Inferring Internet Denial-of



Similar documents
Inferring Internet Denial-of-Service Activity

Quantitative Network Security Analysis

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Denial of Service Attacks

Distributed Denial of Service (DDoS)

Firewall Firewall August, 2003

Yahoo Attack. Is DDoS a Real Problem?

Attack and Defense Techniques

Analyzing Large DDoS Attacks Using Multiple Data Sources

Announcements. No question session this week

Analyzing Large DDoS Attacks Using Multiple Data Sources

CS 356 Lecture 16 Denial of Service. Spring 2013

SECURING APACHE : DOS & DDOS ATTACKS - I

co Characterizing and Tracing Packet Floods Using Cisco R

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Denial of Service and Anomaly Detection

How To Understand A Network Attack

Denial of Service. Tom Chen SMU

Analysis of a DDoS Attack

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Strategies to Protect Against Distributed Denial of Service (DD

2010 Carnegie Mellon University. Malware and Malicious Traffic

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Denial of Service (DoS)

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

A S B

Lecture 13 - Network Security

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

A Flow-based Method for Abnormal Network Traffic Detection

Seminar Computer Security

How To Protect A Dns Authority Server From A Flood Attack

Security Toolsets for ISP Defense

Analysis of Automated Model against DDoS Attacks

Chapter 8 Network Security

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Abstract. Introduction. Section I. What is Denial of Service Attack?

Flow Analysis Versus Packet Analysis. What Should You Choose?

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Denial of Service Attacks, What They are and How to Combat Them

Denial of Service Attacks

Denial Of Service. Types of attacks

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

History. Attacks on Availability (1) Attacks on Availability (2) Securing Availability

Firewalls and Intrusion Detection

DDoS Vulnerability Analysis of Bittorrent Protocol

Content Distribution Networks (CDN)

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Lecture 5: Network Attacks I. Course Admin

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Analysis and Detection of DDoS Attacks in the Internet Backbone using Netflow Logs

A Critical Investigation of Botnet

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

How To Prevent DoS and DDoS Attacks using Cyberoam

CloudFlare advanced DDoS protection

A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks

DDoS Protection Technology White Paper

Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Gaurav Gupta CMSC 681

Chapter 8 Security Pt 2

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Characteristics of Network Traffic Flow Anomalies

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

A Defense Framework for Flooding-based DDoS Attacks

NSC E

Multi-layer switch hardware commutation across various layers. Mario Baldi. Politecnico di Torino.

CS5008: Internet Computing

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

Acquia Cloud Edge Protect Powered by CloudFlare

EECS 489 Winter 2010 Midterm Exam

Distributed Denial of Service

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

Network attack and defense

Detecting Botnets with NetFlow

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Flashback: Internet design goals. Security Part Two: Attacks and Countermeasures. Security Vulnerabilities. Why did they leave it out?

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Literature Review: Network Telescope Dashboard and Telescope Data Aggregation

The Spread of the Sapphire/Slammer Worm

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

How Cisco IT Protects Against Distributed Denial of Service Attacks

A Practical Method to Counteract Denial of Service Attacks

Exercise 7 Network Forensics

ZMap. Fast Internet-Wide Scanning and its Security Applications. Zakir Durumeric Eric Wustrow J. Alex Halderman. University of Michigan

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks

Transcription:

Inferring Internet Denial-of of-service Activity Geoffrey M. Voelker University of California, San Diego Joint work with David Moore (CAIDA/UCSD) and Stefan Savage (UCSD)

Simple Question We were interested in answering a simple question: How prevalent are denial-of-service attacks in the Internet? October 17, 2001 University of Virginia 2

Anecdotal Data Press reports: Analysts: Surveys: Losses could total more than $1.2 billion - Yankee Group report 38% of security professionals surveyed reported denial of service activity in 2000 - CSI/FBI survey October 17, 2001 University of Virginia 3

Quantitative Data? Is not available (i.e., no one knows) Inherently hard to acquire Few content or service providers collect such data If they do, its usually considered sensitive Infeasible to collect at Internet scale How can you monitor enough of the Internet to obtain a representative sample? October 17, 2001 University of Virginia 4

Our Contributions Backscatter analysis New technique for estimating global denial-of-service activity First data describing Internet-wide DoS activity ~4,000 attacks per week (> 12,000 over 3 weeks) Instantaneous loads above 600k pps Characterization of attacks and victims Paper appeared this August: Moore, Voelker and Savage, Inferring Internet Denial-of- Service Activity, 2001 USENIX Security October 17, 2001 University of Virginia 5

Overview Describe backscatter analysis Experimental setup Series of analyses and attack characterizations Tracking the Code Red Worm October 17, 2001 University of Virginia 6

Key Idea Flooding-style DoS attacks e.g. SYN flood, ICMP flood Attackers spoof source address randomly True of all major attack tools Victims, in turn, respond to attack packets Unsolicited responses (backscatter) equally distributed across IP space Received backscatter is evidence of an attacker elsewhere October 17, 2001 University of Virginia 7

Backscatter Example SYN packets D V B V C V B SYN+ACK backscatter B V V Victim C D Attack Backscatter October 17, 2001 University of Virginia 8

Backscatter Analysis Monitor block of n IP addresses Expected # of backscatter packets given an attack of m packets: E(X) = Extrapolated attack rate R is a function of measured backscatter rate R : R R ' nm 32 2 2 n 32 October 17, 2001 University of Virginia 9

Assumptions and Biases Address uniformity Ingress filtering, reflectors, etc. cause us to underestimate # of attacks Can bias rate estimation (can we test uniformity?) Reliable delivery Packet losses, server overload & rate limiting cause us to underestimate attack rates/durations Backscatter hypothesis Can be biased by purposeful unsolicited packets» Port scanning (minor factor at worst in practice) Do we detect backscatter at multiple sites? October 17, 2001 University of Virginia 10

Experimental Setup Internet Monitor (w/big disk) Quiescent /8 Network (2 24 addresses) October 17, 2001 University of Virginia 11

Methodology Collected three weeks of traces (February 2001) Analyzed trace data from two perspectives Flow-based analysis (categorical) Number, duration, kinds of attacks Keyed on victim IP address and protocol Flow duration defined by explicit parameters (min threshold, timeout) Event-based analysis (intensity) Rate, intensity over time Attack event: backscatter packets from IP address in 1 minute window October 17, 2001 University of Virginia 12

Analysis Summary statistics Time behavior Protocol Duration Rate Victim categorization DNS, top-level domain (TLD), AS Popularity October 17, 2001 University of Virginia 13

Attack Breakdown Week1 Week2 Week3 Attacks 4173 3878 4754 Victim IP s 1942 1821 2385 Victim prefixes 1132 1085 1281 Victim AS s 585 575 677 Victim DNS domains 750 693 876 Victim DNS TLDs 60 62 71 October 17, 2001 University of Virginia 14

Attacks Over Time (Surprisingly uniform, no diurnal effects) October 17, 2001 University of Virginia 15

Periodic Attack (Daily) (Every day like clockwork) October 17, 2001 University of Virginia 16

Punctuated Attack (1 min) (Fine-grained behavior as well) October 17, 2001 University of Virginia 17

Attack Protocol/Services Protocols Mostly TCP (90-94% attacks) A few large ICMP floods (up to 43% of packets) Services Most attacks on multiple ports (~80%) A few services (HTTP, IRC) singled out October 17, 2001 University of Virginia 18

Attack Duration (50% > 10 mins) (Most between 3-30 mins) October 17, 2001 University of Virginia 19

Attack Rate (50% > 350 pps/sec, most intense is 679,000 pps) October 17, 2001 University of Virginia 20

Victim Characterization (DNS) Entire spectrum of commercial businesses Yahoo, CNN, Amazon, etc. and many smaller biz Evidence that minor DoS attacks used for personal vendettas 10-20% of attacks to home machines A few very large attacks against broadband Many reverse mappings clearly compromised (e.g. is.on.the.net.illegal.ly and the.feds.cant.secure.their.shellz.ca) 5% of attack target infrastructure Routers (e.g. core2-core1-oc48.paol.above.net) Name servers (e.g. ns4.reliablehosting.com) October 17, 2001 University of Virginia 21

Victim Top-Level Domains 35 30 Percent of Attacks 25 20 15 10 Week 1 Week 2 Week 3 5 0 unknown net com ro br org edu ca de uk Top-Level Domain (net == com, edu small, ro and br unusual) October 17, 2001 University of Virginia 22

Victim Autonomous Systems 6 5 4 3 2 Week 1 Week 2 Week 3 Percent of Attacks 1 STARNETS (6663) NOROUTE (*) ALTERNET-AS (701) HOME-NET-1 (6172) EMBRATEL-BR (4230) RDSNET (8708) NETSAT-AS (11127) AS12302 (12302) TELEBAHIA (7738) 0 SPRINTLINK (1239) ASN-QWEST (209) TELIANET-SE (3301) TOPEDGE (9176) BHNET (11706) AS8338 (8338) ECOSOFT (15971) AS15662 (15662) Autonomous System (No single AS/set of AS s are targeted (long tail, too)) October 17, 2001 University of Virginia 23

Victim Popularity 100 10 1 % Victims 0.1 0.01 1 2 3 4 5 6 7 8 9 10 1112 13 1415 16 1718 19 2021 23 2425 26 2728 30 3132 34 35 37 3839 40 4142 44 4546 48 # Attacks (Most victims attacked once, but a few are unfortunate favorites) October 17, 2001 University of Virginia 24

Validation How do we know we are seeing backscatter from attacks, and not just funky traffic to our network? Backscatter not explained by port scanning 98% of backscatter packets do not cause response Repeated experiment with independent monitor (3 /16 s from Vern Paxson) Only captured TCP SYN/ACK backscatter 98% inclusion into larger dataset Matched to actual attacks detected by Asta Networks on large backbone network October 17, 2001 University of Virginia 25

Summary Lots of attacks some very large >12,000 attacks against >5,000 targets in a week Most < 1,000 pps, but some over 600,000 pps Everyone is a potential target Targets not dominated by any TLD, 2LD or AS» Targets include large e-commerce sites, mid-sized business, ISPs, government, universities and end-users Something weird is happening in Romania New attack styles Punctuated/periodic attacks Attacks against infrastructure targets & broadband October 17, 2001 University of Virginia 26

Code Red Worm In July, David Moore used the same technique to track the Code Red Worm While collecting backscatter data (no way to predict) Code Red Impact Infects MS IIS Web servers via security hole Once infected, victim tries to infect other hosts Culminates in a coordinated attack against whitehouse.gov Tremendous amount of popular press» FBI warning on second round of Code Red Worm October 17, 2001 University of Virginia 27

Monitoring Code Red Victims randomly choose an IP address to infect Try to establish a HTTP connection to that address 1/256 th of connection requests in our /8 (our looking glass) Easy to distinguish from backscatter As with backscatter, can determine Who: Set of IP addresses of victims infected» Breakdown by DNS, TLD, AS, etc. Infection rate: Real-time spread of worm across Internet Patch rate: Real-time patching, shutdown of infected hosts October 17, 2001 University of Virginia 28

Rate of Infection 359,104 hosts were compromised in approximately 13 hrs. October 17, 2001 University of Virginia 29

More Info Backscatter http://www.caida.org/outreach/papers/backscatter/ Code Red http://www.caida.org/analysis/security/code-red/ October 17, 2001 University of Virginia 30

Protocol Breakdown (1 week) Backscatter protocol Attacks BS Packets (x1000) TCP (RST ACK) ICMP (Host Unreachable) ICMP (TTL Exceeded) ICMP (Other) TCP (SYN ACK) TCP (RST) TCP (Other) 2027 (49) 699 (17) 453 (11) 486 (12) 378 (9.1) 128 (3.1) 2 (0.05) 12,656 (25) 2892 (5.7) 31468 (62) 580 (1.1) 919 (1.8) 2,309 (4.5) 3 (0.01) October 17, 2001 University of Virginia 31

Attack Protocol Breakdown Attack Protocol Attacks BS Packets (x1000) TCP UDP ICMP Proto 0 Other 3902 (94) 99 (2.4) 88 (2.1) 65 (1.6) 19 (0.46) 28705 (56) 66 (0.13) 22,020 (43) 25 (0.05) 12 (0.02) October 17, 2001 University of Virginia 32