How To Attack A Website With An Asymmetric Attack



Similar documents
The F5 DDoS Protection Reference Architecture

CS 356 Lecture 16 Denial of Service. Spring 2013

Protect Your Infrastructure from Multi-Layer DDoS Attacks

The F5 DDoS Protection Reference Architecture

Denial of Service Attacks

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

CS5008: Internet Computing

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

TDC s perspective on DDoS threats

DDoS Attacks & Mitigation

DDoS Overview and Incident Response Guide. July 2014

Load Balancing Security Gateways WHITE PAPER

CYBERTRON NETWORK SOLUTIONS

Web Application Level Approach against the HTTP Flood Attacks IOSEC HTTP Anti Flood/DoS Security Gateway Module

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Seminar Computer Security

The F5 DDoS Playbook: Ten Steps for Combating DDoS in Real Time

Description: Objective: Attending students will learn:

Acquia Cloud Edge Protect Powered by CloudFlare

Four Steps to Defeat a DDoS Attack

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

Mitigating DDoS Attacks with F5 Technology

Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

BlackRidge Technology Transport Access Control: Overview

Attack and Defense Techniques

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

CloudFlare advanced DDoS protection

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

Network Security Fundamentals

Four Steps to Defeat a DDoS Attack

WhitePaper. Mitigation and Detection with FortiDDoS Fortinet. Introduction

Chapter 8 Security Pt 2

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

DDoS Protection on the Security Gateway

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

How To Understand A Network Attack

DoS/DDoS Attacks and Protection on VoIP/UC

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

SecurityDAM On-demand, Cloud-based DDoS Mitigation

VALIDATING DDoS THREAT PROTECTION

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

Application centric Datacenter Management. Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014

General Network Security

Introduction about DDoS. Security Functional Requirements

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

A Network Administrator s Guide to Web App Security

Denial of Service Attacks, What They are and How to Combat Them

Malicious Network Traffic Analysis

How To Stop A Ddos Attack On A Website From Being Successful

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015

How To Protect Yourself From A Dos/Ddos Attack

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

ADC Survey GLOBAL FINDINGS

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

SECURING APACHE : DOS & DDOS ATTACKS - I

Four Steps to Defeat a DDoS Attack

Networking for Caribbean Development

A Layperson s Guide To DoS Attacks

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Keyword: Cloud computing, service model, deployment model, network layer security.

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

DDoS Protection Technology White Paper

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

Application Security Best Practices. Wally LEE Principal Consultant

Application DDoS Mitigation

Cheap and efficient anti-ddos solution

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Datacenter Transformation

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Transcription:

DEFENDING AGAINST LOW-BANDWIDTH, ASYMMETRIC DENIAL-OF-SERVICE ATTACKS David W. Holmes (@dholmesf5) F5 Networks Session ID: HT-R02 Session Classification: Intermediate

AGENDA Introduction Why does this matter? General Methods Asymmetric Taxonomy Network Session Application Countermeasures Strategic Defenses Mitigation Architecture Conclusion In the last 18 months, 100% of customer DDoS engagements I ve been involved with have had an asymmetric component. Security Solution Architect, F5 Networks

Take advantage of the enemy's un-readiness, make your way by unexpected routes, and attack unguarded spots. --Sun Tzu

Why is it Asymmetric? Asymmetry in Resources Attacker Defender

Why is this Important? Famed US Patriot Hacker @Th3J35t3r (The Jester) Selling the laptop that he used to bring down WikiLeaks and many targets with asymmetric Attacks A single agent, with a single laptop See paper written about the Jester The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare

Why is this Important? Case Study: Commander X Attacked Santa Cruz County webservers From a Starbucks just a few blocks away Arrested when he returned to same Starbucks Jumped bail, tried to hike to Canada Woken up by bear eating his laptop Eventually made it across border, where he now resides as a fugitive Source: Ars Technica full story links.f5.com/14yny11

Asymmetric Attacks vs. Hacking DENY SERVICE Make site unavailable ACTION IN REAL-TIME Hacking may go on for months STEALTH Asymmetric attacks avoid auto-detection

Masking Source IP Attacker Low-bandwidth attacks can go through TOR network. Can proxy via malware infection New: Rent cloud resources using stolen credit card numbers

Asymmetric Taxonomy

Layer 4 Asymmetric Network Attacks Goal: Consume Connection Table TCP SYN Flood TCP Zero Window

Normal TCP Setup 3-way handshake establishes connection Flow table Flow table entry created and inserted on receipt of SYN packet Connection Established

SYN-Flood Consume Session Table SYNs overflow flow table on server Flow table Flow table entry created and inserted on receipt of SYN packet Overflow! Denial of Service

Countermeasure SYN-Cookies Original SYN transformed into Cookie, sent back to client with SYN-ACK Flow table Flow table entry created and inserted on receipt of ACK packet Connection Established

Layer 4 Asymmetric Network Attacks Countermeasures TCP SYN Flood TCP Zero Window

Session Table Attacks Goal: Consume Session Table DNS NXDOMAIN Flood SSL Renegotiation

DNS NXDOMAIN Attack Querying Random Hostnames Querying for randomly-generated non-existent hostnames Causes enormous work on DNS resolver Blows out DNS caches Easy to generate single packets Easy to spoof source address UDP Asymmetric Low-Bandwidth

SSL Renegotiation DoS RSA public encrypt = 1/10 cost of decrypt

Session Table Attacks SOLUTIONS DNS NXDOMAIN Flood SSL Renegotiation

Layer 7+ Application Attacks Goal: Attack Application Tier SlowPOST HTTP GET Flood

Application Reconnaissance Goal of the asymmetric warrior Obtain list of site URIs Sort by time-to-complete (CPU cost) Sort list by megabytes (Bandwidth) Spiders for rent on Internet that will do this Though they are often known by security community Can be done with simple wget script # wget r wait=1 -nv https://the.target.com

Network Reconn + HTTP Pipelining GET /download/doc.pdf?121234234fgsefasdfl11 HTTP/1.1\r\n Host: www.xxxxyyyyzzzz.com\r\n Randomized Query Parameters User-Agent: Mozilla/4.0\r\n Avoid Cache Defenses Connection: keep-alive\r\n GET /download/doc.pdf? qxs5udkldd7dng9ub HTTP/1.1\r\n Host: www.xxxxyyyyzzzz.com\r\n User-Agent: Mozilla/4.0\r\n Connection: keep-alive\r\n GET /download/doc.pdf?dlggun1nemfm5eid76 HTTP/1.1\r\n Host: www.xxxxyyyyzzzz.com\r\n User-Agent: Mozilla/4.0\r\n Connection: keep-alive\r\n GET /download/doc.pdf? 6ndfTygZPImXsNW22a HTTP/1.1\r\n Host: www.xxxxyyyyzzzz.com\r\n User-Agent: Mozilla/4.0\r\n Connection: keep-alive\r\n

Countermeasures

What Doesn t Work? Defensive Technology Protection Profile Notes Conventional Firewall Weak At least you can block IPs Content Delivery Network Anti-DDoS Scrubbers Service Provider Anti-DDoS IDS/IPS Moderate Weak Weak Asymmetric attackers know to evade. No SSL. Not right use case. Moderate A good asymmetric attack will not set off IDS.

Countermeasure Table Attack Countermeasure Locate Defense SYN-Flood SYN-Cookies Firewall Zero-Length TCP Window Signature or Full Proxy Firewall DNS NXDOMAIN Authoritative Resolver DMZ SSL Renegotiation Cryptographic Offload ADC HashDos Signature or Patch ADC or Server Slowloris / Slow POST Full Proxy ADC, WAF Pipelining Disallow pipelining Apache Killer Signature or Patch ADC or Server ReDos??

Use Case - Mitigate Network Recon IP reputation- Identify and allow or block IP addresses with malicious activity IP reputation db? Scanners Internally infected devices and servers

Hardened Hot-Site with Login-Wall Temporarily reduce Layer 7 attack surface Visibility and Control Data Center Activated during DDoS Attack No Unauthenticated Requests No HTTP Only HTTPS No Search Feature No Store Locator Real users maintain most of the normal site functionality during attack

Other L7 Options If you can t extend your perimeter to only known users CAPTCHA JavaScript Redirect But what about these guys?

Multi-tier DDoS Mitigation Architecture +IP reputation db TIER 1 TIER 2 ISPa ISPb SSL Inspection Multiple ISP Strategy DoSa as Cloud-based Volumetric DDoS Service Network HSM SSL Re-encryption

On Your Own with Asymmetric DDoS Plan Determine your risk profile Talk to your marketing people, they know site metrics! Spider your own site You can start with wget, use a script to parse the data. Think Asymmetric! Execute Develop a Asymmetric Attack DoS Playbook Practice it! Need a set of TURING tests that you can enable CAPTCHA Authentication Javascript Redirects

Thank you! David Holmes F5 Networks @dholmesf5 d.holmes@f5.com http://links.f5.com/1aojbrh