DoS/DDoS Attacks and Protection on VoIP/UC



Similar documents
TDC s perspective on DDoS threats

Denial of Service Attacks

Surviving DNS DDoS Attacks. Introducing self-protecting servers

CS 356 Lecture 16 Denial of Service. Spring 2013

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Securing SIP Trunks APPLICATION NOTE.

Acquia Cloud Edge Protect Powered by CloudFlare

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Intro to Firewalls. Summary

CloudFlare advanced DDoS protection

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

VALIDATING DDoS THREAT PROTECTION

CS5008: Internet Computing

Arbor s Solution for ISP

Firewalls and Intrusion Detection

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Seminar Computer Security

Kick starting science...

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

SIP Trunking Configuration with

DDoS Protection on the Security Gateway

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

How To Stop A Ddos Attack On A Website From Being Successful

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

How To Protect A Dns Authority Server From A Flood Attack

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

Attack and Defense Techniques

Voice Over IP (VoIP) Denial of Service (DoS)

BEng (Hons) Telecommunications. Examinations for / Semester 1

White Paper. avaya.com 1. Table of Contents. Starting Points

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

An outline of the security threats that face SIP based VoIP and other real-time applications

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

SECURING APACHE : DOS & DDOS ATTACKS - I

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Verizon Columbia Research on VoIP Security A Model Academia/Industry Collaboration. Gaston Ormazabal. Verizon Laboratories.

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Network attack and defense

Chapter 8 Security Pt 2

Ingate Firewall/SIParator SIP Security for the Enterprise

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Multimedia Communication in the Internet. SIP Security Threads. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS 1

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

McAfee Network Security Platform [formerly IntruShield] Denial-of-Service [DoS] Prevention Techniques Revision C Revised on: 18-December-2013

Denial Of Service. Types of attacks

Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

DDoS Attacks & Mitigation

TLS and SRTP for Skype Connect. Technical Datasheet

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

How To Understand A Network Attack

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

VOICE OVER IP SECURITY

DDoS Basics. internet: unique numbers that identify areas and unique machines on the network.

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Safeguards Against Denial of Service Attacks for IP Phones

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Network Simulation Traffic, Paths and Impairment

First Line of Defense to Protect Critical Infrastructure

Securing data centres: How we are positioned as your ISP provider to prevent online attacks.

Online course syllabus. MAB: Voice over IP

CMPT 471 Networking II

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Application DDoS Mitigation

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

Configuring Voice Quality Monitoring in AOS

Denial of Service Attacks, What They are and How to Combat Them

Modern Denial of Service Protection

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Survey on DDoS Attack Detection and Prevention in Cloud

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

7. Firewall - Concept

IxLoad VoIP SIP, MGCP Features

IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Basic Vulnerability Issues for SIP Security

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Security Technology White Paper

Security of IPv6 and DNSSEC for penetration testers

How To Block A Ddos Attack On A Network With A Firewall

Columbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems

How To Protect Yourself From A Dos/Ddos Attack

TECHNICAL CHALLENGES OF VoIP BYPASS

Transcription:

DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems

Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements

DoS and DDoS attacks DoS A Denial of Service Attack is an attempt to make a resource unavailable to its intended users. One common method is saturating the server with requests such that it can not process legitimate requests DDoS A Distributed denial of service attack multiple compromised systems flood the target system The Advantages of DDoS are that multiple machines can generate more attack traffic Multiple attack machines are harder to turn off and detect than one attack machine 3 UC Security Requirements

DoS and DDoS attacks Role of Spoofing DDoS attacks can be carried out by spoofing multiple sources It does not give the advantage of ability to generate more traffic It still makes it extremely hard for to detect and block a particular source to mitigate the attack Role of Zombies or Bots DDoS attacks can be carried out by compromising large number of machines to launch attacks. These machines waiting for a command from the attacker to launch attacks are called zombies or botnets 4 UC Security Requirements

DoS and DDoS attacks Reflection In this DDoS attack, attacker spoofs the victims address and sends forged requests to large number of machines, and the responses coming back from these machines flood the victim Recursive Amplification attacks In this attack, attacker sends one spoofed request which results in multiple requests coming back to the victim and further resulting in even more requests and this recursing Example is DNS attacks, SIP amplification attack using forking proxies: draft-ietf-sip-fork-loop-fix-07 5 UC Security Requirements

DoS and DDoS attacks Attack targets Typical targets are servers, but changes in peer-to-peer The target can be network, TCP/IP stack, application Reconnaissance Is a military and medical term denoting exploration conducted to gain information, this typically is a precursor to most attacks Stealth DoS A low volume attack purposely trying to evade detection 6 UC Security Requirements

VoIP/UC is different Real-time Peer-to-peer Weak VoIP Endpoints VoIP is Different Complex Protocols for Rich Features Human Interactive Application Layer 7 UC Security Requirements

VoIP is Different Real-time Sensitivity Sent Packet loss Out-of-order Network Late packet Received Playback 8 UC Security Requirements

VoIP is Different Peer-to-peer SMTP: Connect to Server & Send email Server POP3: Connect to Server & Receive emails Make Call IP PBX Deliver Call Answer Call Client Client Client/Server Conversation RTP over UDP (Voice, Video) Client/Server Client/Server Peer-to-peer 9 UC Security Requirements

VoIP is Different Complex Protocols Port 25 open for SMTP/TCP Port 5060 open for SIP/TCP One port Few servers Dynamic ports Every phone is a server 10 UC Security Requirements

VoIP is Different Application Layer Header Attack Header Attack Header Att Attack Header Att Header Att Header Att Header ack Header ack Header ack Header ack Packet processing Header inspection Limited payload inspection Application state, Context, Semantic processing 11 UC Security Requirements

VoIP is Different Human Interactive Human-to-machine Human-to-human 12 UC Security Requirements

VoIP is Different Weak VoIP Endpoints Virus scanner, firewall, HIDS High CPU, Memory Security protocols: IPSec,802.1X No security tools Weak CPU, Low memory Limited security protocols 13 UC Security Requirements

Impact of DoS Attacks Real-time Sensitivity Even a two packet 40 ms drop has a perceptible drop in MOS scores Jitter buffer are usually < 100ms a variation in delay of more than that results in drops ITU specifies 150ms as the maximum end to end delay for voice Sent Network Received Playback 14 UC Security Requirements

Impact of DoS Attacks Peer-to-peer Attackers can directly flood endpoints Make Call IP PBX Deliver Call Any segment of network possibly can be an attack target Client/Server Answer Call Conversation RTP over UDP (Voice, Video) Client/Server Peer-to-peer 15 UC Security Requirements

Impact of DoS Attacks Complex Protocols Complexity is friend of attacker More ports more ways to attacks More attacks like reflection, amplification possible Dynamic ports Every phone is a server Port 5060 open for SIP/TCP 16 UC Security Requirements

Impact of DoS Attacks Application Layer Application layer makes the servers susceptible low rate attacks Each message can result in heavy processing Creation of complex state machines Transfer Conference Hold Forward 17 UC Security Requirements

Impact of DoS Attacks Weak VoIP Endpoints Endpoints are weak Low CPU, low memory: easy to overwhelm No Security tools: No protection on endpoint against DoS attacks No security tools Weak CPU, Low memory Limited security protocols 18 UC Security Requirements

VoIP is Different Human Interactive Human interaction allows for stealth attacks targeting users Very low volume traffic can overwhelm users Human-to-human 19 UC Security Requirements

Same threat Impact of DoS Attacks on VoIP Real-time Sensitivity Small delays, cause incoherent voice Application layer and Protocol Complexity SIP Requests (INVITE/CANCEL) Weak VoIP devices Relative impact of flood Human interactive Reduced Flood Intensity VoIP User VoIP Phone VoIP Network Server (IP-PBX) Data Network Endpoint (Browser) Data Network Server (Web Server) Data Network 0.01 calls per second (1 per min) 0.1 to 1 calls per second 10-50 calls per second It is a Client (you can t flood it) 10,000 TCP SYNs per second Data Network Pipe = 1 Gbps Phone rings every 5 minutes 20 UC Security Requirements

Protection Techniques: Detecting Attack DoS Source monitoring: DoS Detection is possibly the simplest and is done based on large amounts of traffic from a single source DDoS Destination Monitoring: DDoS detection requires monitoring traffic on the destination/victim of attack and detecting large spikes in traffic volume Fingerprinting: Learning the details of message headers and detecting any mismatches allows fingerprinting to detect spoofind Stealth DoS Behavior Learning: This requires behavior learning in different time slots, based on time of day and day of week, and ability to monitor even slight deviations from learnt behavior 21 UC Security Requirements

Protection Techniques: Identifying attacker DoS This again is the simplest as part of detecting attack, the source of attack is easily identified, unless it is being spoofed DDoS Zombies: depending on the number of zombies attackers may or may not be identified based on volume, typically new sources of traffic (not seen in past are possible attackers) Spoofing: in this case since number of random sources can be as high as the address space in theory, new sources of traffic or cookie based techniques are used Stealth DoS Since attacks are very low volume, identifying an attacker is difficult, it is best to verify all traffic and then allow only verified traffic 22 UC Security Requirements

Protection Techniques: Mitigating Attacks DoS Block: Once attacker is identified blocking attacker is straightforward DDoS Block: In case of limited number of zombies this is possible Cookie verification: In case of three way handshake protocols, the attack target sends back cookies and hides state inside the cookie and waits for handshake to complete before allocating resources, in case of spoofing and simple script zombies attack is thwarted Re-authentication: On detecting a fingerprint mismatch re-authentication can be triggered blocking spoofing attacks Stealth DoS Cookie verification: In case of three way handshake protocols, the attack target sends back cookies and hides state inside the cookie and waits for handshake to complete before allocating resources, in case of spoofing and simple script zombies attack is thwarted 23 UC Security Requirements

Protection Technique: Mitigating Attacks Reflection Strict Protocol Conformance: Drop unwarranted responses or messages invalid for the state. Recursive Amplification Strict Protocol Conformance: Drop unwarranted responses or messages invalid for the state. Enforce Signaling Policies: Flexible policies to enforce specific messages, headers etc 24 UC Security Requirements

Protection Technique: Source Monitoring IP PBX 1. Observe non conformant traffic call walking Intranet Internet Protected Endpoints Detects Reconnaissance Detects DoS 25 UC Security Requirements

Protection Technique: Destination Monitoring Protected Endpoint IP PBX Intranet Internet Detects DDoS Attacks Spoofed and Zombies 1. Observe non conformant behavior 26 UC Security Requirements

Protection Technique: Behavior Learning IP PBX 1. Observe normal traffic Intranet Internet Protected Endpoints 2. Detect Bad Behavior Detects Stealth DoS 27 UC Security Requirements

Protection Technique: Fingerprinting IP PBX 3. Phone moves to new location 5. Phone re-registration complete 6. IPCS updates fingerprint Intranet 4b. Fingerprint mismatch, SIP Challenge, Response 4a. Phone tries to re-register Internet 2. IPCS learns fingerprint REGISTER sip:ss2.wcom.com SIP/2.0 Via: SIP/2.0/UDP there.com:5060 From: LittleGuy <sip:userb@there.com> Call-ID: 123456789@there.com Contact: <sip:userb@172.16.1.10> Sipera IPCS 1. Phone registers 7. Attacker script tries to spoof register 8. Fingerprint mismatch, REGISTER sip:ss2.wcom.com SIP/2.0 Via: SIP/2.0/UDP there.com:5060 From: LittleGuy <sip:userb@there.com> Call-ID: 123456789@there.com Contact: <sip:userb@172.16.1.11> Detects Spoofing 28 UC Security Requirements

Protection Technique: Cookie Verification IP PBX 5. Allow call Intranet 3. New call Internet 4. Challenge, Valid Response Protected Endpoint 1. Attacker makes call Blocks spoofed DDoS (at very high rates) Blocks scripts Blocks Stealth DoS 29 UC Security Requirements 2. Challenge, (spoofed address) No response

Protection Technique: Re-authentication IP PBX 5. Allow call Intranet 3. New call Internet 4. Re-auth, Valid Response Protected Endpoint 1. Attacker makes call 2. Re-auth, no response Blocks Spoofing Block Zombie Attacks 30 UC Security Requirements

Protection Technique: Strict Protocol Conformance IP PBX Intranet 2. Reflected Response Internet Protected Endpoint 1. Attacker sends message Blocks Reflection Blocks Amplification 31 UC Security Requirements

Protection Technique: Enforce Policies Policy Enforcement User, Network, Device, Time of Day, Domain based policies Blocks Signaling manipulation attacks 32 UC Security Requirements

Protection Technique: Purpose Built Hardware Media Latency Traditional Shared Resources Signaling Media Increased Attacks Traditional Real-Time Independent Planes Signaling Media 100 µs Call Volume Real-Time Deterministic low latency and low jitter under attack 33 UC Security Requirements

Protection Technique: Selective RTP anchoring Block Peer to Peer attacks Deterministic low latency and low jitter under attack 34 UC Security Requirements

Protection Technique: Per Domain Rate Limiting Restricts the impact of attack to one domain Ensures other domains see no effect 35 UC Security Requirements

Protection Technique: Random Early Discard Ensures Service is available under heavy attack Ensures Quick Recovery once attack is blocked Ensures established calls are not affected 36 UC Security Requirements