Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Similar documents
Radware s Attack Mitigation Solution On-line Business Protection

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Radware s Behavioral Server Cracking Protection

SHARE THIS WHITEPAPER

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

DNS amplification attacks

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

CS 356 Lecture 16 Denial of Service. Spring 2013

DefensePro Whitepaper Fighting Cybercrime: Rethinking Application Security By Ron Meyran

Introducing Radware Attack Mitigation System. Presenter: Werner Thalmeier September 2013

DDoS Protection on the Security Gateway

Denial of Service Attacks

DoS/DDoS Attacks and Protection on VoIP/UC

SecurityDAM On-demand, Cloud-based DDoS Mitigation

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Arbor s Solution for ISP

Radware Emergency Response Team. SSDP DDoS Attack Mitigation

How Cisco IT Protects Against Distributed Denial of Service Attacks

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

DOMAIN NAME SECURITY EXTENSIONS

Multi-Layered VoIP Security. A DefensePro White Paper - Avi Chesla, VP Security

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

DDoS Protection Technology White Paper

Application DDoS Mitigation

Automated Mitigation of the Largest and Smartest DDoS Attacks

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

Firewalls and Intrusion Detection

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

TDC s perspective on DDoS threats

Complete Protection against Evolving DDoS Threats

On-Premises DDoS Mitigation for the Enterprise

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

Security F5 SECURITY SOLUTION GUIDE

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

STATE OF DNS AVAILABILITY REPORT

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

FAQ (Frequently Asked Questions)

ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

First Line of Defense

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

VALIDATING DDoS THREAT PROTECTION

AntiDDoS1000 DDoS Protection Systems

DoS: Attack and Defense

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

The F5 Intelligent DNS Scale Reference Architecture.

Detecting peer-to-peer botnets

Cisco RSA Announcement Update

Securing Your Business with DNS Servers That Protect Themselves

Use Domain Name System and IP Version 6

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

FortiDDos Size isn t everything

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

The Domain Name System from a security point of view

Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

Attack and Defense Techniques

SSAC Advisory SAC008 DNS Distributed Denial of Service (DDoS) Attacks

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

INTRODUCTION TO FIREWALL SECURITY

How To Understand A Network Attack

How To Protect Yourself From A Dos/Ddos Attack

How To Stop A Ddos Attack On A Website From Being Successful

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

DDoS Overview and Incident Response Guide. July 2014

Automated Mitigation of the Largest and Smartest DDoS Attacks

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

How To Protect A Dns Authority Server From A Flood Attack

Deployment of Snort IDS in SIP based VoIP environments

Load Balancing Security Gateways WHITE PAPER

High-Performance DNS Services in BIG-IP Version 11

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

Analysis of Network Packets. C DAC Bangalore Electronics City

Comprehensive Filtering. Whitepaper

Transcription:

Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper

Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges of Protecting DNS DDoS Attacks...5 Radware Solution for DNS DDoS Attacks...5 DefensePro Meets the Challenges of DNS DDoS Mitigation Tools...8 Summary - The World s Best Mitigation Tool for DNS DDoS Attacks...9 Smart Network. Smart Business. 2

Introduction DNS is a critical infrastructure of the Internet as every web transaction involves a DNS service provided by the Internet service provider. A successful attack against DNS services that manages to disrupt these services will halt all other Internet-based services. Although carriers and service providers provision various mitigation tools, the current DNS infrastructure is still vulnerable and is subject to an increasing variety of attacks that are becoming ever more sophisticated and difficult to mitigate. Therefore, securing DNS service requires rethinking on perimeter security with dedicated tools to identify and mitigate these new breed of attacks on DNS services. This paper outlines the recent DDoS attacks on DNS services and the challenges of mitigating those attacks. It presents Radware s DDoS DNS attack mitigation solution and its unique differentiators that make it the world best mitigation tool for DNS service attacks. DNS DDoS Attacks are Growing and Evolving DNS is a carrier and service provider critical to the infrastructure as every web transaction involves a DNS query for name-to-ip-address resolution prior to accessing the requested website. Degrading, or even shutting down the DNS service of a service provider, has an immediate impact on Internet-based services, and it can result in eliminating legitimate users from accessing the Internet. Attackers understand that service providers take security measurements to protect their DNS infrastructure and therefore, they generate more sophisticated attacks with increased impact on the service. This section discusses the recent attack techniques deployed by attackers aiming to disrupt the DNS service: DNS Flood Attack - Utilizing multiple sources of compromised computers, called Botnets, the attacker generates a distributed, volumetric denial of service attack that floods the DNS servers. Since DNS service is typically carried over UDP, it is more vulnerable to volumetric attacks. According to the DNS standard, the DNS servers process every request, which results in a DNS servers overload. This behavior allows the attacker to successfully compromise DNS service, utilizing a surprisingly small amount of Botnets. IRC Servers Bot (Infected Host) Bot (Infected Host) DNS Query Misuse of Service Resources BOT Command DNS Query Bot (Infected Host) DNS Query Attacker Bot (Infected Host) DNS Query DNS Server Smart Network. Smart Business. 3

DNS Amplification Attack - A standard DNS request is natively smaller than the DNS reply. In a DNS amplification attack, the attacker carefully selects a DNS query that results in a lengthy reply that is up to 80 times longer than the request. This results in an increased load on the DNS servers, compared to the regular DNS flood attacks. DNS Recursive Attack This is an attack amplification method of DNS flood attacks, where the attacker generates a distributed, volumetric denial of service attack that floods the DNS servers. However, in this attack, the attacker turns on the recursive flag within the DNS query packet. When the recursive flag is turned on, it forces the DNS server to perform the name resolution itself, rather than redirecting the request to another server, and to reply to the sender with the resolution. In a DNS recursive attack, the attacker slightly changes the requested domain name in every DNS query so that the DNS server would not be able to reply with a cached result, forcing the server to lookup for the domain name multiple times. This results in a severe load on the DNS service, until it s not available for legitimate users. 4. Legitimate users cannot receive service from DNS servers 3. Root name servers are overloaded with requests legitimate users root name servers Internet 1. Botnets generate DNS requests with recursive flag on Botnets ISP DNS servers 2. DNS servers send every request to the root name servers and wait for reply Diagram of DNS Recursive Attack Smart Network. Smart Business. 4

Challenges of Protecting DNS DDoS Attacks As described above, DDoS attacks on DNS servers become more complicated to mitigate, and today s attack mitigation tools must be able to meet unique challenges in order to successfully block DNS attacks: Mitigation tools must have deep knowledge of DNS traffic behavior Sophisticated attackers take advantage of the DNS protocol behavior in order to generate more powerful attacks with greater potential to hurt the DNS service, such as the DNS recursive attack. To mitigate such attacks, every single field in the DNS protocol must be carefully analyzed, utilizing a deep knowledge of the DNS protocol, and solid understanding of DNS traffic behavior. Mitigating high rate of DNS packets DNS DDoS attacks involve a large volume and high rate of flood packets. The mitigation device must be able to process a high volume of traffic, usually several million packets per second,in order to block all attack packets, while still providing enough bandwidth to process legitimate DNS traffic. Accurate Mitigation Failure to distinguish between legitimate DNS traffic and attack DNS traffic results in false positives, for example, legitimate users who cannot access any Internet service. The impact of false positives on the Internet service provider is significant, including reputation degradation and loss of revenues. Therefore, today s mitigation tools must be accurate, and provide service to legitimate users even under attack. Provide best quality of experience, even under attack In addition to mitigation accuracy, the mitigation tools are required to continue and provide best quality of experience to legitimate users, even under attack. This requires a very low latency from the mitigation tools and the ability to provide a device that is based on hardware engines and accelerators, rather than a software-only based device. Radware Solution for DNS DDoS Attacks The Radware solution for DDoS DNS attacks is based on its DNS flood attacks protection feature, part of Radware s renowned Behavioral DoS module in its DefensePro product line. The DNS attack mitigation solution can be divided into three phases: the detection phase, creating a real-time signature phase, and the mitigation phase. DNS QPS A records base line MX records base line PTR records base line AAAA records base line Rate Analysis per DNS Query Type TIME Rate analysis per DNS query type Smart Network. Smart Business. 5

Detection Phase During the detection phase, DefensePro monitors all inbound DNS traffic on UDP port 53 and learns the baseline of normal DNS traffic behavior. For each DNS query, it updates the baselines per query type, query rate, and rate invariant as well as its relative share among all DNS queries. The DNS attack mitigation continuously generates a degree-of-attack score, using a fuzzy-logic 1 engine. The fuzzy logic module is a multi-dimension decision engine that detects attacks in real-time, based on evaluation of real-time network data with current baselines. When the degree of attack score exceeds the value that is considered as an attack, the system moves to the mitigation phase. VOIP Mail (SMTP worms, spam outbreak) TEXT records SRV/NAPTR MX records Other records A records AAAA records DNS query distribution analysis Query floods PTR records IPv6 Query floods Recursive query floods Creating Real-Time Signature To successfully mitigate a DDoS DNS attack, DefensePro creates an automatic, real-time signature that blocks the DNS DDoS attack without any human interaction. Using samples of real-time traffic that deviates from the baseline traffic, DefensePro is looking for characteristic parameters of the ongoing anomaly in the suspicious traffic. The following parameter types, as well as others, are analyzed by the automatic signature creation module: Packet checksums Packet size Packet Identification number TTL (Time to Live) Fragment offset Source IP address Destination IP address Ports numbers DNS Qname domain name DNS Query ID query identification number DNS Query count (Qcount) Once the values of these parameters are flagged as abnormal, the system creates a real-time signature based on the suspicious parameters, and it activates a signature optimization mechanism called the closed-feedback loop. The closed-feedback module is responsible for creating the narrowest, but still effective, signature-blocking rule. Each one of the suspicious flagged parameters can include multiple values, detected by the automatic signature generation mechanism. The closed-feedback module knows how to tailor these values through AND/OR logical relationships. The more AND logical relationships are constructed between different values and parameter types, the more accurate and narrow the blocking signature rule is considered to be. In order to create the logical relationship rules between the detected signature values, the closed-feedback module uses the following feedback cases: Positive feedback: The traffic anomaly was reduced as a result of the decided blocking signature rules created by the module, the system continues to use the same action and tailors more attack characteristic parameters (i.e., signature types and values), through as many AND logical relationships as possible. 1 To read more on Radware s Fuzzy Logic engine, download: http://www.radware.com/thank_you_download.aspx?id=5557 Smart Network. Smart Business. 6

Negative feedback: This means that the degree of traffic anomaly was not changed, or was increased. The system stops using the last blocking signature rules and continues to search for more appropriate ones. Attack stopped feedback: If the attack stops, then the system will stop all countermeasures immediately (i.e., remove the signature rule). The real-time signature is applied to suspicious traffic in the next phase. Mitigation Phase During the mitigation phase, DefensePro utilizes the real-time signature to detect suspicious sources of the DNS attack and it performs the following escalation steps to stop the attack: Escalation #1: Signature based Challenge DefensePro challenges DNS A and AAAA queries that match the realtime signature. The purpose of the challenge is to distinguish between legitimate traffic created by legitimate users, and DoS traffic generated by Botnets. Escalation #2: Signature based If after escalation #1, the closed feedback module still reports that the attacks continues, DefensePro performs another escalation, which is to limit the rate of DNS traffic that matches the real-time signature. Escalation #3: Collective Challenge The next escalation step is to challenge all DNS A and AAAA queries traffic, not only from the suspicious sources, but from all users. Again, the purpose of this challenge is to distinguish between legitimate traffic created by legitimate users and DoS traffic generated by Bbotnets. Escalation #4: Collective If the attack continues, the last resort and the last escalation steps is to perform rate limit on all DNS traffic according to the defined maximal query rate. The real-time signatures and the DNS challenges are implemented by the DME hardware accelerator, which is capable of handling multi-million packets per second of attack traffic without affecting legitimate traffic. DNS Challenge and the Selective Discard Mechanism As described above, during the escalation steps, DefensePro challenges the DNS sources to verify that they are legitimate users rather than attackers. The challenge is activated on query types A and AAAA, and it is based on RFC definitions. During the challenge, DefensePro ignores the first packet that it receives from a DNS source. According to the DNS standard, a new identical DNS packet should be retransmitted within three seconds with the same identifier number. To issue challenges and to verify that the DNS source response to the challenges, DefensePro uses a statistical table and function, which is called the Selective Discard Mechanism (SDM). Each entry in the SDM table receives a score for each query reaching the table. When a source answers the challenge correctly, its score increases and then gets listed in the internal DNS authentication table. When a source fails to answer a challenge correctly, its score decreases. To minimize the impact on user experience, while challenge operations are being conducted, the protection module uses an authentication table, which stores for a specified period, the source IP addresses that responded properly to the challenge. Smart Network. Smart Business. 7

To avoid misclassification of proxy devices, either as legitimate or as attacking entities, the SDM reduces source scores with each new query that reaches the module and is not challenged. When the score of a source falls below a certain score, it will be challenged again. A proper response to the challenge will raise the source s score and the next few queries from it will not be challenged. Botnet is identified (suspicious traffic is detected) Attack Detection Real-Time Signature Created Signature Challenge Actions Signature Challenge Actions RFC Compliance Checks DNS Challenge Signature Challenge Behavioural Real-Time Signature Technology RT Signature Scope Protection Challenge/Response & Blocking Challenge/Response DNS Challenge/Response & Action Escalation System Diagram: DefensePro 3 phases of DNS attack mitigation DefensePro Meets the Challenges of DNS DDoS Mitigation Tools As described above, there are several very unique challenges that DNS DDoS mitigation tools must meet in order to efficiently and successfully block attacks. DefensePro is the industry-first DNS DDoS mitigation device that meets all these unique challenges: Mitigation tools must have deep knowledge of DNS traffic behavior DefensePro understands DNS traffic and learns it normal behavior continually, so it immediately identifies abnormal DNS traffic. Moreover, DefensePro analyzes every field in DNS traffic to identify abnormal packets and to create its real-time signatures with high accuracy. Smart Network. Smart Business. 8

Mitigating high rate of DNS packets Utilizing its DoS Mitigation Engine (DME), a network processor-based hardware accelerator, DefensePro can challenge 2M DNS queries per second and to process up to 12 million packets per second of attack traffic. The attack traffic does not affect DefensePro capabilities to handle legitimate traffic and it can handle multi-gigabits of legitimate throughput traffic under attack. Mitigation accuracy With unique DNS challenges and accurate analyzing of DNS traffic behavior, DefensePro provides a very accurate distinction between legitimate DNS traffic and attack DNS traffic results, with minimal false positives. This enables the service provider to continue to serve its legitimate users, even under severe attack. Provide best quality of experience, even under attack DefensePro has a unique architecture that is based on several hardware engines and accelerators that guarantee a minimum latency to all processed traffic, and especially to the legitimate traffic. The DNS challenges that are described above are applied by the real-time signature only to suspected sources of attack traffic. This guarantees a best quality of experience to legitimate Internet users, even under attack. Summary - The World s Best Mitigation Tool for DNS DDoS Attacks DefensePro is the world s best mitigation tool for DNS DDoS attacks, as it provides a unique set of patented tools and challenges to successfully mitigate sophisticated, yet volumetric, DNS DDoS attacks. DefensePro not only blocks the attacks, but also provides the best quality of experience to legitimate users during the attack, thanks to its accurate distinguish between attackers and legitimate users. With its unique detection and mitigation phases and the four escalation steps, DefensePro provides the industryfirst complete solution for blocking DNS DDoS attacks from hurting the DNS critical infrastructure. 2012 Radware, Ltd. All Rights Reserved. Radware and all other Radware product and service names are registered trademarks of Radware in the U.S. and other countries. All other trademarks and names are the property of their respective owners. Smart Network. Smart Business. 9 PRD-DP-DNS-Solution-WP-01-2012/02-US