Stress Testing and Distributed Denial of Service Testing of Network Infrastructures



Similar documents
Extreme Load Test of Hardware-accelerated Adapter against DDoS Attacks

CS 356 Lecture 16 Denial of Service. Spring 2013

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

A Layperson s Guide To DoS Attacks

How To Block A Ddos Attack On A Network With A Firewall

VALIDATING DDoS THREAT PROTECTION

Denial of Service Attacks

Testing of DDoS Protection Solutions

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

Network Protection Against DDoS Attacks

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

SECURING APACHE : DOS & DDOS ATTACKS - I

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Safeguards Against Denial of Service Attacks for IP Phones

4 Delivers over 20,000 SSL connections per second (cps), which

PROFESSIONAL SECURITY SYSTEMS

TDC s perspective on DDoS threats

How To Classify A Dnet Attack

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

co Characterizing and Tracing Packet Floods Using Cisco R

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Complete Protection against Evolving DDoS Threats

DDoS Attack and Its Defense

Distributed Denial of Service Attacks & Defenses

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

How To Protect A Dns Authority Server From A Flood Attack

Huawei Traffic Cleaning Solution

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

DDoS Protection Technology White Paper

Firewall Firewall August, 2003

DoS: Attack and Defense

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Secure Software Programming and Vulnerability Analysis

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

DDoS Attacks & Mitigation

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Denial of Service (DoS) Technical Primer

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.

Eudemon8000E Anti-DDoS SPU

: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Check Point DDoS Protector

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Automated Mitigation of the Largest and Smartest DDoS Attacks

Denial Of Service. Types of attacks

Survey on DDoS Attack in Cloud Environment

Firewalls and Intrusion Detection

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Firewall. User Manual

Distributed Denial of Service

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

A Senior Design Project on Network Security

Abstract. Introduction. Section I. What is Denial of Service Attack?

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

Attack and Defense Techniques

Protecting Mobile Devices From TCP Flooding Attacks

Evaluating IPv6 Firewalls & Verifying Firewall Security Performance

Distributed Denial of Service (DDoS)

Application DDoS Mitigation

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Issues in Information Systems

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

DC++ and DDoS Attacks

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

/ Staminus Communications

Security Issues with Integrated Smart Buildings

CS5008: Internet Computing

Four Steps to Defeat a DDoS Attack

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

- Introduction to PIX/ASA Firewalls -

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Survey on DDoS Attack Detection and Prevention in Cloud

ENSC 427 Communications Network Spring 2015 Group 8 Samuel Chow <spc12 at sfu.ca> Tenzin Sherpa <tserpa at sfu.

Web Application Level Approach against the HTTP Flood Attacks IOSEC HTTP Anti Flood/DoS Security Gateway Module

Mitigating DDoS Attacks at Layer 7

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

First Line of Defense to Protect Critical Infrastructure

IxLoad-Attack: Network Security Testing

Data Sheet. DPtech Anti-DDoS Series. Overview

NFV ISG PoC Proposal VNF Router Performance with DDoS Functionality

Network Threats and Vulnerabilities. Ed Crowley

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Security: Attack and Defense

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

How Cisco IT Protects Against Distributed Denial of Service Attacks

Transcription:

Faculty of Electrical Engineering and Communication Brno University of Technology Technická 12, CZ-616 00 Brno, Czechia http://www.six.feec.vutbr.cz Stress Testing and Distributed Denial of Service Testing of Network Infrastructures Lukáš Malina Converged Systems, SIX Department of Telecommunications, FEEC, BUT http://crypto.utko.feec.vutbr.cz malina@feec.vutbr.cz

Our Research and Development Areas Research and development in cryptology Cryptology Research Group Cryptographic design of new protocols, its implementation and optimization Security and stress testing services

Our Security and Stress Testing Services Capacity, security and performance testing Stress-testing of 10 Gbps network infrastructures and web applications using Spirent Avalanche equipment Vulnerabilities and penetration testing Security evaluation of systems and infrastructures Testing of Distributed Denial of Service (DDoS) attack vulnerabilities

About (D)DoS Denial of Service (DoS) attacks disrupt the ability of the machine to communicate with authorized users. Distributed DoS attacks are cyber attacks based on Denial of Service attacks but the origin of the attack is distributed among more sources.

About DDoS Motivation of DDoS attackers: Harm companies. Blackmailing. As a form of protest. Some DDoS Atacks (CZ 2013): February 2013: an attack to viry.cz (TCP SYN Flood Attack from ca. 500 IP addresses on Apache Server) March 2013: massive attacks to several Czech news servers, bank servers and mobile operator servers(tcp SYN Flood attacks, thousands millions packets/sec)

Types of Attacks (D)DoS Flooding attacks Exhaust communications/memory/computing capacity of the target. Exploit weaknesses in protocols. For example: TCP-SYN flood, UDP flood, reflector attack... Logical attacks Cause a crash of SW/OS. Attacks on the logical weakness in SW programs/os. For example: Ping of death, Land attack... Other definitions: Volumetric and semantic attacks

Recent Worldwide Trends in DDoS Increase of DDoS attacks from Asian countries. Increase of DDoS attacks that are more stealthy and slower. Size of many DDoS attacks exceeds over 100 Gbps. Reflected amplification attacks become more popular. Source> Prolexic Technologies, http://www.prolexic.com

DDoS Defense / Mitigation Techniques Robust and secure network infrastructure. Employ firewalls, IDS systems, honeypots, redundant lines and servers. The protection by blacklisting and whitelisting. Move the legitimate users to the backup line, and put them to the "white list". Suspicious IP addresses insert on the "black list". Method of Defense attack. Increase the number of packets from legitimate users.

Stress Testing with DDoS of Network Devices Equipment: a stress tester/traffic and DDoS attacks emulator. Benefits: Detection of device limits and weaknesses. Detection of network bottlenecks. Get feedback and optimal configuration. Preparation of emergency and backup scenarios in the event of a real DDoS attack.

General Test Scenario Stress tester: Spirent Avalanche 3100B: Generating traffic to 40 Gb/s. Emulation of network clients and servers. L4-L7 Layers ISO-OSI. 15 DDoS attacks. Attack designer-custom definitions and design of attacks.

Test Results Visualization - Sample Test of an Apache web server by using the Avalanche 3100B TestCenter:

Example of Stress Test with the DDoS Attack Device tested: Firewall CISCO ASA5510 (1.6 GH, 1024 MB RAM bandwidth up to 300 Mb/s). DDoS attack chosen: TCP-SYN flood attack. Two testing scenarios: Sending HTTP requests and responses from/to the emulated Web server from/to the emulated clients without the DDoS attack. Linear amplification of DDoS attack until the congestion of the Web server (number of DDoS packets per second 0-4000).

Test Topology Test topology> How it look in practice> Control PC 2x gigabit Ethernet

Test Results Stress Test TCP connection test (ASA 5510 provides max. 50000 connections/s): Generated Measured

Test Results DDoS Test The percentage of successful HTTP transactions during the TCP-SYN flood attack:

Test Results DDoS Test Memory and CPU load on the ASA5510 Firewall during the TCP-SYN flood attack:

Conclusion DDoS protection and prevention: Use active and passive security network devices, the backup lines. Test network devices and infrastructures. Create the crisis scenario. Benefits of stress and secure testing: Recognition of the device behavior during the DDoS attacks. Determine the limits of devices tested. Detection the bottleneck of the network infrastructure. Get the feedback.

Contacts Thank you for your attention! About author: Ing. Lukáš Malina malina@feec.vutbr.cz +420 541 146 963 Our webs: SIX: http://www.six.feec.vutbr.cz/ Cryptology Research Group: http://crypto.utko.feec.vutbr.cz/