and, thus does not introduce additional latency to the network. The functions of each detector 230 implement a distributed and disaggregated security model discussed in more detail below with respect to
In an embodiment, each detector 230 is realized as a lightweight detector executed over a hardware layer of a node 240 including at least a memory and a processor (not shown in
In an embodiment, the detectors 230 and their security functions are executed independently. For example, one detector 230 can execute a function for anomalies detection, while another detector 230 may execute a separate function for characterizing the generated the attack signatures. In an embodiment, a detector 230 may be configured to implement mechanisms that enable enforcement of mitigation of attacks directly on the underlying network without the need for redirection of traffic.
In an embodiment, a controller 250 is configured to orchestrate the operation of the detectors 230. The controller 250 is configured to provision each of the detectors 230, receive statuses about the state of attack (detected, on-going, ended) as detected by each detector 230, and provide a status of an attack or attacks across all edge networks 220. In an embodiment, the controller 230 is configured to instruct each detector to execute a mitigation action (e.g., block malicious traffic, redirect malicious traffic, etc.). It should be noted that the controller 250 does not make attack detection decisions for the detectors 230.
In an embodiment provisioning a detector by the controller 250 includes instantiating a detector 230 on a network node, maintaining a state of each detector 230, setting various parameters of each detector 230, and so on. The parameters may include various thresholds for starting and stopping the operation of a detector, IP address to monitor, and the like.
The controller 250 is configured to receive alerts on detected attacks in real time and to report those alerts to a user (not shown). The received alerts may be saved in a database or other storage (not shown). In an embodiment, the controller 250 is configured to run a forensic process on the alerts saved in the database. The forensic process can determine the type of the attack, the impacted entities, and so on. The controller 250 may be realized as a virtual machine, a physical machine, or a combination thereof.
To implement this model, the detector 230 is configured to execute multiple instances of the same security function. A security function may include, but is not limited to, a baseline computation 310, an anomaly detection 320, and an attack characterization 330. Each such security function operates on a set of telemetries derived from the traffic, but a security function does not process the actual traffic. In an embodiment, the telemetries relate to layers 3-4 (TCP/IP) traffic attributes, and may include packets per second (from a specific IP address), flows per second, bytes per second, and the like. The telemetries are provided by the network node.
In an embodiment, multiple instances of each security function are executed, each of which processes a subset of the received metrics. Each instance of the security function may include a respective instance of the baseline computation 310, of the anomaly detection 320, and of the attack characterization 330. As shown in
In an embodiment, an overall baseline of the entire set (not just a subset of the metrics) is determined using a MapReduce technique. One of ordinary skill in the art would appreciate that a MapReduce is a programming model for processing and generating large data sets with a parallel, distributed algorithm on a cluster. A MapReduce program is composed of a map procedure that filters and sorts data, and a reduce method which performs a summary operation. As a non-limiting example, the filtration and sorting of data may include sorting students by first name into queues, with one queue for each name. The reduce method would include counting the number of students in each queue, thereby yielding name frequencies.
To this end, in order to determine the overall baseline, the baseline computation function 310 also includes an aggregator instance 312 that aggregates the baselines computed by the instances 311.
In an embodiment, each instance 321 of the anomaly detection function 320 is configured to detect anomalies based on the subset of the received metrics fed into the respective instance 321 and the computed baseline. In an embodiment, each instance 312 may implement fuzzy logic to detect an anomaly. In another embodiment, anomalies can be detected using IIR or a machine learning technique. The aggregator instance 322 is configured to aggregate any anomalies determined by the respective instances 312 in order to determine if a cross-instance anomaly is detected. The aggregator instance 322 also implements a MapReduce method.
Each instance 331 of the attack characterization 330 is configured to generate an attack signature based on the set subset of the received metrics fed into the respective instance 331 and the determined cross-instance anomaly. The aggregator instance 332 is configured to aggregate any generated signatures into a single aggregated signature. The aggregator 332 is further configured to generate rules that would be utilized to mitigate the attack.
In an embodiment, the generated security rules are enforced on the programmable data plane 350. The aggregator instance 332 also implements a MapReduce method. The generated security rules may be part of a mitigation policy. In a further embodiment, the detected anomalies 322 and the generated mitigation policy can be reported to a global controller (e.g., the controller 250,
As noted above, a detector 230 is a virtual entity executed in a network node (e.g., a switch). Thus, the detector 230 can sample or tap incoming traffic at essentially wire-speed. As illustrated in
The telemetries 411 is analyzed by security functions implemented by the detector 230. Specifically, a first security function F1 (detection) 421 is an anomaly detection configured to detect anomalies in the traffic. In an embodiment, the analyzed traffic is layer-1 traffic. When an anomaly is detected, a second security function F2 (characterization) 422 is activated to characterize a detected attacked. The second security function F2 422 is configured to generate attack signatures, to identify the attacker (e.g., its Internet Protocol address), or both.
A third security function F3 (mitigation) 423 is then activated to generate a policy including a set of mitigation rules based on the attack characterization. An example for a mitigation rule may be clock traffic including an identified attack signature. The generated policy or policies are used to configure the network node, so that such policy can be enforced directly by its underlying hardware. In an embodiment, the generated policies are reported to the controller 250 (discussed in
It should be noted that multiple instances of the same security function (421, 422, or 423) can be instantiated and activated on the same detector 230. The security functions can be instantiated and activated on-demand (e.g., under control of the controller) or when the detector 230 is required to process high volume of traffic.
The logical components of the detector 230 include a feeder 510, an analyzer 520, a signer, 530, and a local controller 540, all connected to a message bus 550.
The feeder 510 is configured to receive raw telemetries 501 from the data stream passing through a network node 240. In the embodiment shown in
In addition, the analyzer 520 may be configured to receive normalized data 502 from the message bus 550. In an alternative embodiment, the analyzer 520 may be configured to receive normalized data 502 directly from the feeder 510. The analyzer 520 is configured to process and analyze the normalized data 502 to determine whether any anomalies exist in the received normalized data 502. Anomalies are detected by comparing metrics of incoming traffic to one or more computed baselines. To this end, the analyzer 520 may implement techniques for anomaly detection, such as IIR, fuzzy logic, machine learning, and the like. In an embodiment, the analyzer 520 is configured to inspect and analyze telemetries at layers 3-4 of the OSI mode. The telemetries may include packets per second (from a specific IP address), flows per second, bytes per second, TCP flags, and the like. The telemetries are provided by the network node 240. The analyzer 520 can detect anomalies indicating on attack types including, but not limited to, flood, stress, HTTPS, OOS, DNS, and the like.
The analyzer 520 may then pass the list of detected anomalies to the message bus 550. In an alternate embodiment, the analyzer 520 may pass the list of detected anomalies directly to the signer 530.
The signer 530 is configured to receive a list of detected anomalies and to output a list of attack signatures 503. In the embodiment shown in
The local controller 540 is configured to receive a list of attack signatures 503 and to output one or more policies 504. Each such policy 504 includes a list of mitigation rules generated based on the attack signatures 503. In the embodiment shown in
The local controller 540 can configure the network node 240 with the policies 504. Thus, the mitigation rules may be applied at the network node 240 to inspect the traffic passing through the network node 240 and to, possibly, trigger a mitigation action including, but not limited to, blocking flagged traffic, quarantining flagged traffic, redirecting flagged traffic to a scrubbing center, other like operations, and any combination thereof. In an embodiment, the local controller 540 is configured to provide the generated polices 504 to the global controller (e.g., the controller 250,
In an embodiment, the detector 230 is configured to alert the global controller (e.g., controller 250,
In the embodiment shown in
Each native detector 610 is configured to monitor Layer-1 (physical layer) traffic. The physical layer is responsible for the ultimate transmission of digital data bits from the physical layer of the sending (source) device, over network communications media, to the physical layer of the receiving (destination) device. At the physical layer, data is transmitted using the type of signaling supported by the physical medium such as, but not limited to, electric voltages, radio frequencies, or pulses of infrared or ordinary light.
In an embodiment, each native detector 610 is configured to count the bits per second sent or received through the respective port 620. When the counted rate (e.g., bits per second) diverts from a baseline, a Layer-1 (physical layer) anomaly is detected. The baseline considered by a native detector 610 is a layer-1 baseline (e.g., bits per second) which may be learned by the detector 610 or predetermined (e.g., preconfigured by a user).
In an embodiment, each native detector 610 can be implemented using a set of counters or registers and requires minimal computing resources (e.g., CPU time and memory) from the network node 240.
In an embodiment, when a Layer-1 anomaly is detected, the respective detector 610 triggers an anomaly alert to the detector 230. As noted above, the detector 230 is configured to receive real-time samples of the telemetry at layers 3-4 (TCP/IP) or layer 7 (application layer), and to process the sampled traffic using the security functions according to the distributed and disaggregated cyber-security model discussed above. The security functions include detection function “F1”, characterization function “F2”, and mitigation function “F3”. As depicted in
It should be noted that anomaly alerts can be generated by multiple native detectors 610 simultaneously. The detector 230 may threat such alerts separately or in combination. It should be further noted that in the embodiment shown in
The processing circuitry 710 may be realized as one or more hardware logic components and circuits. For example, and without limitation, illustrative types of hardware logic components that can be used include field programmable gate arrays (FPGAs), application-specific integrated circuits (ASICs), Application-specific standard products (ASSPs), system-on-a-chip systems (SOCs), graphics processing units (GPUs), tensor processing units (TPUs), general-purpose microprocessors, microcontrollers, digital signal processors (DSPs), and the like, or any other hardware logic components that can perform calculations or other manipulations of information.
The memory 720 may be volatile (e.g., random access memory, etc.), non-volatile (e.g., read only memory, flash memory, etc.), or a combination thereof.
In one configuration, software for implementing one or more embodiments disclosed herein may be stored in the storage 730. In another configuration, the memory 520 is configured to store such software. Software shall be construed broadly to mean any type of instructions, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise. Instructions may include code (e.g., in source code format, binary code format, executable code format, or any other suitable format of code). The instructions, when executed by the processing circuitry 710, cause the processing circuitry 710 to perform the various processes described herein.
The storage 730 may be magnetic storage, optical storage, and the like, and may be realized, for example, as flash memory or another memory technology, compact disk-read only memory (CD-ROM), Digital Versatile Disks (DVDs), or any other medium which can be used to store the desired information.
The network interface 740 allows the node 420 to communicate with the various components, devices, and systems described herein for production code static analysis, as well as other, like, purposes. The network interface 740 can be a port of the network node.
It should be understood that the embodiments described herein are not limited to the specific architecture illustrated in
At S830, a first security function for detecting anomalies in the telemetries received by the respective network node is activated. The telemetries are static on layers 3-4 traffic attributes. The detected anomalies are indicative of a potential DDoS attack.
At S840, a second security function for generating attack signatures based on the detected anomalies is activated. The second security function may be activated only upon anomaly detection.
At S850, a third security function is activated to generate at least one mitigation policy based on the generated attack signatures. The third security function may be activated only upon generation of attack signatures.
At S860, the respective network node is configured to enforce the at least one generated mitigation policy. The configured network node is the network node executing a detector that alerts on a potential DDoS attack.
At S870, any detected attack and mitigation polices are reported in a real-time to a controller (e.g., controller 250).
The various embodiments disclosed herein can be implemented as hardware, firmware, software, or any combination thereof. Moreover, the software is preferably implemented as an application program tangibly embodied on a program storage unit or computer readable medium consisting of parts, or of certain devices and/or a combination of devices. The application program may be uploaded to, and executed by, a machine comprising any suitable architecture. Preferably, the machine is implemented on a computer platform having hardware such as one or more central processing units (“CPUs”), a memory, and input/output interfaces. The computer platform may also include an operating system and microinstruction code. The various processes and functions described herein may be either part of the microinstruction code or part of the application program, or any combination thereof, which may be executed by a CPU, whether or not such a computer or processor is explicitly shown. In addition, various other peripheral units may be connected to the computer platform, such as an additional data storage unit and a printing unit. Furthermore, a non-transitory computer readable medium is any computer readable medium except for a transitory propagating signal.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the principles of the disclosed embodiment and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the disclosed embodiments, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future, i.e., any elements developed that perform the same function, regardless of structure.
It should be understood that any reference to an element herein using a designation such as “first,” “second,” and so forth does not generally limit the quantity or order of those elements. Rather, these designations are generally used herein as a convenient method of distinguishing between two or more elements or instances of an element. Thus, a reference to first and second elements does not mean that only two elements may be employed there or that the first element must precede the second element in some manner. Also, unless stated otherwise, a set of elements comprises one or more elements.
As used herein, the phrase “at least one of” followed by a listing of items means that any of the listed items can be utilized individually, or any combination of two or more of the listed items can be utilized. For example, if a system is described as including “at least one of A, B, and C,” the system can include A alone; B alone; C alone; 2A; 2B; 2C; 3A; A and B in combination; B and C in combination; A and C in combination; A, B, and C in combination; 2A and C in combination; A, 3B, and 2C in combination; and the like.
This application claims the benefit of U.S. Provisional Application No. 62/955,615 filed on Dec. 31, 2019 the contents of which are hereby incorporated by reference.
Number | Date | Country | |
---|---|---|---|
62955615 | Dec 2019 | US |