DDoS Attacks. An open-source recipe to improve fast detection and automate mitigation techniques



Similar documents
DDoS Mitigation Techniques

DDoS Mitigation Strategies

Cheap and efficient anti-ddos solution

F5 Silverline DDoS Protection Onboarding: Technical Note

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

and reporting Slavko Gajin

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January Cristian Velciov. (+40)

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

DDoS attacks in CESNET2

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Corero Network Security First Line of Defense Executive Overview

Approaches for DDoS an ISP Perspective.

The ntop Project: Open Source Network Monitoring

Practical Advice for Small and Medium Environment DDoS Survival

How To Set Up Foglight Nms For A Proof Of Concept

Hunting down a DDOS attack

Service Description DDoS Mitigation Service

TELCO challenge: Learning and managing the network behavior

Security Toolsets for ISP Defense

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

FortiDDos Size isn t everything

Firewall-on-Demand. GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF. Leonidas Poulopoulos

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

Firewall on Demand Multidomain

NetFlow: What is it, why and how to use it? Miloš Zeković, ICmyNet Chief Customer Officer Soneco d.o.o.

Programmable Networking with Open vswitch

What network engineers can learn from web developers when thinking SDN.

Take the NetFlow Challenge!

Monitoring Network Traffic using ntopng

Internet Traffic Trends A View from 67 ISPs

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

About the Technical Reviewers

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Reducing the impact of DoS attacks with MikroTik RouterOS

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

Fluke Networks NetFlow Tracker

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Infrastructure for active and passive measurements at 10Gbps and beyond

Network congestion control using NetFlow

Comprehensive IP Traffic Monitoring with FTAS System

OpenDaylight Project Proposal Dynamic Flow Management

Monitoring high-speed networks using ntop. Luca Deri

High-Speed Network Traffic Monitoring Using ntopng. Luca

DEFENSE NETWORK FAQS DATA SHEET

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

PRACTICAL EXPERIENCES BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR. ` Mark Graham

Analysis of a DDoS Attack

How Cisco IT Protects Against Distributed Denial of Service Attacks

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

Cisco IOS Flexible NetFlow Technology

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Implementing Secure Converged Wide Area Networks (ISCW)

End-to-End Network Centric Performance Management

TDC s perspective on DDoS threats

Innovative, High-Density, Massively Scalable Packet Capture and Cyber Analytics Cluster for Enterprise Customers

OpenNebula Cloud Platform for Data Center Virtualization

Health monitoring & predictive analytics To lower the TCO in a datacenter

Denial of Service and Anomaly Detection

/ Staminus Communications

Cisco Packet Tracer 6.3 Frequently Asked Questions

How To Monitor Bandwidth On A Computer Network

THUNDER TPS Next-generation DDoS Protection

Mitigating DDoS Attacks at Layer 7

Technical Overview Simple, Scalable, Object Storage Software

SOLARWINDS ENGINEER S TOOLSET FAST FIXES TO NETWORK ISSUES

Network Monitoring Comparison

MikroTik Invisible Tools. By : Haydar Fadel 2014

Distributed Denial of Service protection

Beyond Monitoring Root-Cause Analysis

Radware s Attack Mitigation Solution On-line Business Protection

NetFlow/IPFIX Various Thoughts

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

PROFESSIONAL SECURITY SYSTEMS

DDoS detection & mitigation

BEHAVIORAL SECURITY THREAT DETECTION STRATEGIES FOR DATA CENTER SWITCHES AND ROUTERS

Intrusion Detection Systems (IDS)

Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing _06_2000_c1_sec3

NetFlow Tips and Tricks

Network-Wide Capacity Planning with Route Analytics

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Network Management Back to the Basics. Brad Hale

Securing and Monitoring BYOD Networks using NetFlow

Flow Based Traffic Analysis

Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services

Introduction. The Inherent Unpredictability of IP Networks # $# #

Transcription:

DDoS Attacks An open-source recipe to improve fast detection and automate mitigation techniques Vicente De Luca Sr. Network Engineer vdeluca@zendesk.com AS21880 / AS61186

Introduction

Tentative to solve: #1 DDoS fast detection and better monitoring #2 Improve response time on mitigation triggering

Opensource recipe - FastNetMon: main core of our solution. DDoS analyzer with sflow/netflow/mirror support - InfluxDB: Scalable data store for metrics, events, and real-time analytics - Grafana: Gorgeous metric viz, dashboards & editors - Redis: An in-memory database that persists on disk - Morgoth: Metric anomaly detection for Influx databases - BIRD: a fully functional dynamic IP routing daemon - Net Healer: experimental code to "glue" all moving parts, trigger actions and provide API queries

FastNetMon: very fast DDoS analyzer - collects sflow (v4/v5), NetFlow (v5/v9/v10), IPFIX and SPAN/mirror - fast detect IPv4 host above certain threshold - feed Graphite (compatible) time-series DB - supports BGP daemons (ExaBGP, GoBGP, others) - supports Lua processing net flows - CLI client available for CentOS / Ubuntu / Debian / Vyatta / FreeBSD / source / Docker Image tested with Juniper, Cisco, Extreme, Huawei and Linux (ipt_netflow) https://github.com/pavel-odintsov/fastnetmon

FastNetMon Detection Logic: - number of pps, mbps and flows to/from a /32 - number of fragmented packets to/from a /32 - number of tcp syn / udp to/from a /32 - global / per protocol (udp/tcp/icmp) / per host group (CIDR) - ndpi support (SPAN/mirror) Complete support most popular attacks for channel overflow: - SYN Flood - UDP Flood (amplified SSDP, Chargen, DNS, SNMP, NTP, etc) - IP Fragmentation

FastNetMon How it can react during an attack? - Custom script (send email, apply an ACL, shutdown a VM, etc etc etc ) - BGP Announce (community, blackhole, selective blackhole, cloud mitigation) - BGP Flow Spec (RFC 5575) for selective traffic blocking - Populate Redis DB (target, type, attack peak, tcpdump during attack, etc)

FastNetMon Detection time per capture backends 40 30 Seconds 20 10 0 NetFlow sflow Mirror

our proof-of-concept

Are we targets?

support.acme.com CNAME acme.zendesk.com

The good, the bad and the ugly

The good: mitigation via cloud provider (BGP) - multiple scrubbing centers across the globe - Lots of Tbps of mitigation bandwidth capacity - presence in IXPs - GRE tunnel established in a safer circuit some cons: - Reaction time: Internet route convergence (BGP) not that bad - mitigation occurs on incoming only - always on = $$$

The bad NOC paged with a site-down alert :( Troubleshoot to identify an ongoing attack

The ugly detecting takes "too long, dependent on humans :( trigger mitigation also needs manual config change

Why not simply buy an already existent and reliable DDoS mitigation appliance? - mostly demands almost dedicated and qualified engineers - Mitigation available = useless in case of volumetric attack - High investment for multiple sites ($$$)

Architecture Diagram

IXP edge routers

DDoS Attack cycle

Attack started FNM quiescence: 15s per /32 FastNetMon: populate /32 details at RedisDB if Morgoth detects: populate timestamp at anomaly InfluxDB Net Healer watches RedisDB and InfluxDB if the current attack reports match any policy, trigger the associated action

Net Healer Policies example: (in a time period of 5 min) if attack reports = 2 then trigger on call if attack reports >=4 then inject /24 route if attack report = 2 + anomaly detected (morgoth) then trigger on call + inject /24 route time window / policies can be customized

Why Net Healer? - FastNetMon supports all I need, but relies on pre-configured thresholds - Hard to predict realistic thresholds since our traffic is influenced by our customers activity (out of our control) - To avoid false positives we prefer to trigger different actions based on each attack cycle phase - Allow quick integrations like Morgoth x FNM consensus, or API calls such as Pagerduty, etc

Why InfluxDB? - Speaks graphite protocol (compatible with FastNetMon) - Drop in binary - simple install - Supports cluster mode - easy to scale Note: Use version >=0.9.6.1 - with tsm1 engine with no batching

Why Morgoth? - Implements non-gaussian algorithm (MGOF) to detect anomaly on data stream metrics - Takes InfluxDB (bps/pps) fingerprints every chunk of 10s - Compares the actual fingerprint with the past learned traffic - Anomaly found: Create an alert entry with timestamp Note: At the time we started developing this project, we were unaware of Influx T.I.C.K stack We d love to try Influx Kapacity

Why BIRD? - syncing with kernel routing tables (blackhole, mitigate) - ibgp with edge routers - Routing policies will decide if RTBH or Advertise to mitigation provider - friendly to Network Engineers (birdc)

How does it look?

REST API queries

Work in progress ** all the ingredients used on this recipe are open source ** ** how to build yourself ** Read Documentation https://github.com/pavel-odintsov/fastnetmon/tree/master/docs Download https://github.com/pavel-odintsov/fastnetmon Join mail list https://groups.google.com/forum/#!forum/fastnetmon About FastNetMon: Thanks to Pavel Odintsov for the amazing gift he made available the open source community About NetHealer: experimental (alpha) Ruby code. ideas, issues and pull requests are more than welcome. https://github.com/zenvdeluca/net_healer

Thank you! Questions? vdeluca@zendesk.com