Hunting down a DDOS attack



Similar documents
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Approaches for DDoS an ISP Perspective.

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

DDoS attacks in CESNET2

Cisco Network Foundation Protection Overview

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER

BGP DDoS Mitigation. Gunter Van de Velde. Sr Technical Leader NOSTG, Cisco Systems. May Cisco and/or its affiliates. All rights reserved.

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

DDoS Mitigation via Regional Cleaning Centers

Service Description DDoS Mitigation Service

TDC s perspective on DDoS threats

A S B

Sink Holes. A Swiss Army Knife ISP Security Tool. Version 1.5. Barry Raveendran Greene -- bgreene@cisco.com Danny McPherson -- danny@arbor.

DDoS Mitigation Techniques

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Putting the Tools to Work DDOS Attack

Radware s Attack Mitigation Solution On-line Business Protection

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Campus LAN at NKN Member Institutions

How To Make A Network Secure

Security Toolsets for ISP Defense

Introducing Basic MPLS Concepts

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

DDoS Overview and Incident Response Guide. July 2014

Automated Mitigation of the Largest and Smartest DDoS Attacks

How Cisco IT Protects Against Distributed Denial of Service Attacks

Cisco IOS Flexible NetFlow Technology

MPLS over Various IP Tunnels. W. Mark Townsley

State of Texas. TEX-AN Next Generation. NNI Plan

DDoS Mitigation Strategies

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Acquia Cloud Edge Protect Powered by CloudFlare

A Network Design Primer

Arbor s Solution for ISP

CloudFlare advanced DDoS protection

CISCO DDOS PROTECTION SOLUTION DELIVERING CLEAN PIPES CAPABILITIES FOR SERVICE PROVIDERS AND THEIR CUSTOMERS

Mitigating DDoS Attacks at Layer 7

Load balancing and traffic control in BGP

Reducing the impact of DoS attacks with MikroTik RouterOS

Supporting Document PPP

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

ASA/PIX: Load balancing between two ISP - options

DDoS Mitigation Solutions

How To Protect A Dns Authority Server From A Flood Attack

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

CISCO IOS NETFLOW AND SECURITY

Understanding Route Redistribution & Filtering

APNIC elearning: BGP Basics. Contact: erou03_v1.0

Exterior Gateway Protocols (BGP)

Understanding Virtual Router and Virtual Systems

Load balancing and traffic control in BGP

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)

Bleeding Edge DDoS Mitigation Techniques for ISPs

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

DNS amplification attacks

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

FortiDDos Size isn t everything

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

Defending the Network: Mitigating Attacks

Network Virtualization Network Admission Control Deployment Guide

F root anycast: What, why and how. João Damas ISC

WHITEPAPER. Bringing MPLS to Data Center Fabrics with Labeled BGP

/ Staminus Communications

DDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée

Community tools to fight against DDoS

MPLS Implementation MPLS VPN

IP Routing Configuring Static Routes

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities

MPLS VPN Security BRKSEC-2145

Denial of Service Attacks

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

RFC 2547bis: BGP/MPLS VPN Fundamentals

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

SEC , Cisco Systems, Inc. All rights reserved.

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Network provider filter lab

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Why Is MPLS VPN Security Important?

Automated Mitigation of the Largest and Smartest DDoS Attacks

Transcription:

2006-10-23 1

Hunting down a DDOS attack By Lars Axeland +46 70 5291530 lars.axeland@teliasonera.com 2006-10-23

What we have seen so far What can an operator do to achieve core security What solution can an ISP provide as DDOS protection 2006-10-23

What we have seen so far So far we have seen a few massive DDOS-attacks in aggregated size of 5-7Gbps. There has been larger attacks out on the internet. In the same rate as bandwidth utilization increases for private customers the attackers supervising a large among of BOT clients become extremely powerful and can cause massive damage. Also small intelligent attacks can tear down business critical service (typical banking, betting, ). ISP s has reason to believe all kind of DDOS attacks can appear to its customers and their business critical services. Therefore your ISP has to provide these customer a fair solution of protection. 2006-10-23 4

Protection of ISP core network! 2006-10-23 5

Starting with the core: How does an ISP achieve core security? Using specific scooped address structure for core links and loopbacks. Global protection shields to protect core infrastructure (Infra ACL) Node local protection shields of core infrastructure (racl, Firewall, CoPP, DCoPP) BGP dampening, MD5 (bgp/igp), max-prefix, GTSM ( Generic TTL Security Mechanism), prefix-filtering Spoofing mechanisms and filters on all ingress edge (Strict/Loose mode). Several overlapping layers of protection 2006-10-23 6

Continue.. How does an ISP achieve core security? Be sure you know your HW/SW characteristics Replace old HW with new more to architecture security prepared Close communication with router vendors to secure SW It s important to have a strict test/validation process (HW, SW, features.) Protect our own critical services with a DDOS-protection mechanism (SIP-servers, DNS resolvers, Ext web, NOC.) Train your NOC crew how to react on DDOS alarm 2006-10-23 7

Tools/Techniques to use to prevent DDOS attacks Remotely Triggered Blackhole Routing Based on destination address Based on source address (in combination with urpf loose) Community based RTBH RTBH of own CIDR block and Martians RTBH in different AS 2006-10-23 8

Tools/Techniques to use to prevent DDOS attacks Sinkhole Routing Using Remote SPAN to analyze traffic on ingress ports/vlan in edge Efficient Traffic Monitor System to measure abnormalities Centralized IP traffic DDOS Protection Mechanism (Scrubbing machine) If necessary redirect private customers to a zone where they only can reach patches for detected infected clients 2006-10-23 9

Typical Spoofed DDOS attack Other ISPs Ingress Routers random sources random sources? Target Traffic against Core elements has to be limited and dropped in edge. 2006-10-23 10

Other ISPs Ingress Routers Answer go to random destinations due to spoofed source address random sources random sources Target Some will hit bogus address scope announced by the RTBH 2006-10-23 11

Use BGP to stop the attack in all edges: Other ISPs Ingress Routers ibgp updates: drop packets to target Change next-hop to Something than is routed to Null0 in all edges random sources random sources Target Blackhole Router 2006-10-23 12

Redirect traffic to Sinkhole Router: Other ISPs Ingress Routers ibgp updates: redirect traffic to SHR Target Sinkhole Router Analyser 2006-10-23 13

Drawback of using RTBH Using RTBH based on the destination address (the victims source address) will definitely be an effective DDOS attack. Using RTBH based on source-address is very manual and will effect the real owner of the spoofed source-addresses. Sophisticated attackers uses BOT s with if it s possible random spoofed source addresses. 2006-10-23 14

Measure your network! 2006-10-23 15

How to detect abnormal traffic Without a traffic measurement tool your blind It s important to monitor network activity in real-time You also need a plan how to react on misbehavior Learn what abnormal traffic looks like Learn what normal traffic looks like is easier Share and learn information with others (fingerprints) 2006-10-23 16

BGP SNMP NetFlow Traffic Monitoring Collectors Monitoring Portal Network Operating Center or/and Incident Respons Team Edge Router Edge Router Core Router Edge Router Internet Customer NetFlow Data: SourceIf SourceIPaddress DestinationIf DstIPaddress Protocol SrcPort DstPort Pkts 2006-10-23 17

Customer under a DDOS attack Collectors Monitoring Portal Edge Router Internet Legitimate users of Enterprise A Internet services DDOS Traffic Edge Router Zombies on innocent computers Generating DDOS traffic Edge Router Core Router Customer Bandwith DDOS Server DDOS 2006-10-23 18

Now what to do? We can stop the traffic by using destination based RTBH, but this shunts off the entire service for the customer, and that is an most effective DDOS attack. Cannot use source based RTBH if the DDOS attack is well distributed or/and from spoofed sources. Hmmmmm??? 2006-10-23 19

Drop illegal traffic and forward legitimate one! 2006-10-23 20

The solution! Use a centralized DDOS protection mechanism that can separate legitimate traffic from illegal traffic Drop the illegal traffic in bit bucket and forward the legitimate one 2006-10-23 21

TeliaSonera can offer a DDOS Protection service TeliaSonera can divert traffic to a centralized scrubber and throw away unwanted traffic that match a known pattern and pass traffic that match a certain pattern. The goal is to be able to set up a protection for an attacked customer on a 5 minute basis. To be able to scrub traffic in most efficient way the scrubber has to do at least 48 hours peace time learning. Advanced Spoofing mechanisms is in use. User defined policies and profiles per protocol and behavior White list and black list 2006-10-23 22

Traffic Diversion Hijacking part: To divert the traffic to a centralized scrubber you have to use a more specific match than existing route to destination. This can be done in many ways. For example by announcing a longer matching prefix or with a higher metric than original. For redundancy purposes you can use anycast addressing as nexthop. Injection Part: - Using BPR on interface were the scrubbed traffic arrives on and throw that traffic out on a GRE-tunnel to last hop router in origin path. - Using VRF instead of GRE tunnel. 2006-10-23

TeliaSonera Traffic Diversion Hijacking part: TeliaSonera are using Route Health Injection for redirect traffic toward the service nodes. The traffic for a specific destination will in all service edges be MPLS-label switched instead of IP switched. A static route (with a longer match than original, maybe a host-route /32) from the service node will use specific Loopback interface that is MPLS switched as next-hop address and in that way will pass all the core routers that doesn t have this entry in their RIB. This has been filtered out on all core routers. Injection Part: Using PBR of the entire VLAN there the scrubbed traffic returns, the service node forwards the traffic to the core-nodes that in their turn using native IP to the customer destination segment. In the last hop ibgp router we use a more specific static route to avoid a routing loop. 2006-10-23

Traffic Diversion Traffic enter our network! Peering node Scrubber Service Node Peering node PBR RouteReflector MPLS/IP DDOS Protection Equipment RouteReflector Core node Core node A more specific static Route is needed in last-hop PE to prevent a routing loop MPLS/IP PE CPE PE CPE 99.99.99.0/24 2006-10-23

TeliaSonera DDOS Protection The threat is to obvious. ISP s has to be able to offer these kind of services today. The customer can not do this for them selves. Has to be done as close to the source due to bandwidth demands. Can be combined with RTBH in TeliaSonera International core for international peers/traffic to limit the DDOS effect. If the Traffic Monitor System detects a DDOS towards a customer that has bought this DDOS Protection Service, it will send a trap to our NOC. They in their turn will in co-operation with the customer start divert the traffic and prevent this DDOS attack to reach its destination. Everything can be traced back through statistics and history will tells about what have happened and when. 2006-10-23 26

DDOS attack Collectors Monitoring Portal Edge Router Internet Legitimate users of Enterprise A Internet services DDOS Traffic Edge Router Zombies on innocent computers Generating DDOS traffic Edge Router Core Router Customer Bandwith DDOS Server DDOS 2006-10-23 27

THE COMPLETE PICTURE DDOS Protection using Cleaning and RTBH TeliaSonera VIP/NOC Black hole configuration Legitimate users of Enterprise A Internet services Core Router Scrubber Activation Core Router Core Router Zombies on innocent computers Generating DDOS traffic Core Router Internet Customer DDOS Protection Equipment 2006-10-23 28

The Nordic and Baltic telecommunications leader 2006-10-23 29