DDoS Attacks & Mitigation



Similar documents
Evolving Botnet Capabilities - and What This Means for DDoS

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Ethical Hacking and Countermeasures Version 6. Denial of Service

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Survey on DDoS Attack in Cloud Environment

Firewalls and Intrusion Detection

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

FortiDDos Size isn t everything

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Survey on DDoS Attack Detection and Prevention in Cloud

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

TDC s perspective on DDoS threats

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

VALIDATING DDoS THREAT PROTECTION

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

CS5008: Internet Computing

How To Attack A Website With An Asymmetric Attack

DNS amplification attacks

DoS/DDoS Attacks and Protection on VoIP/UC

First Line of Defense

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

How To Stop A Ddos Attack On A Website From Being Successful

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

How to launch and defend against a DDoS

Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

How To Protect A Dns Authority Server From A Flood Attack

CS 356 Lecture 16 Denial of Service. Spring 2013

Analysis of Network Packets. C DAC Bangalore Electronics City

Security Intelligenece: tracking obfuscated and unrecognized attacks Check Point Software Technologies Ltd.

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Application DDoS Mitigation

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

Four Steps to Defeat a DDoS Attack

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

Denial of Service. Tom Chen SMU

Chapter 8 Security Pt 2

DDoS Protection on the Security Gateway

Analysis of a DDoS Attack

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

First Line of Defense

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

co Characterizing and Tracing Packet Floods Using Cisco R

Denial of Service Attacks

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

How To Block A Ddos Attack On A Network With A Firewall

Networking for Caribbean Development

Load Balancing Security Gateways WHITE PAPER

A Layperson s Guide To DoS Attacks

Four Steps to Defeat a DDoS Attack

Stress Testing and Distributed Denial of Service Testing of Network Infrastructures

DDoS Overview and Incident Response Guide. July 2014

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

Denial of Service Attacks, What They are and How to Combat Them

DDoS Protection Technology White Paper

SECURING APACHE : DOS & DDOS ATTACKS - II

DoS: Attack and Defense

How To Understand A Network Attack

Arbor s Solution for ISP

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Complete Protection against Evolving DDoS Threats

STATISTICS ON BOTNET-ASSISTED DDOS ATTACKS IN Q1 2015

Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures

Firewalls & Intrusion Detection

Cloud Security In Your Contingency Plans

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Abstract. Introduction. Section I. What is Denial of Service Attack?

Deployment Guide DDoS Protection for Web and DNS Servers

Four Steps to Defeat a DDoS Attack

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

How To Mitigate A Ddos Attack

AntiDDoS1000 DDoS Protection Systems

Attack and Defense Techniques

Safeguards Against Denial of Service Attacks for IP Phones

Flashback: Internet design goals. Security Part Two: Attacks and Countermeasures. Security Vulnerabilities. Why did they leave it out?

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Denial of Service (DoS)

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

PROFESSIONAL SECURITY SYSTEMS

Transcription:

DDoS Attacks & Mitigation Sang Young Security Consultant ws.young@stshk.com 1

DoS Attack DoS & DDoS an attack render a target unusable by legitimate users DDoS Attack launch the DoS attacks from various source from Internet to a target 2

DDoS Attack Volume Source: Worldwide Infrastructure Security Report, Volume V by Arbot Networks 3

Twitter http://status.twitter.com/post/157191978/ongoing-denial-of-service-attack 4

GoDaddy Happened in Year 2009, 2007 and 2005 Affected the Hosting Servers http://www.zdnet.com/blog/security/godaddy-hit-by-a-ddos-attack/2391 5

Wordpress http://www.pcmag.com/article2/0,2817,2333361,00.asp 6

DNS Root Servers http://www.crn.com/security/197004065 7

Others hit by DDoS attacks BBC Possible unethical competition 2004 - Worldpay 2004 - Authorize 2004 - Authorize-It 2004-2Checkout 2006 - StormPay 2008 - AlertPay An Anti-fraud site: Bobbear.co.uk Norwegian BitTorrent tracker: norbits.net 8

Proof-of-Concept DoS Tools Network Based Targa Land LaTierra Nemesy UDP Flooder FSMax Crazy Pinger Other Application Based SomeTrouble: smtp, icq, net send ihateperl.pl: dns HTTP Based Blast DoSHTTP 9

Nemesy 10

UDP Flood 11

DoSHTTP 12

Crazy Pinger 13

My Collections 14

Botnet Botnet consists of multiple bots (machines) in the Internet They are multiple purposes Concept: A relatively small botnet with around 1,000 bots (computers) combined bandwidth that is higher than the Internet connection of most corporate systems 15

Agobot Phatbot Forbot XtremBot SDBot RBot UrBot UrXot GT-Bots Nuclear Bot PoC Bots H Attacker H H H Victim handlers (master) agents A A A A A A 16

Uses of Botnets Botnet Estimated Size Main Functions Conficker 9 to 15 Million Botnet Resilience BlackEnergy 20 to 200k DDoS Machbot 15 nets, 100,000k each DDoS Cutwail About 1 Million Spam, ID Theft Pushdo Torpig About 1.9 Million Financial and ID Theft Sinowal Hexzone 200k to 500k RansomWare Ghostnet ~1200 in 103 countries Cyber Espionage 17

BlackEnergy Attack vectors HTTP DNS Request Floods ICMP Spoofed IP s SynFloods UDP Floods Random Binary Packet Floods Capabilities 1 to 7 Gbps New BlackEnergy can be created over a few days to a size of 4,000 to 20,000 bots 18

DDoS Attack Taxonomy DDoS Attacks Bandwidth Depletion Resource Depletion Flood Attack Amplification Attack Protocol Exploit Malformed Packet TCP UDP ICMP Smurf Fraggle TCP Syn Push+Ack 19

Amplification Attack Attacker Agent(s) Generate a Packet: src: victim ip dst: amplifier net Victim Amplifier Networks Systems Reply: src: system ip dst: victim ip 20

Reflective DNS Attacks Send a large number of queries to open DNS servers These queries will be spoofed to look like they come from the victim Small queries (60 byte) can generate large UDP packets (512 byte) in response, an amplification factor of 8.5 By combining different response type (A, TXT, SOA), 122 byte query results in response of 4320 bytes. An amplification factor of 73 21

Observed Bots 22

Traditional Countermeasures Threshold Based Attack Detection and Mitigation Deep Packet Inspection & Protocol Validation Protocol Identification Network & Applications Identify and Disable Handler L7 Mitigation / WAF More Bandwidth 23

Mitigation Defense vs Attacker Countermeasure Mitigation Defense Threshold Based Attack Detection and Mitigation Deep Packet Inspection & Protocol Validation L7 Mitigation / WAF More Bandwidth Attacker Countermeasure Low and Slow Hit and Run Encryption Vary Requests More and More Traffic 24

defense Hit and Run Attacks rely on sampling traffic flows take time to react: 15 60 seconds 25

Observed Attack Vectors 26

Trend Everything over IP Everything over HTTP 27

Application Layer Attacks (Layer-7) Low Packet Rate Packet - Bandwidth > Request - Layer 7 > Session - Behavior 28

DDoS and Infrastructure 29

Most Common HTTP Attacks Methods Effects http://<target>/random_pa ge http://<target>/login.php http://<target>/search.php POST action with huge amount of data Large Botnet, low IP rate, high delays Partial Requests Extra I/O from 404 s loggged Raises CPU on web servers Load on Load balancer due to -ve cache hits Loading on I/O to the db server High CPU via script pages Affect RAM Affect loads threads Bypassing DDoS equipment HTTP requests always get through Tie down all available threads 30

Damaging Queries http://target/search.php?=query=e&submit=sear ch&type=all&mode=search Produce most matches and cross-reference queries: e, t, a, o, n, i, r, s, d, h, l, c, u, f, p, m, w, y, b, g, v, k, x, j, q, z th, he, an, in, er, re, es, on, ti, at the, and, hat, ent, ion, for, tio, has, tis you, can, her, was, has, him, his Results: hit both CPU on web and database servers 31

New Mitigation Approach Protocol Validation Inspects the structure of information in packets at application layer HTTP anomaly detection: XYZ is not a valid command in HTTP header Signature/Fingerprint Search for pattern in network packet to determine if an attack exists Vendor specific Open source Adhoc Customization: Particular Custom Application Signatures Require human operational Statistical A.k.a Network Behavioral Analysis Adaptive and predictive models of network behavior Require human operational 32

New Mitigation Approach Reputational a database of good and bad IP address bad IP address includes bots, spammer etc. Honeypot can help to track these IPs Client Validation Determine if a source is a real person or an automated script Real Browser Detection: by sending a JavaScript and determine the response Transactional Inspection and validation of application transactions, e.g. HTTP Request, SIP request Look at the nature of groups of transactions 33

New Mitigation Approach Decryption to inspect the encrypted transactions and protocols decrypt https traffic Zero-Day Requires human operation Requires log consolidation from different network devices 34

Largest Anticipated Threat 35

Questions? Sang Young wsyoung@wsyoung.com 36