Universal DDoS Mitigation Bypass. DDoS Mitigation Lab



Similar documents
DDoS Protecion Total AnnihilationD. DDoS Mitigation Lab

Kill 'em All -- DDoS Protection Total Annihilation!

TDC s perspective on DDoS threats

Universal DDoS Mitigation Bypass

Acquia Cloud Edge Protect Powered by CloudFlare

DDoS Yesterday, Today and tomorrow. Frank Tse, William Guo Nexusguard

CloudFlare advanced DDoS protection

VALIDATING DDoS THREAT PROTECTION

How To Understand A Network Attack

Denial of Service Attacks

Stress Testing and Distributed Denial of Service Testing of Network Infrastructures

How To Protect A Dns Authority Server From A Flood Attack

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

FortiDDos Size isn t everything

DDoS Protection Technology White Paper

CS 356 Lecture 16 Denial of Service. Spring 2013

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

How To Attack A Website With An Asymmetric Attack

Check list for web developers

CSCE 465 Computer & Network Security

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Denial of Service Attacks, What They are and How to Combat Them

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

Network- vs. Host-based Intrusion Detection

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Four Steps to Defeat a DDoS Attack

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Introducing FortiDDoS. Mar, 2013

Four Steps to Defeat a DDoS Attack

Security: Attack and Defense

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

DoS/DDoS Attacks and Protection on VoIP/UC

McAfee Network Security Platform [formerly IntruShield] Denial-of-Service [DoS] Prevention Techniques Revision C Revised on: 18-December-2013

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January Cristian Velciov. (+40)

Security vulnerabilities in the Internet and possible solutions

Chapter 8 Network Security

CS5008: Internet Computing

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

HARPP DDoS Mitigator Appliances and DDoS CERT

Introduction about DDoS. Security Functional Requirements

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Enterprise Data Center Topology

A Primer for Distributed Denial of Service (DDoS) Attacks

General Network Security

Chapter 8 Security Pt 2

Radware s Attack Mitigation Solution On-line Business Protection

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks

Mitigating DDoS Attacks at Layer 7

A Layperson s Guide To DoS Attacks

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

DDoS Attacks & Mitigation

Complete Protection against Evolving DDoS Threats

How To Classify A Dnet Attack

Denial Of Service. Types of attacks

How To Block A Ddos Attack On A Network With A Firewall

Criteria for web application security check. Version

SECURING APACHE : DOS & DDOS ATTACKS - II

Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall. White Paper

DDoS Protection on the Security Gateway

Cheap and efficient anti-ddos solution

DDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée

Attack and Defense Techniques

Are you safe from DDoS attacks?

Surviving DNS DDoS Attacks. Introducing self-protecting servers

Quality Certificate for Kaspersky DDoS Prevention Software

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

DDoS Vulnerability Analysis of Bittorrent Protocol

Cisco Network Foundation Protection Overview

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

Mitigating DDoS Attacks with F5 Technology

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Stop DDoS Attacks in Minutes

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

Survey on DDoS Attack Detection and Prevention in Cloud

Application DDoS Mitigation

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Migrating the SSL Offloading Configuration of the Alteon Application Switch 2424-SSL to AlteonOS version

Protecting Mobile Devices From TCP Flooding Attacks

What's New in Cisco ACE Application Control Engine Module for the Cisco Catalyst 6500 and Cisco 7600 Series Software Release 2.1.0

How To Test A Ddos Prevention Solution

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Configuring Health Monitoring

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Security Technology White Paper

Deployment Guide DDoS Protection for Web and DNS Servers

Firewalls and Intrusion Detection

Transcription:

Universal DDoS Mitigation Bypass DDoS Mitigation Lab

About Us Industry body formed to foster synergy among stakeholders to promote advancement in DDoS defense knowledge. DDoS Mitigation Lab Independent academic R&D division of Nexusguard building next generation DDoS mitigation knowledge and collaborate with the defense community.

Outline DDoS Attack Categories DDoS Detection and Mitigation Techniques How they work? How to bypass / take advantage? DDoS Mitigation Bypass How to use our PoC tool? PoC tool capability Next-Generation Mitigation

Financial Impact Source: NTT Communications, Successfully Combating DDoS Attacks, Aug 2012

Volumetric Attacks Packet-Rate-Based Bit-Rate-Based

Semantic Attacks API attacks Hash DoS Apache Killer Teardrop (old textbook example) Slowloris / RUDY SYN Flood (old textbook example) Smurf (old textbook example)

Blended Attacks

Attack Quadrant xxx Gbps+ Volume xxx Mbps+ Simple Complexity Sophisticated

DDoS Mitigations xxx Gbps+ Volume Traffic Policing Black- / Whitelisting Proactive Resource Release xxx Mbps+ Simple Complexity Sophisticated

DDoS Mitigation: Traffic Policing Source: Cisco

DDoS Mitigation: Proactive Resource Release 3. Detect idle / slow TCP connections RST 2. TCP connection pool starved 4. Close idle / slow TCP connections With RST Example: Slowloris Attack 1. Open lots of TCP connections

DDoS Mitigation: Black- / Whitelisting Src: 1.2.3.4 1.2.3.4 5.6.7.8 Black List B (dropped) Src: 3.4.5.6 5.6.7.8 3.4.5.6 6.7.8.9 White List = free pass (for awhile / for x amount of volume) Backend

DDoS Mitigation: Source Isolation AS AS AS Source: http://www.cs.duke.edu/nds/ddos/

DDoS Solution: Secure CDN Backend 3: return 2: redirect to nearest server End User 1: request 4: bypass distribution, attack backend!

DDoS Detection xxx Gbps+ Rate Measurement (SNMP) Baselining (Netflow) Volume Big Data Analysis Protocol Sanity (PCAP) Protocol Behavior (PCAP) Application (SYSLOG) xxx Mbps+ Simple Complexity Sophisticated

Rate- / Flow-Based Countermeasures Detection Mitigation

Protocol-Based Countermeasures Detection Mitigation

Blanket Countermeasures Detection Mitigation Traffic Statistics and Behavior Big Data Analysis Source Host Verification

Source Host Verification TCP SYN Auth HTTP Redirect Auth HTTP Cookie Auth JavaScript Auth CAPTCHA Auth

PoC Tool

PoC Tool Strengths True TCP/IP behavior (RST, resend, etc.) Believable HTTP headers (User-Agent strings, etc.) Embedded JavaScript engine CAPTCHA solving capability Randomized payload Tunable post-authentication traffic model

PoC Tool: Authentication Bypass

TCP SYN Auth (TCP Reset) SYN SYN ACK ACK RST SYN SYN ACK ACK

TCP SYN Auth (TCP Out-of-Sequence) SYN SYN ACK RST SYN SYN ACK ACK

HTTP Redirect Auth GET HTTP 302 redir to /index.html /foo/index.html GET /foo/index.html HTTP 302 redir to /index.html GET /index.html

HTTP Cookie Auth GET HTTP 302 redir to GET HTTP 302 redir to GET /index.html /index.html /index.html /index.html /index.html

HTTP Cookie Auth (Header Token) GET HTTP 302 redir to [X-Header: foo=bar] GET HTTP 302 redir to [X-Header: foo=bar] [X-Header: foo=bar] GET GET /index.html [X-Header: foo=bar] /index.html /index.html [X-Header: foo=bar] /index.html /index.html /index.html

JavaScript Auth GET /index.html JS 7+nine=? ans=16 POST /auth.php HTTP 302 redir to /index.html GET /index.html

CAPTCHA Auth GET /index.html POST /auth.php HTTP 302 redir to /index.html GET /index.html

CAPTCHA Pwnage

PoC Tool: TCP Traffic Model

TCP Traffic Model Connection Hold Time Before 1 st Request Connection Idle Timeout After Last Request Number of Connections TCP Connection TCP Connection TCP Connection Connections Interval Connections Interval

PoC Tool: HTTP Traffic Model

HTTP Traffic Model TCP Connection Number of Requests per Connection HTTP Connection HTTP Connection HTTP Connection HTTP Connection Requests Interval Requests Interval Requests Interval

PoC Tool Design 3 tries per authentication attempt (in practice more likely to success) True TCP/IP behavior thru use of OS TCP/IP stack Auth cookies persist during subsequent dialogues JavaScript execution using embedded JS engine (lack of complete DOM an obstacle to full emulation)

CAPTCHA Bypass Design 1. Converted to black-and-white for max contrast 2. 3x3 median filter applied for denoising 3. Word segmentation 4. Boundary recognition 5. Pixel difference computed against character map

PoC Tool in Action

Testing Environment Against Devices Against Services Measure Attack Traffic Measure Attack Traffic

Mitigation Bypass (Protection Products) Auth Bypass Post-Auth Proactive Resource Release Testing results under specific conditions, valid as of Jul 13, 2013

Mitigation Bypass (Protection Services) Auth Bypass Post-Auth Proactive Resource Release Testing results under specific conditions, valid as of Jul 13, 2013

Next-Generation Mitigation Client Puzzle add cost to individual zombies.

Conclusion DDoS is expensive to business Existing DDoS protection insufficient Next-Generation solution should make attack expensive

Thank You! tony.miu@nexusguard.com albert.hui@ntisac.org waileng.lee@ntisac.org http://www.ntisac.org