DDoS Yesterday, Today and tomorrow. Frank Tse, William Guo Nexusguard

Similar documents
CS5008: Internet Computing

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Chapter 8 Security Pt 2

Network Threats and Vulnerabilities. Ed Crowley

Attack and Defense Techniques

Malicious Network Traffic Analysis

How To Understand A Network Attack

Acquia Cloud Edge Protect Powered by CloudFlare

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Universal DDoS Mitigation Bypass. DDoS Mitigation Lab

CloudFlare advanced DDoS protection

IxLoad-Attack: Network Security Testing

DDoS Protecion Total AnnihilationD. DDoS Mitigation Lab

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

CS 356 Lecture 16 Denial of Service. Spring 2013

Automated Mitigation of the Largest and Smartest DDoS Attacks

TDC s perspective on DDoS threats

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

FortiDDos Size isn t everything

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

A Very Incomplete Diagram of Network Attacks

CYBERTRON NETWORK SOLUTIONS

Brocade NetIron Denial of Service Prevention

Learn Ethical Hacking, Become a Pentester

DDoS Attacks & Mitigation

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Chapter 8 Network Security

SECURING APACHE : DOS & DDOS ATTACKS - II

General Network Security

Application DDoS Mitigation

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Denial Of Service. Types of attacks

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

DDoS Protection on the Security Gateway

Description: Objective: Attending students will learn:

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Automated Mitigation of the Largest and Smartest DDoS Attacks


Firewalls and Intrusion Detection

DDoS Overview and Incident Response Guide. July 2014

Huawei Traffic Cleaning Solution

VALIDATING DDoS THREAT PROTECTION

Web Application Security

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

AntiDDoS1000 DDoS Protection Systems

Denial of Service Attacks

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Security Technology White Paper

A Layperson s Guide To DoS Attacks

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

1. Firewall Configuration

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Stop that Big Hack Attack Protecting Your Network from Hackers.

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Computer forensics

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Security Toolsets for ISP Defense

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Revealing Botnets Using Network Traffic Statistics

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

DDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée

Stateful Firewalls. Hank and Foo

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

CRYPTUS DIPLOMA IN IT SECURITY

SECURING APACHE : DOS & DDOS ATTACKS - I

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Cryptography and network security

Abstract. Introduction. Section I. What is Denial of Service Attack?

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Denial of Service. Tom Chen SMU

Web Application Level Approach against the HTTP Flood Attacks IOSEC HTTP Anti Flood/DoS Security Gateway Module

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Linux Network Security

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

How To Protect A Dns Authority Server From A Flood Attack

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

A Sampling of Internetwork Security Issues Involving IPv6

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Network Security Fundamentals

A S B

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Seminar Computer Security

Transcription:

DDoS Yesterday, Today and tomorrow Frank Tse, William Guo Nexusguard

Agenda 1 2 3 4 5 DDoS Introduction DDoS Attack Analysis DDoS Detection and Mitigation Fighting DDoS in Mobile Era FAQ Page 2

About us Nexusguard, incorporated in 2008, is a premium provider of end-to-end, in-the-cloud Internet Security Solutions. Nexusguard delivers solutions over the internet to ensure that our clients enjoy uninterrupted webservice delivery to their users, by protecting them against the everincreasing and evolving multitude of internet threats, particularly Denialof-Service (DDoS) attacks, and other attacks directed at web application software. Page 3

What is DDoS A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. Page 4

What is DDoS Zombies on innocent computers Infrastructure-level DDoS attacks Bandwidth-level DDoS attacks Server-level DDoS attacks (Protocol / Application) Page 5 5

What is DDoS Credit http://www.wired.com/politics/security/magazine/15-09/ff_estonia_bots Page 6

DDoS in the news Page 7

Motivation of Cyber Attack Page 8

DDoS vs. Hacking Hacking If (Availble){ try { SQLi, XSS, CSRF MITM, Brute Force, Reverse Engineering, Buffer Overflow, RFI, Session Hijacking, Information Leakage, Defacement, something cool } catch (data) finally { DDoS } while (Available){ try DDoS { DDoS()} finally { Give_up()} Page 9

Trend of DDoS attack 100+Gbps / 70Mpps POC Organized Collaborated Volume Focus 0-day focus 2008 2009 DJB33X Page 10

DDoS Attack Brief History Packet Generator Packet Crafter Creative Attacks Page 11

DDoS - Yesterday 2002 root DNS attack All thirteen (13) DNS root name servers were targeted simultaneously. Attack volume was approximately 50 to 100 Mbits/sec (100 to 200 Kpkts/ sec) per root name server, yielding a total attack volume was approximately 900 Mbits/sec (1.8 Mpkts/sec). Attack traffic contained ICMP, TCP SYN, fragmented TCP, and UDP. Some attack types you might heard of ICMP flood, Ping flood, UDP flood, IP Fragment, SYN flood, Teardrop, ACK flood, RST flood, Land attack, smurf attack, Ping to death, Nuke, ARP Poison, Reflex attack, TCP NULL, XMAS, Malformed TCP flags, PUSH ACK flood, DNS query flood, GET flood, POST flood, authentication flood, de-authentication flood, SIP flood Page 12

DDoS - Yesterday Tools (comes with your OS) Ping, telnet, wget Tools ( can easily get from internet) hping, scapy, curl, Library: Libpcap-dev, libthread, libnet-dev, netinet/*.h, string.h Simple GET flood in 1 line for ((i=0;i<100;i++)) do `wget target.com &`; done Page 13

DDoS - Today Open source, Cross platform, More in flow control, More in application layer Tools ( can be easily get from internet) apache-killer.pl, slowloris.pl, slowhttptest, LOIC, HOIC, via IRC channel Library: Libpcap-dev, libthread, libnet-dev, urllib, libpcap-dev, libdnet-dev, socket Page 14

DDoS - Today apache-killer.pl $p = ""; for ($k=0;$k<1300;$k++) { $p.= ",5-$k"; } $p = "HEAD / HTTP/1.1\r\nHost: $ARGV[0]\r \nrange:bytes=0-$p\r\naccept-encoding: gzip\r\nconnection: close\r\n\r\n ; Page 15

DDoS - Today Slowhttp test -w bytes start of the range advertised window size would be picked from. Effective in slow read (-X) mode only, min: 1, default: 1 -y bytes, end of the range advertised window size would be picked from. Effective in slow read (-X) mode only, min: 1, default: 512 -x bytes, max length of each randomized name/value pair of follow up data per tick, e.g. -x 2 generates X-xx: xx for header or &xx=xx for body, where x is random character, default: 32 -z bytes bytes to slow read from receive buffer with single read() call. Effective in slow read (-X) mode only, default: 5 Page 16

DDoS Tomorrow 0-day focused Standardized part of worms and bots DDoS as a project, in a team Focus on target application Tools: HashDDoS DJB33X, protocol fuzzer, iframe bot, js bot, Unicornscan (2007), plug-in for worms, mobile bots DDoS as a Service: DDoS attack repository, open DDoS testing server, RFC for DDoS, Like this attack, DDoS app market, auto CAPTCHA breaking Page 17

DDoS Tomorrow Internet is designed for inter-connect, goodwill in self-discipline Internet is NOT designed for security. TCP is : designed for state-ful, connection-oriented connection, TCP is NOT: temper proof synchronized source authenticate sensitive to intercept (MITM) Page 18

DDoS Tomorrow Unicronscan (http://www.unicornscan.org/ ) Unicrons are fast! Asynchronous stateless TCP scanning with all variations of TCP Flags. Asynchronous stateless TCP banner grabbing Asynchronous protocol specific UDP Scanning Page 19

DDoS Tomorrow Web Shell Page 20 Credit http://ddos.arbornetworks.com/2012/02/ddos-tools/

DDoS Detection and mitigation Brief History Learn & Fight back Detect & Challenge Collect & Filter Page 21

DDoS Detection and mitigation Yesterday Blackhole Rate-limiting ACL iptables CoPP SYN-cookie IDS IPS Load balancing Port-security Detection: SNMP, netflow Page 22

DDoS Detection and mitigation Today DNS poisoning CDN WAF Hot-link protection CAPTCHA Source authentication Detection: SNMP, Netflow, PCAP Page 23

DDoS Detection and mitigation Tomorrow Browser authentication User behavior validation Application learning User-id correlation Differentiate mitigation Bot / tools identification (Friendly) Attack back "Apparently the war is over and you are ordered to cease firing; so, if you see any Jap planes in the air, you will just have to shoot them down in a friendly manner. - Admiral Halsey, 1945 Detection: SNMP, Netflow, PCAP, logs + big data Page 24

Next Generation Detection---Profiling and Data Mining Page 25

A HTTP Get Flood Attack Analysis Page 26

A HTTP Get Flood Attack Analysis Page 27

Next Generation Detection---With Google API? Page 28

Mobile Internet & Web API Page 29

API Request Load Make money 60% of all lis2ngs on ebay.com added via their APIs Save money SmugMug saves > $500K/year with Amazon S3 Storage Build brand Google Maps 300% growth vs 20% MapQuest Move to the cloud Over 50% of all transac2ons via their API, Force.com Go anywhere NeQlix now available on over 200 devices Credit : ProgrammableWeb 30

Flipboard / Instgram Down? Page 31

Know it before you hack it Page 32

API Abused DDoS API Security Threats - API Key spoofing - API Throttling bypass - Quota System bypass - API ACL (Private API accessed by Public) API Request DDoS - HTTP/HTTPS GET flood - HTTP/HTTPS POST flood - PUT/DELETE/HEAD? Page 33

What if it s not abuse? 100,000 Users Have Downloaded Malware From Google Play Page 34

Google/ Alternative Android Markets and the Audit Policy Page 35

Mobile Device Botnet---Existing Apps Android DDoS Tool Available in Google Play 1. Requires Internet access to send the http post data 2. Requires phone state to access the IMEI Pretty common requirement for Apps. Page 36

Mobile Device Botnet--- Free App Generator Page 37

Next Generation Detection---Profiling and Data Mining Traffic Baseline - HTTP Field Pattern - HTTP Traffic Volume - TCP Connections IP Ranking - Geo IP - 80 / 20 - Open API Data Comparison---e.g. Google Safe Browsing API - Seculert API(expensive!). Page 38

Do You Have Any Questions? Contact us at: research@nexusguard.com Page 39