Attacks Against the Cloud: A Mitigation Strategy. Cloud Attack Mitigation & Firewall on Demand



Similar documents
Firewall on Demand Multidomain

Firewall-on-Demand. GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF. Leonidas Poulopoulos

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

DDoS Mitigation Techniques

FireCircle: GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF

Acquia Cloud Edge Protect Powered by CloudFlare

Scalable DDoS mitigation using BGP Flowspec

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

CloudFlare advanced DDoS protection

Firewall on Demand User Guide. February 2016

How To Protect Your Network From Attack From A Hacker On A University Server

DDoS Overview and Incident Response Guide. July 2014

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Firewalls and Intrusion Detection

Solution Brief. Combating Bots and Mitigating DDoS Attacks

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER

PART D NETWORK SERVICES

Cisco IOS Flexible NetFlow Technology

Arbor s Solution for ISP

TDC s perspective on DDoS threats

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Internet Protocol: IP packet headers. vendredi 18 octobre 13

DNS amplification attacks

Service Description DDoS Mitigation Service

Firewall Firewall August, 2003

DDoS attacks in CESNET2

Network Monitoring and Management NetFlow Overview

Strategies to Protect Against Distributed Denial of Service (DD

A Critical Investigation of Botnet

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Corero Network Security plc

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

How Cisco IT Protects Against Distributed Denial of Service Attacks

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Current counter-measures and responses by CERTs

Secure Cloud-Ready Data Centers Juniper Networks

Introduction to Netflow

Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities

Campus LAN at NKN Member Institutions

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

F5 Silverline DDoS Protection Onboarding: Technical Note

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

DDoS Mitigation Solutions

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

PROFESSIONAL SECURITY SYSTEMS

CISCO IOS NETWORK SECURITY (IINS)

Description: Objective: Attending students will learn:

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Information Security Threat Trends

Security Toolsets for ISP Defense

How To Protect A Dns Authority Server From A Flood Attack

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

First Line of Defense

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

1 Introduction. Agenda Item: Work Item:

Netflow Overview. PacNOG 6 Nadi, Fiji

Cheap and efficient anti-ddos solution

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Internet Security Firewalls

IPV6 FRAGMENTATION. The Case For Deprecation. Ron Bonica NANOG58

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

and 26th november 2016

Information Security. Training

How To Block A Ddos Attack On A Network With A Firewall

How to launch and defend against a DDoS

Detecting peer-to-peer botnets

First Line of Defense

A D M I N I S T R A T O R V 1. 0

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

2010 Carnegie Mellon University. Malware and Malicious Traffic

/ Staminus Communications

Phone Fax

AT&T Real-Time Network Security Overview

COSC 472 Network Security

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Putting the Tools to Work DDOS Attack

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

ACCEPTABLE USE AND TAKEDOWN POLICY

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

AASTMT Acceptable Use Policy

Vanguard Applications Ware IP and LAN Feature Protocols. Firewall

Firewalls. Chapter 3

Transcription:

Attacks Against the Cloud: A Mitigation Strategy C L O U D A T T A C K M I T I G A T I O N & F I R E W A L L O N D E M A N D A l e x Z a c h a r i s a z a h a r i s @ a d m i n. g r n e t. g r G R N E T C E R T ( @ g r n e t _ c e r t ) L e o n i d a s P o u l o p o u l o s l e o p o u l @ n o c. g r n e t. g r G R N E T N O C ( @ l e o p o u l )

Content Roles-Actors-Services Security Measures Incident Response Statistics Security Tools Firewall on Demand Live Demo

Security Officer GRNET CERT Dev. Team NOC Helpdesk Users Service: ~okeanos IaaS Service Create VMs Store Files Create Virtual Networks https://okeanos.grnet.gr Roles-Actors-Services

Secure Architecture

Security Meassures Admin/Dev Side Password Policy Log Monitoring Update/Patching Policy Firewalling FOD Audits (Pen Tests, Code Audits) Client Side SSL(2048 bits) Shibboleth Password Policy Enforcing Terms of Use

Incident Response Attacks launched on others from within Okeanos infrastructure. Compromise of individual user accounts or VMs Scans of University or other Computer Security Systems. Spam and mail forgery that originates from, or is relayed through Okeanos. Viruses, Worms and Trojan Horses Threats to individuals (only in conjunction with law enforcement) Involvement in Criminal Activity (only in conjunction with law enforcement) DOS & DDOS attacks Phishing Attacks Hosting Illegal content Copyright Infringement

Incident Life Cycle

Ticketing

Incident Examples: Phishing Phishing Page (Visa) Abuse Mail Received Incident Analysis WordPress site was identified to be hosted containing a fake phishing page of Visa. The malicious URL: http://83.212.101.1/wp-includes/css/visa.dk/ http://83.212.101.1/wp-includes/css/dk.zip Stolen Credentials were send to the following email: $send2="ro.kiax@yahoo.com" Actions Taken Page Take down Informing User

Incident Examples: Botnet

Incident Examples: Forum Spam

Statistics 2012-2013 Abuses per year Category 150 140 14 16 Category 1 Category 2 100 50 0 23 1 2011 2012 2013 134 Category 3 Abuses per month Abuse type Scan 30 25 OpenDNS 20 36 42 bruteforce 15 7 18 7 15 19 20 network-scan Commercial aim DDOS DOS 10 5 0 other

Statistics 2014 10 46 Number of abuses per month 180 category 1 category 2 category 3 80 60 40 20 Incidents per type 0 Jan 2014 Feb 2014 Mar 2014 Apr 2014 May 2014 Jun 2014 60 50 40 30 20 10 0 2014 Open DNS Resolvers that turned to DDoS attack 47.73% 52.27% Open DNS Resolver DDoS

Statistics 2013 vs 2014 70 60 50 40 30 20 10 0 Number of abuses per month 2014 2013 Jan Feb Mar Apr May Jun Incidents per category per year 60 50 40 30 20 10 0 2014 2013

Mitigation Strategy: Security Checks Audits Web Scans Code Audits Stress Testing Release Check Tools Used: Accunetix Backtrack Burp Suite Agnito

Tool Development CLOUD HONEYPOT VIZUALIZER CLOUD POLICY ENFORCER FIREWALL ON DEMAND

Cloud Honeypot Vizualizer Stats: 1. Source per Country 2. Time analysis 3. Attacks per Port 4. Top 10 Attackers 5. All Attackers

Cloud Policy Enforcer Checks for: 1. Hosting of Illegal Services(ex. Torrent Tracker) 2. Illegal Content(ex. Images, Phishing forms) 3. Dangerous Content(ex. Virs Trojan) 4. Password Policy Check

Cloud Policy Enforcer WWW Capture SCAN RESULTS

Firewall on Demand

DDoS Illustrated

DDoS facts 400 Gbps 309 <1 1 3 10 17 24 40 49 100 60 60 02 03 04 05 06 07 08 09 10 11 12 13 14 Source: Arbor Networks Inc. & Cloudflare

Staying alive acls, firewall filters RTBH BGP flowspec

BGP FlowSpec Quick recap RFC 5575 Dissemination of flow specification rules with BGP BGP propagates n-tuple filter with flow matching criteria and actions MATCH source/dest prefix source/dest port ICMP type/code packet size DSCP TCP flag fragment type etc ACTIONS accept discard rate-limit sample redirect etc Firewall on Demand Multidomain 24 Internet2 Global Summit, Apr 9 2014

BGP community flow vs. RTBH vs. ACLs ACLS Distributed across the network Closer to the source Fine-grained even on core/backbone networks Multidomain easy propagation towards the upstream via BGP Easy automation & integration BGP RTHB Flowspec: enhancement of RTBH Does not affect all traffic to victim Less coarse More actions Separate NLRI

Firewall on Demand NEED FOR BETTER TOOLS TO MITIGATE TRANSIENT ATTACKS GRANULARITY: Per-flow level ACTION: Drop, rate-limit, redirect SPEED: 1-2 orders of magnitude quicker EFFICIENCY: closer to the source, multi-domain AUTOMATION: integration with other systems MANAGEABILITY: status tracking, web interface

Development Framework Source: Wikimedia Foundation Python Django

FoD Architecture OPEN SOURCE https://code.grnet.gr/projects/flowspy http://flowspy.readthedocs.org https://fod.grnet.gr

How it works Customer s NOC logs in web tool (shibboleth) & describes flows and actions Destination validated against customer s IP space A dedicated router is configured (NETCONF) to advertise the route via BGP flowspec Dynamic firewall filters are implemented on all routers Attack is mitigated upon entrance End of attack: Removal via the tool, or auto-expire Web ebgp NETCONF ibgp

GRNET FoD usage examples 3years 400Tbytes 120rules 50users 25peers

GÉANT Tests Click Apply 6 seconds later

FoD multidomain deployment scenarios

Current Status GRNET in production since end of 2011 Tests: Multihop BGP peering with PSNC Interest/Evaluation from BELNET GÉANT (https://fod.geant.net) BGP flowspec enabled in all core devices Successful tests between GRNET and GÉANT Multiple scenarios tested Iperf between Croatia and Greece Gone in 6 seconds In production by April 2015

Can I deploy/try/test it? Open source project FoD : https://code.grnet.gr/projects/flowspy Docs: https://flowspy.readthedocs.org Ask for a demo account PEER WITH US!

Demo time attaaaaack!

Enhancenments FoD interfaces to other tools/platforms REST API XMPP client/server ØMQ extensions Filter counters/graphs NETCONF Juniper UtilityMIB Ipv6 support (Whenever available)

Extensions rapid anomaly detection Top 5 Dst Port ordered by packets: Date first seen Duration Proto Dst Port Flows(%) Packets(%) Bytes(%) pps bps bpp 2014-09-28 19:27:42.480 50235.670 TCP XX 532857(34.0) 134.4 M(19.9) 24.8 G( 5.3) 2674 3.9 M 184 2014-09-26 23:10:13.660 209673.50 UDP XXXX 132( 0.0) 50.3 M( 7.5) 23.4 G( 5.0) 239 892851 465 2014-09-27 14:17:38.090 155240.05 TCP XXX 123272( 7.9) 37.4 M( 5.5) 13.8 G( 2.9) 240 709019 368 2014-09-29 07:19:11.840 7515.870 UDP XX 4057( 0.3) 19.0 M( 2.8) 14.4 G( 3.1) 2521 15.4 M 761 Top 5 Dst IP Addr ordered by packets: Date first seen Duration Proto Dst IP Addr Flows(%) Packets(%) Bytes(%) pps bps bpp 2014-09-29 09:19:18.730 286.270 UDP XX.YYY.XX.YY 35642( 2.3) 59.9 M( 8.9) 36.1 G( 7.7) 209192 1.0 G 602 2014-09-29 09:17:22.120 426.850 TCP XX.X.X.XXX 58534( 3.7) 12.9 M( 1.9) 1.1 G( 0.2) 30317 21.2 M 87 2014-09-29 09:17:22.110 426.860 TCP XXX.XX.XXX.XXX 39573( 2.5) 11.2 M( 1.7) 1.1 G( 0.2) 26336 20.5 M 97 RRD analysis STD-based Under dev

Questions? 42: The Answer to the Ultimate Question of Life, The Universe, and Everything. Douglas Adams, The Hitchhiker's Guide to the Galaxy