DDoS Protecion Total AnnihilationD. DDoS Mitigation Lab



Similar documents
Universal DDoS Mitigation Bypass. DDoS Mitigation Lab

TDC s perspective on DDoS threats

Kill 'em All -- DDoS Protection Total Annihilation!

DoS/DDoS Attacks and Protection on VoIP/UC

DDoS Protection Technology White Paper

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Chapter 8 Network Security

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

VALIDATING DDoS THREAT PROTECTION

NAT TCP SIP ALG Support

Denial of Service Attacks

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Exercise 7 Network Forensics

HTTP. Internet Engineering. Fall Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

FortiDDos Size isn t everything

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

DDoS Yesterday, Today and tomorrow. Frank Tse, William Guo Nexusguard

CS5008: Internet Computing

TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15

HTTP Protocol. Bartosz Walter

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

Chapter 8 Security Pt 2

Deployment Guide AX Series with Citrix XenApp 6.5

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

Network Technologies

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST

CSCE 465 Computer & Network Security

Transport Layer Protocols

Check list for web developers

DDoS Attacks & Mitigation

Universal DDoS Mitigation Bypass

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Firewalls and Intrusion Detection

DDoS Protection on the Security Gateway

CIT 380: Securing Computer Systems

How To Understand A Network Attack

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Introducing FortiDDoS. Mar, 2013

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

CISCO IOS NETFLOW AND SECURITY

reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)

Data Communication I

How To Block A Ddos Attack On A Network With A Firewall

Playing with Web Application Firewalls

COSC4377. Chapter 8 roadmap

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture # Apache.

SiteCelerate white paper

Grandstream Networks, Inc. UCM6100 Security Manual

CS 356 Lecture 16 Denial of Service. Spring 2013

DOSarrest External MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES AND / OR ISSUES

Application DDoS Mitigation

PROFESSIONAL SECURITY SYSTEMS

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Solution of Exercise Sheet 5

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

FIREWALL AND NAT Lecture 7a

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

How To Protect A Dns Authority Server From A Flood Attack

First Midterm for ECE374 03/09/12 Solution!!

Networking for Caribbean Development

Survey on DDoS Attack Detection and Prevention in Cloud

Computer Networking LAB 2 HTTP

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network

Intro to Firewalls. Summary

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

CA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series

Network reconnaissance and IDS

Protecting Mobile Devices From TCP Flooding Attacks

Black Box Analysis and Attacks of Nortel VoIP Implementations

Flow processing and the rise of the middle.

No. Time Source Destination Protocol Info HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.

What is a DoS attack?

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

First Line of Defense to Protect Critical Infrastructure

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright Palo Alto Networks

IP Filter/Firewall Setup

Security: Attack and Defense

DDoS Mitigation Techniques

Linux Network Security

Transcription:

DDoS Protecion Total AnnihilationD A

Industry body formed to foster synergy among stakeholders to promote advancement in DDoS defense knowledge. Independent academic R&D division of Nexusguard building next generation DDoS mitigation knowledge and collaborate with defense community.

DDoS Relevance, Attack Categories, Detection & Mitigation Source Host Verification: Authentication Methods TCP SYN Auth HTTP Redirect Auth HTTP Cookie Auth JavaScript Auth CAPTCHA Auth PoC Tool TCP Traffic Model HTTP Traffic Model

Source: NTT Communications, Successfully Combating DDoS Attacks, Aug 2012

Volumetric Semantic Blended

xxx Gbps+ Volume xxx Mbps+ Simple Complexity Sophisticated

xxx Gbps+ Volume Traffic Policing Black- / Whitelisting Proactive Resource Release xxx Mbps+ Simple Complexity Sophisticated

xxx Gbps+ Rate Measurement (SNMP) Baselining (Netflow) Volume Big Data Analysis Protocol Sanity (PCAP) Protocol Behavior (PCAP) Application (SYSLOG) xxx Mbps+ Simple Complexity Sophisticated

c

Traffic Pattern simulation, e.g. Like traffic behind Proxy HTTP Header Simulation Simulate Normal traffic Pattern and Behavior!!!!!

Conn B and User-agent B Attack Traffic Proxy

HTTP header will change during the attack For example, first HTTP request for HTTP Header Accept First Request Second Request Accept: */* Accept: image/gif, image/jpeg, imag,..

TCP option against Detection Empower attack Power

Connection Hold Time SYN SYN ACK ACK Push ACK (HTTP Request e.g. GET, POST) ACK Push ACK Full Control every TCP State!!!!

OLD-FASHIONED GET Flood SYN SYN ACK ACK High CPU and constant no. of conns But Still ALIVE!!! Push ACK (HTTP GET) ACK Fin ACK Conns closed

Kill EM ALL!!!!!! SYN SYN ACK ACK Push ACK (HTTP Request) High Memory, High CPU and no. of conns increasing ------------------------- HTTP 503 Service unavailable ACK Push ACK (HTTP Request) ACK

TCP SYN Auth HTTP Redirect Auth HTTP Cookie Auth JavaScript Auth CAPTCHA Auth

SYN SYN ACK ACK RST SYN SYN ACK ACK

SYN SYN ACK RST SYN SYN ACK ACK

SYN SYN ACK Spoofed Src IP RST (May be from Real host) TCP REST and TCP Out of Seq are SAME!!!!!!

Handling a Real User access: TCP REST TCP out of Seq TCP Flag Total Length TCP Flag Total Length SYN 60 SYN 60 SYN ACK 40 SYN ACK 40 ACK 40 RST 40 RST 40 Total 180 Bytes Total 140 Bytes P.S. TCP SYN Packet size = Header length + Total Length

SYN SYN ACK RST SYN 33% Attack traffic Bypassed Same Spoofed a real Host IP as Src IP

The traditional SYN Flood is 40 bytes, missing TCP Option How to simulate a real SYN traffic: In IP layer: Randomize TTL In TCP layer: Randomize Window size, Correct Option added, e.g. Maximum Segment Size, etc. 48-60 bytes TCP SYN Flood attack is nightmare

GET HTTP 302 redir to /index.html /foo/index.html GET /foo/index.html HTTP 302 redir to /index.html GET /index.html

HTTP / 1.1 302 Found\r\n Location: http: a.c.com\r\n Loop the script, until HTTP / 1.1 200 ok

GET HTTP 302 redir to GET HTTP 302 redir to GET /index.html /index.html /index.html /index.html /index.html

Set-Cookie: AuthCode=d8e; expires=mon, 23-Dec-2019 23:50:00 GMT;., etc If Date and time of Expire is between hour or minutes, it is the our REAUTH threshold!!!!!!!! If you saw this in third HTTP redirect request Set-Cookie:AuthCode=deleted;.bad luck

GET HTTP 302 redir to [X-Header: foo=bar] GET HTTP 302 redir to [X-Header: foo=bar] [X-Header: foo=bar] GET GET /index.html [X-Header: foo=bar] /index.html /index.html [X-Header: foo=bar] /index.html /index.html /index.html

API, AJAX or XHR2 is used to deploy header token Not all browser compatibility those Techniques Existing Mitigation devices can not fully using those Techniques Simulation the Traffic Flow BYPASS it!!!!

GET /index.html JS 7+nine=? ans=16 POST /auth.php HTTP 302 redir to /index.html GET /index.html

JavaScript is client-side-program Find the path http://a.b.com/auth.js, download and analyze it. Challenge to embedded JavaScript in Botnet, guys using: Simulate the traffic flow Client Deployment Model Server Deployment Model Kill Em All is below 1M bytes!!!!!!

Cmd: Attack!!! ATTACK!!! Bot with JS Engine C&C Server Bot with JS Engine Victim Bot with JS Engine..

Cmd: Attack!!! ATTACK!!! Tell me the ANS, plz~ C&C Server Tell me the ANS, plz~ Victim Tell me the ASN, plz~ Server Resolve auth.js e.g. Application Bundle..

GET /index.html POST /auth.php HTTP 302 redir to /index.html GET /index.html

JavaScript is client-side-program Find the path http://a.b.com/auth.bmp, download and analyze it. Challenge to embedded CAPTCHA Engine in Botnet, guys using: Simulate the traffic flow Client Deployment Model Server Deployment Model DEFCON have FXXKING many CATPCHA engine!!!!

3 tries per authentication attempt (in practice more likely to success) True TCP/IP behavior thru use of OS TCP/IP stack Auth cookies persist during subsequent dialogues JavaScript execution using embedded JS engine (lack of complete DOM an obstacle to full emulation)

c

1. Converted to black-and-white for max contrast 2. 3x3 median filter applied for denoising 3. Word segmentation 4. Boundary recognition 5. Pixel difference computed against character map

c

Connection Hold Time Before 1 st Request Connection Idle Timeout After Last Request Number of Connections TCP Connection TCP Connection TCP Connection Connections Interval Connections Interval

c

TCP Connection Number of Requests per Connection HTTP Connection HTTP Connection HTTP Connection HTTP Connection Requests Interval Requests Interval Requests Interval

True TCP/IP behavior (RST, resend, etc.) thru use of true OS TCP/IP stack Believable HTTP headers (User-Agent strings, etc.) Embedded JavaScript engine CAPTCHA solving capability Randomized payload Tunable post-authentication traffic model

44 Page views 44 regular traffic

Against Devices Against Services Measure Attack Traffic Measure Attack Traffic

Post-Auth Auth Bypass Proactive Resource Release Testing results under specific conditions, valid as of Jul 13, 2013

Auth Bypass Post-Auth Proactive Resource Release Testing results under specific conditions, valid as of Jul 13, 2013

tony.miu@nexusguard.com leng@bloodspear.org http://www.bloodspear.org