Approaches for DDoS an ISP Perspective. barry@null0.net ognian.mitev@viawest.com



Similar documents
Hunting down a DDOS attack

Automated Mitigation of the Largest and Smartest DDoS Attacks

F5 Silverline DDoS Protection Onboarding: Technical Note

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

FortiDDos Size isn t everything

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Automated Mitigation of the Largest and Smartest DDoS Attacks

Security Toolsets for ISP Defense

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

DDoS Mitigation Techniques

Cisco Network Foundation Protection Overview

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Radware s Attack Mitigation Solution On-line Business Protection

Intelligent Routing Platform White Paper

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

Practical Advice for Small and Medium Environment DDoS Survival

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Introduction of Intrusion Detection Systems

IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections

Configuring Failover

TDC s perspective on DDoS threats

DDoS Overview and Incident Response Guide. July 2014

DDoS Mitigation via Regional Cleaning Centers

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

DDoS Mitigation Strategies

VXLAN: Scaling Data Center Capacity. White Paper

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

BGP DDoS Mitigation. Gunter Van de Velde. Sr Technical Leader NOSTG, Cisco Systems. May Cisco and/or its affiliates. All rights reserved.

IPv6 Fundamentals: A Straightforward Approach

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Technical Note. ForeScout CounterACT: Virtual Firewall

OpenFlow and Software Defined Networking presented by Greg Ferro. OpenFlow Functions and Flow Tables

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Barracuda Load Balancer Online Demo Guide

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming IP routing

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

How To Block A Ddos Attack On A Network With A Firewall

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

IOS NAT Load Balancing for Two ISP Connections

Architecture Overview

Strategies to Protect Against Distributed Denial of Service (DD

Introduction To Computer Networking

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

Unicast Reverse Path Forwarding

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

How Cisco IT Protects Against Distributed Denial of Service Attacks

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

HP Networking BGP and MPLS technology training

2. Are explicit proxy connections also affected by the ARM config?

IP Routing Features. Contents

IBM. Vulnerability scanning and best practices

Using IPM to Measure Network Performance

Reducing the impact of DoS attacks with MikroTik RouterOS

Security Technology White Paper

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Cisco Configuring Commonly Used IP ACLs

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

LAB THREE STATIC ROUTING

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

How To Build A Lightpath Network For Multiple Lightpath Projects

A Link Load Balancing Solution for Multi-Homed Networks

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

SERVICE LEVEL AGREEMENT

INTRODUCTION TO FIREWALL SECURITY

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

RARP: Reverse Address Resolution Protocol

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

Network Management and Monitoring Software

Network layer: Overview. Network layer functions IP Routing and forwarding

A Network Design Primer

Quantum Hyper- V plugin

Mitigating DDoS Attacks at Layer 7

Introduction to IP v6

Polycom. RealPresence Ready Firewall Traversal Tips

Internet Control Protocols Reading: Chapter 3

LAB II: Securing The Data Path and Routing Infrastructure

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

DDoS attacks in CESNET2

Demonstrating the high performance and feature richness of the compact MX Series

LUCOM GmbH * Ansbacher Str. 2a * Zirndorf * Tel / * Fax / *

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

Passenger Information Systems: What Transit Agencies Need to Know

Network Defense Tools

OpenDaylight Project Proposal Dynamic Flow Management

What communication protocols are used to discover Tesira servers on a network?

Networking and High Availability

Firewalls P+S Linux Router & Firewall 2013

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Transcription:

Approaches for DDoS an ISP Perspective barry@null0.net ognian.mitev@viawest.com

Home School How everyone starts It s all up to you It s inexpensive (compared to other forms of education) Quality may not be the highest attribute here

DDoS Mitigation (Phase IDPS) When things are small you can deploy an IDPS It is ideal for small attacks You can deploy it in-line or at a remote location for shared/occasional needs The IDPS box will Identify malicious activity Log information Attempt to block/stop Report

Our Happy Little School Single Room School Everyone travels far distances back and forth Everything is handled locally The neighborhood is responsible for curriculum selection (no outside integration) It s just large enough to do the job

Disruption of our Neighborhood Street Gangs Nobody is safe They are strain on local resources (systems are disrupted) They are organized Smaller neighborhoods often require outside help

Sinkhole Controller Approach (Phase 1) Sinkhole on Destination IP Deploy a sinkhole (trigger) server on your network Establish ibgpsessions with routers inside your network and ebgpsessions with routers outside your network Implement two ways of tagging routes: internal and external The internal tag sets an internal BGP community The external tag sets an external BGP community Add static routes for 192.0.2.1/32 to Null0 to your routers on your network Advertise routes with a next-hop of 192.0.2.1 which creates the mapping to Null0

Sinkhole Controller Approach (Phase 1) Sinkhole on Source IP Take advantage of Unicast Reverse Path Forwarding (urpf) available on certain network platforms Implement loose urpfand add a default route Routers on your network will verify the reachability of the source address of packets being forwarded Your sinkhole server will advertise routes with a next-hop of 192.0.2.1 192.0.2.1 is statically routed to Null0 All traffic passing through an interface with the source verification command will be dropped if it can t be forwarded back to the source The traffic from and to the IP address under attack will be dropped

Sinkhole Controller Approach (Phase 1) Re-route and capture an attack Announce the IP under attack from your sinkhole environment Review netflow/jflow information on your sinkhole server Look at the traffic with a basic interface ACL (icmp, udp, tcpand ip), just look at which line gets most matches You can use an IDS box to capture the attack traffic for additional analysis Create a management web interface to add routes Routes will be automatically removed after a certain period of time

Sinkhole Controller Approach (Phase 1) Pros Inexpensive solution to implement (you can start with a router that you are not using, it only takes few hours to configure) Works great for small attacks Cons You complete the attack, Slow process (you see a lot of traffic, you start looking at netflow/jflow, you manually add tagged routers on your sinkhole server) Not all peers/providers support blackholebgp communities Not easy to understand if the attack has stopped especially if you are using the external BGP communities Performance issues to the remote AS

Our Happy Little School Grows Single location School Everyone travels far distances back and forth It s now getting very expensive The transportation system must grow to compensate Roads (along with more complicated design, maintenance, resurfacing Some of the same properties that the original solution was designed to solve

DDoSMitigation Server Approach (Phase 2) Start with a single piece of scrubbing hardware that is just large enough to do the job -much like a single room schoolhouse Everything is pulled to the scrubber, improved, and returned to the proper destination This has a level of complication of moving traffic where it doesn t naturally want to go within the network The rest of the network and devices must scale with the solution

DDoSMitigation Server Approach (Phase 2) In-line mitigation for an environment running a low traffic application

DDoSMitigation Server Approach (Phase 2) Pros Tunable to requirements Many have lots of knobs to turn Local mitigation available No routing outside of network to make it happen Has self-identifying traffic monitoring Doesn t need direct access to routers and switches Can be integrated with local tools easier Monitoring for instance Participate in a global anti-threat monitoring environment

DDoSMitigation Server Approach (Phase 2) Cons Requires internal expertise Available 24/7 or on-call Burden of scale falls to Provider Many hardware solutions seemed PPS limited Answer is usually Just buy bigger Expensive CSO wants clear ROI Multiple locations can easily cost multiple millions of dollars Still increases OpEx Doesn t solve Transit capacity issues (you will pay for both good and bad traffic) Increase Transit capacity to absorb large attacks Requires additional license and support costs 15% -20%

Our Happy Little School (System) Grows Multiple location County School System Really a method for controlling transportation cost The transportation system doesn t grow to compensate It s now getting very expensive (for the school system directly) Cost is pushed to properties, building maintenance, and administrative staff Some of the same properties that the original solution was designed to solve

DDoSMitigation Server Approach (Phase 2a) Multiply the hardware to control the scaling network and equipment cost All of the issues of a single device, but multiplied More equipment means more personnel

Outsourcing our Education (College) Let someone else deal with the scale and growth of the problem Instead of single location issues: It s now getting very expensive The transportation system must grow to compensate Roads (along with more complicated design, maintenance, resurfacing We send our students off to remote colleges: Expense is no longer local but is higher than our original school house by a lot We are no longer able to reach our students when we desire There is travel cost involved to send students back and forth Living expenses are now added to the burden of education

DDoSCloud Mitigation Approach (Phase 3) Begin to utilize Cloud based services much like sending our students away Everything is pulled to the cloud, improved, and returned to the proper destination This is has a level of complication of moving traffic where it doesn t naturally want to go in the Internet

DDoSCloud Mitigation Approach (Phase 3) Deploy Cloud Termination Server on your network Build a GRE tunnel to your Cloud Mitigation provider Establish ebgpsession over the GRE tunnel Announce a dedicated IP prefix (minimum /24) part of an aggregate, only to the Cloud Mitigation provider (most specific routing) Lower the MTU on the tunnel interface Lower the maximum segment size (MSS) on your servers. This limits the maximum TCP datagram size which will fit inside the GRE tunnel without fragmentation. Clean traffic will be passed over the GRE tunnel 1 way latency will be added for incoming traffic, outbound traffic will go directly to the Internet

DDoSCloud Mitigation Approach (Phase 3) Pros Mitigation service carries burden of scale Mitigation service has 24/7 support for attack and portal to understand what is occurring Mitigation service must maintain expertise Mitigation service must maintain hardware and support Two Methods - Always on No routing updates involved during mitigation Tunneling issues immediately obvious Performed independently of local network They don t need router/snmp/flow access As Needed Controls transit and mitigation costs

DDoSCloud Mitigation Approach (Phase 3) Cons Increases latency Return traffic delivery concerns MTU and Path concerns GRE performance issues over the Internet No mitigation inside your network Two Methods - Always on Always feel Mitigation's issues (packed loss ) Difficult to scale (especially return path) Always paying for traffic (even though no attack) IP range complexity (customer renumbers into /24) As Needed Needs Attack Identification mechanism (many wanted router access and use Flow data)

Our Hybrid School System Partner with someone else to deal with the scale and growth of the problem Don t neglect the value of higher educational systems Use of remote video conferencing and networked computer systems Take advantage of local representation Smaller staff needs because of technology Use the best attributes of all current solutions We are able to reach our students when we desire There is no travel cost involved to send students back and forth Living expenses are now removed from the burden of education

A Hybrid Approach to DDoS Mitigation (Phase 4) Hardware Attributes to Obtain Local mitigation available No routing outside of network to make it happen Has self-identifying traffic monitoring Doesn t need direct access to routers and switches Can be integrated with local tools easier Monitoring for instance Cloud Attributes to Obtain Mitigation service carries burden of scale Mitigation service has 24/7 support for attacks And portal to understand what is occurring Mitigation service must maintain expertise Mitigation service must maintain hardware and support As Needed Controls transit and mitigation costs

A Hybrid Approach to DDoSMitigation(Phase 4) Neither of the usual methods were appealing But attributes of them were! Attributes to Avoid Large CapExcost A medium sized network could easily cost several millions! Adding large OpEx cost Adding headcount Adding transit capacity Carrying burden of scale

A Hybrid Approach to DDoS Mitigation (Phase 4) We wanted a hybrid of local and cloud! Something to handle the smaller issues locally Let the cloud handle the big things A Hybrid approach! A Cloud Mitigation Service satellite Some local capabilities Operated by Cloud Provider They have expertise Cloud Provider hardware Their support No large capital outlay Scaling is outsourced Independent monitoring Must aggregate the data before implementing mitigation (must have centralized DB to work properly) Automation is key

A Hybrid Approach to DDoS Mitigation(Phase 4) Integration of systems Deploy edge termination, monitoring and mitigation servers on your network Connect to the Cloud DDoSMitigation provider over a common ISP Establish ebgpsession over the dedicated connection Configure the ability to announce any IP prefix from your network

A Hybrid Approach to DDoS Mitigation(Phase 4) Utilize passive fiber-optic taps duplicating every packet to the monitoring server. The server provides continuous monitoring of traffic entering your network Enables automated Sinkhole capabilities with internal and external tagging Adds the automatic Swing to Cloud capability Controls failure domains Not in data path Allows multiple monitoring points per monitoring server

A Hybrid Approach to DDoS Mitigation(Phase 4) The mitigation server sits in front of a local environment in your network The mitigation server is an inline device that acts just like an IDPS system Dirty traffic enters one interface, attack traffic is dropped, and cleaned traffic leaves the other interface

A Hybrid Approach to DDoS Mitigation(Phase 4) When DDoSattack is too big perform the Swing to Cloud function The /24 subnet the targeted IP space resides in will be rerouted to the Cloud DDoS Mitigation Provider The individual host address(es) under attack will be mitigated The clean traffic including the traffic for the remaining addresses in the /24 subnet will be routed back to ISP1 with an increased latency Hosts on the entire /24 subnet will experience packet loss as the re-routing occurs between the Cloud DDoSMitigation Provider and the ISP1

A Hybrid Approach to DDoS Mitigation(Phase 4) Management and Alerting You can create profiles that are used to set thresholds for determining when an attack occurs Detects attacks based on a combination of packet analysis and throughput (bits per second or packets per second), but not deep packet inspection. Alerting with e-mail notifications, SNMP checks, and API calls

Schools Out (for now) Education is never really done and neither is DDoSmitigation technology

Approaches for DDoS an ISP Perspective barry@null0.net ognian.mitev@viawest.com