Putting the Tools to Work DDOS Attack



Similar documents
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Total Visibility 1 1

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Sink Holes. A Swiss Army Knife ISP Security Tool. Version 1.5. Barry Raveendran Greene -- bgreene@cisco.com Danny McPherson -- danny@arbor.

Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER

How Cisco IT Protects Against Distributed Denial of Service Attacks

DDoS attacks in CESNET2

Hunting down a DDOS attack

Cisco Network Foundation Protection Overview

DDoS Overview and Incident Response Guide. July 2014

Denial of Service Attacks

TDC s perspective on DDoS threats

/ Staminus Communications

Security Toolsets for ISP Defense

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

DDoS Mitigation Solutions

Denial of Service Attacks, What They are and How to Combat Them

Stop DDoS Attacks in Minutes

Strategies to Protect Against Distributed Denial of Service (DD

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

CS 356 Lecture 16 Denial of Service. Spring 2013

Arbor s Solution for ISP

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

FortiDDos Size isn t everything

How to launch and defend against a DDoS

Service Description DDoS Mitigation Service

DDoS Mitigation Techniques

Pravail 2.0 Technical Overview. Exclusive Networks

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Approaches for DDoS an ISP Perspective.

Stop DDoS Attacks in Minutes

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Reducing the impact of DoS attacks with MikroTik RouterOS

Denial of Service Attacks

DDoS Mitigation via Regional Cleaning Centers

Cheap and efficient anti-ddos solution

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Network provider filter lab

Automated Mitigation of the Largest and Smartest DDoS Attacks

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Quality Certificate for Kaspersky DDoS Prevention Software

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Distributed Denial of Service protection

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Network Protection Solution. Toni Ala-Mutka.

Building an Early Warning System in a Service Provider Network

Announcements. No question session this week

Seminar Computer Security

DDoS Protection on the Security Gateway

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

DEFENSE NETWORK FAQS DATA SHEET

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Firewalls and Intrusion Detection

Automated Mitigation of the Largest and Smartest DDoS Attacks

Practical Advice for Small and Medium Environment DDoS Survival

Cisco IOS Flexible NetFlow Technology

Flow Based Traffic Analysis

How To Block A Ddos Attack On A Network With A Firewall

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

DDoS Protection Technology White Paper

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Kaspersky DDoS Prevention

Introduction to Routing

Distributed Denial of Service Attack Tools

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

Korea s experience of massive DDoS attacks from Botnet

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

How To Protect A Dns Authority Server From A Flood Attack

Defending the Network: Mitigating Attacks

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

SECURING APACHE : DOS & DDOS ATTACKS - II

Denial of Service (DoS) Technical Primer

Detecting Botnets with NetFlow

DNS amplification attacks

Evaluating IPv6 Firewalls & Verifying Firewall Security Performance

Network monitoring and analysis tools:

Cisco Remote Management Services for Security

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Transcription:

Putting the Tools to Work DDOS Attack 1

DDOS = SLA Violation! Hacker ISP CPE Target What do you tell the Boss? SP s Operations Teams have found that they can express DDOS issues as SLA violations, which allow for their management to understand why they need to act.

Extortionist CE ISP Edge router BOTNETS Making DDoS Attacks Easy Last Mile Connection Customer premise: Zombies Server/FW/Switch/router BOTNETs for Rent! 2 for 1 Special A BOTNET is comprised of computers that have been broken into and planted with programs (zombies) that can be directed to launch attacks from a central controller computer BOTNETs allow for all the types of DDOS attacks: ICMP Attacks, TCP Attacks, and UDP Attacks, http overload Options for deploying BOTNETs are extensive and new tools are created to exploit the latest system vulnerabilities A relatively small BOTNET with only 1000 zombies can cause a great deal of damage. For Example: 1000 home PCs with an average upstream bandwidth of 128KBit/s can offer more than 100MBit/s Size of attacks are ever increasing and independent of last mile bandwidth

It is all about the packet Internet It is all about the packet.. Once a packet gets into the Internet, someone, somewhere has to do one of two things: Deliver the Packet Drop the Packet In the context of DoS attacks, the questions are who and where will the drop the packet action occur? POP Border OC48 POP Border OC12 Big Aggregation Box OC12 Big Aggregation Box Nine ChOC12

Six Phases of Incident Response POST MORTEM What was done? Can anything be done to prevent it? How can it be less painful in the future? PREPARATION Prep the network Create tools Test tools Prep procedures Train team Practice IDENTIFICATION How do you know about the attack? What tools can you use? What s your process for communication? REACTION What options do you have to remedy? Which option is the best under the circumstances? TRACEBACK Where is the attack coming from? Where and how is it affecting the network? CLASSIFICATION What kind of attack is it?

SITREP Everything is normal in the Network. Then alarms go off something is happening in the network.

Customer Is DOSed Before IXP-W Peer A A Peer B IXP-E Upstream A D Upstream A B C Upstream B E Upstream B Target F POP Target is taken out G NOC

Customer Is DOSed Before Collateral Damage IXP-W Peer A A Peer B IXP-E Upstream A D Upstream A B C Upstream B E Upstream B Target Customers F POP Attack causes Collateral Damage G NOC

SITREP Attack in Progress Attack on a customer is impacting a number of customers. COLATERAL DAMAGE INCIDENT! Immediate Action: Solve the Collateral Damage issues.

Customer Is DOSed After Packet Drops Pushed to the Edge A Peer A IXP-W Peer B IXP-E Upstream A D Upstream A B C Upstream B E Upstream B Target F POP G NOC ibgp Advertises List of Black Holed Prefixes

SITREP Attack in Progress Collateral Damage mitigated Customer who was attacked has PARTIAL SERVICE. DOS Attack is Still Active Options: Sink Hole a part of the traffic to analyze. Watch the DOS attack and wait for Attack Rotation or cessation. Activate Clean Pipes for a Full Service Recovery.

Remote Triggered Drops and Communities Upstream A Communities 1, 100, 300 Peer X Peer Y Communities 1, 100, 300 Communities 1, 100, 200 Core Community abc Community efg Community hij Data Center POP/Customer Corp Network

SITREP Attack in Progress Collateral Damage mitigated Customer who was attacked has PARTIAL SERVICE. DOS Attack is Still Active Action: Monitor the Attack & Get more details on the Attack Use BGP Community based triggering to send one regions flow into a Sink Hole

BGP Community Trigger to Sinkhole Send DOS to Sink Hole. Sinkhole IXP-W Sinkhole Peer A Peer B Sinkhole IXP-E Sinkhole Upstream A Upstream A Upstream B Sinkhole Upstream B 171.68.19.0/24 Customer Sinkhole POP Sinkhole Services Network 171.68.19.1 Primary DNS Servers

Analyze the Attack To ISP Backbone Sinkhole Gateway Target Router To ISP Backbone To ISP Backbone Sniffers and Analyzers Use the tools available on the Internet and from Vendors to analyze the details of the attack. This will provide information about what you can or cannot do next.

SITREP Attack in Progress Collateral Damage mitigated Customer who was attacked has PARTIAL SERVICE. DOS Attack is Still Active Action: Provide the Customer who is the victim with a Clean Pipes FULL SERVICE RECOVERY (off to vendor specific details).

What is Full Service Recovery Clean Pipes is a term used to describe full service recovery. The expectations for a full service recovery is: DDOS Attack is in full force and ALL customer services are operating normally meeting the contracted SLA. The Device used for the full service recovery is not vulnerable to the DDOS & the infrastructure is not vulnerable to collateral damage. Full Service Recovery/Clean Pipes products are very specialized. Talk to the appropriate vendor.

BGP More Information Cisco BGP Home http://www.cisco.com/en/us/tech/tk365/ tk80/tech_protocol_family_home.html Slammer/BGP analysis http://www.nge.isi.edu/~masseyd/pubs/ massey_iwdc03.pdf Team CYMRU BGP Tools http://www.cymru.com/bgp/index.html

Syslog More Information Syslog.org - http://www.syslog.org/ Syslog Logging w/postgres HOWTO http://kdough.net/projects/howto/ syslog_postgresql/ Agent Smith Explains Syslog http://routergod.com/agentsmith/

Packet Capture More Information tcpdump/libpcap Home http://www.tcpdump.org/ Vinayak Hegde s Linux Gazette article http://www.linuxgazette.com/ issue86/vinayak.html

Remote Triggered Black Hole Remote Triggered Black Hole filtering is the foundation for a whole series of techniques to traceback and react to DOS/DDOS attacks on an ISP s network. Preparation does not effect ISP operations or performance. It does adds the option to an ISP s security toolkit.

More Netflow Tools NfSen - Netflow Sensor http://nfsen.sourceforge.net/ NFDUMP http://nfdump.sourceforge.net/ FlowCon http://www.cert.org/flocon/