How To Understand A Network Attack



Similar documents
Attack and Defense Techniques

Attack and Defense Techniques 2

Denial of Service Attacks

CS 356 Lecture 16 Denial of Service. Spring 2013

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

How to launch and defend against a DDoS

A Very Incomplete Diagram of Network Attacks

CS5008: Internet Computing

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

How To Protect A Dns Authority Server From A Flood Attack

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

CIT 380: Securing Computer Systems

Network and Services Discovery

General Network Security

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Payment Card Industry (PCI) Executive Report. Pukka Software

Security: Attack and Defense

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Survey on DDoS Attack in Cloud Environment

Chapter 8 Security Pt 2

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory

Abstract. Introduction. Section I. What is Denial of Service Attack?

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Firewalls and Intrusion Detection

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Denial of Service. Tom Chen SMU

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Payment Card Industry (PCI) Executive Report 08/04/2014

DoS/DDoS Attacks and Protection on VoIP/UC

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Network Security Fundamentals

Penetration Testing with Kali Linux

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

A S B

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

DDoS attacks in CESNET2

CSCE 465 Computer & Network Security

Survey on DDoS Attack Detection and Prevention in Cloud

Denial Of Service. Types of attacks

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

How do I get to

DDoS Attack Trends and Countermeasures A Information Theoretical Metric Based Approach

Security Technology White Paper

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

About Firewall Protection

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

DDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

SECURING APACHE : DOS & DDOS ATTACKS - I

Learn Ethical Hacking, Become a Pentester

Stop that Big Hack Attack Protecting Your Network from Hackers.

Firewalls, IDS and IPS

Introduction of Intrusion Detection Systems

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

Analysis of Network Packets. C DAC Bangalore Electronics City


Brocade NetIron Denial of Service Prevention

Content Distribution Networks (CDN)

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Application DDoS Mitigation

IxLoad-Attack: Network Security Testing

Vulnerability Assessment and Penetration Testing

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Reducing the Impact of Amplification DDoS Attack

Fuzzy Network Profiling for Intrusion Detection

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

VALIDATING DDoS THREAT PROTECTION

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Networks: IP and TCP. Internet Protocol

Computer forensics

PROFESSIONAL SECURITY SYSTEMS

Firewalls. Pehr Söderman KTH-CSC

TDC s perspective on DDoS threats

Seminar Computer Security

Outline. Outline. Outline

Payment Card Industry (PCI) Executive Report 10/27/2015

Chapter 15. Firewalls, IDS and IPS

Attacks and Defense. Phase 1: Reconnaissance

Surviving DNS DDoS Attacks. Introducing self-protecting servers

co Characterizing and Tracing Packet Floods Using Cisco R

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Transcription:

Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands

Attacks! Many different kind of attacks! Possible classifications (taxonomies):! Attack type (scan, denial of service,...)! Attack target (a service, a network, a user,...)! Attack goal (crash the target, steal information, modify information,...)!...

Attacks Attack sophistication vs. intruder technical knowledge. Simon Hansman, Ray Hunt, A taxonomy of network and computer attacks, Computers&Security Volume 24, Issue 1 2005

Attacks 1e+06 vulnerabilities incidents 100000 10000 1000 100 10 CERT/CC Incidents vs vulnerabilities 1 1986 1988 1990 1992 1994 1996 1998 2000 2002 2004 2006 2008 Sperotto, A., Schaffrath, G.,Sadre, R., Morariu, C., Pras, A., Stiller, B. "An Overview of IP Flow-based Intrusion Detection" In: IEEE Communications Surveys & Tutorials, 12 (3). year

Attacks Akamai Digital attack map (Google & Arbor Networks)

Scans

Port Scans! Scans are information gathering attacks:! Find vulnerable services/hosts! Discover network topology (used IP addresses, )! System fingerprinting!! Can be combined with a real attack, e.g., a buffer overflow (Ping Of Death, 1997)! Tool for scanning: nmap

TCP port scan: regular connection Attacker SYN Target ACK + Easy to implement Slow SYN/ACK RST accept connection deny connection ignore, block

TCP port scan: SYN scan Attacker SYN Target RST SYN/ACK RST accept connection deny connection + Fast Do-it-your-self ignore, block

UDP port scan! UDP is connectionless! Two approaches: 1. Wait for negative answer (ICMP message port unreachable ) 2. Wait for positive answer Example: send DNS query to port 53 and wait for DNS response

Types kazaa imaps 1280 1024 768 Vertical scan block scan smb http smtp ftp 512 Horizontal scan 256 1 1.1.1.1 130.89.1.1 130.89.1.255 130.89.2.1

SSH attacker! SSH attack combines a scanning phase (contact all hosts in the network) and a brute force phase (try login/password combinations in a subset of the hosts)

How to hide! The target system knows your IP address! Slow scan! Distributed scan: multiple, coordinated scanners! Indirect scan: idle scan (1998),...!...

Idle scan Attacker SYN Spoofed IP address ask Target Zombie SYN/ACK! How to ask the zombie?! Fragment ID field in IP header

Idle scan Attacker SYN Spoofed IP address SYN/ACK RST ID=12345 RST ID=12347 SYN/ACK Target Zombie RST ID=12346

Internet Census 2012! Distributed scan (Carna botnet)! Map of the active Internet! ICMP/rDNS/open ports/tcp SYN/fingerprinting

Denial of Service Attacks

Denial-Of-Service (DoS)! Goal: overload or crash the server to make the service unavailable! Types! Brute-force:! Send a lot of data (overload network), a lot of queries (overload server CPU),! Semantic:! Exploit vulnerability (buffer overflow, )! Send heavy requests (triggering complex operations)

DoS against DNS server! Overload DNS server with queries! Problems:! Attacker may be too slow (CPU, network bandwidth,...)! Defense: blocking the attacker's IP address is easy

Distributed DoS (DDoS) Coordinated attack from multiple hosts Attacker 1 Attacker 2 DNS server Attacker 3

DDoS against IRC Server ~375 Million SYN packets in 800s Co-ordinated attack

DDoS against IRC Server 7e+006 6e+006 attacked host other hosts 300000 250000 exported flow records/10s (attacked host) 5e+006 4e+006 3e+006 2e+006 200000 150000 100000 exported flow records/10s (other hosts) 1e+006 50000 0 0 36000 36500 37000 37500 38000 38500 39000 time [s] Attacks can have side effects on your monitoring/defense infrastructure Here: data loss at mirror port and at collector

Booters

On Large Scale: Backscatter Analysis with a Network Telescope (Source: Inferring Internet Denial-of-Service Activity, Moore et al., 2001, 2006)

Backscatter Analysis for DoS attacks In Moore, 2006, a /8 network was monitored ~24.5 DoS attacks per hours Assuming uniformly distributed spoofed source addresses, this would correspond to 24.5 x 2^32 / 2^24 = 6272 attacks/h

Reflection and Amplification attacks

Reflection and Amplification attacks! Several protocols are misused! DNS! NTP! Chargen! SNMP! Hype!! Spamhaus attack 300 Gbps (2013)! NTP attack 400 Gbps (2014)

DDoS against IRC Server Reflection attack against IRC server Mostly NTP

Reflection and Amplification attacks Attacker Request with spoofed source IP address Server response Target! usually as distributed attack: multiple attackers, multiple Servers (DDos)

Reflection and Amplification attacks! Amplification factor: response size / request size! Example: Initial DNS definition: 60 bytes query " 512 bytes answer (8.5x)! EDNS (RFC 2671) allows larger answers! Combining different response types: answers larger than 4000 bytes possible (>60x)! DNSSEC ANY: >100x (outliers)

Reflection and Amplification attacks! Open Resolver Project: tracks open resolver in the Internet! Open resolver: DNS resolver that provides answer for clients outside its administrative domain April 2013 Sept. 2014 http://openresolverproject.org/

Reflection and Amplification attacks! Amplification factor: response size / request size! Example: Chargen! A server listens for UDP datagrams on UDP port 19. When a datagram is received, an answering datagram is sent containing a random number (between 0 and 512) of characters (the data in the received datagram is ignored). (RFC 864, year 1983) CDF 1 0.8 0.6 0.4 0.2 0 0 1500 3000 4500 6000 7500 Packet size [bytes] B8 B9! In practice:! Non RFC compliant implementation! Extra amplification

Reflection and Amplification attacks! Countermeasures and Mitigation:! BCP 38 (Ingress filtering): no spoofed packets allowed to exit a network! BCP 38 would solve spoofing-based attack once for all! Unfortunately, scarce incentives From: Spoofer Project - http://spoofer.cmand.org/

Reflection and Amplification attacks! Countermeasures and Mitigation:! DNS specific:! Response Rate Limiting (authoritative name servers)! EDNS0 cookies (source address authentication)! Response Size Limiting! Chargen?

DNS

Simple DNS Query host query: www.utwente.nl response: 130.89.1.50 (A record) DNS server (UDP port 53)

Recursive DNS Query host www.utwente.nl? response: 130.89.1.50 DNS server X response: 130.89.1.50 www.utwente.nl? DNS server ns1.utwente.nl (authoritative)

DNS tunneling! You sit at the airport! WLAN provided, but any access to a Web server, FTP, P2P, is chargeable! Is there a way to avoid the fee?! Would it be an attack?! You are bypassing the billing/security policy of your ISP! Data exfiltration for cyber-espionage! Listed in 2012 as one of the most dangerous new attack (C&C over DNS tunnels for information theft) https://blogs.sans.org/pen-testing/files/2012/03/rsa-2012-exp-108-skoudis-ullrich.pdf

DNS tunneling: upstream host helloworld.mydomain.nl? DNS server of ISP Client-side component helloworld.mydomain.nl? DNS server mydomain.nl Server-side component

DNS tunneling: upstream! Query can contain up to 252 characters! Character set restricted: not case-sensitive,...! ~5 bit/character (encoding)

DNS tunneling: downstream helloworld.mydomain.nl? host DNS server X response: hi! response: hi! helloworld.mydomain.nl? DNS server mydomain.nl

DNS tunneling: downstream Main limitation:! Response < 512 bytes to prevent fragmentation Server responds with TXT-record:! Character set restricted: 7 bit ASCII! ~6 bit/character (encoding)! As for amplification, EDNS (RFC 2671) allows larger answers Using MX-records and A-records is possible, too, but more complicated (data may be reordered)

Example of DNS Tunneling (Iodine) 1329812676.512747 IP 192.168.1.2.60531 > 192.168.1.1.3128: Flags [S] 1329812676.515310 IP 1.1.1.1.51823 > 2.2.2.2.53: 22911+ [1au] NULL? 0eaba82M-J2hbM->M-nYM-VwjM-GM-MRbM-^M-^PM-\M- UM-HcvM-DtimMeM-`M-KyM-aM-VM-IM-yM-yM-BM-jdilmnuM-iM-bM-ktaM-^XyUwtf.M- BM-^M-o8M-]M-=M-xM-=M-FouZzM-JwaeM-NaM-u 1329812676.524541 IP 192.168.1.1.3128 > 192.168.1.2.60531: Flags [S.] 1329812676.525743 IP 2.2.2.2.53 > 1.1.1.1.51823: 15184 1/0/1 NULL (140)M-N.test.domain.nl. (130) 1329812676.524573 IP 192.168.1.2.60531 > 192.168.1.1.3128: Flags [.] 1329812676.526742 IP 1.1.1.1.51823 > 2.2.2.2.53: 30638+ [1au] NULL? 0ibbb82M-J2hbM->M-nYM-VgjM-GM-MBbM-^M-^PM-\M-TM- XcvM-DtimMeM-`M-KyM-aM-VM-IM-yM-yM-CDYM-eM-X3qWgM-JM-SM-qSM-?M- >M-bYyCU.xpM-_M-VM-`M-HEM-LJM->M-nf6upM-{M- >.test.domain.nl. (126) 1329812676.557242 IP 2.2.2.2.53 > 1.1.1.1.51823: 22911 1/0/1 NULL (144) 1329812676.525189 IP 192.168.1.2.60531 > 192.168.1.1.3128: Flags [P.], (request web page) 1329812676.558096 IP 1.1.1.1.51823 > 2.2.2.2.53: 38365+ [1au] NULL? 0mbbc82M-J2hbM->M-nYM-VhdM-yEM-rdM-?M->M-q5MM- tcvm-dtimm-em-`m-kym-am-vm-im-ym-ym-cdym-em-x3qwmm-jm- SM-CM-CM-DdbM->M-bM-p4.CM-=wM-icOM-x4oM-YM-kM-gM- SiHM-OM-guM-JcPM-<M-=rM-K0M-rf8M-cM-=M-XPgM-@M-HM-RM- \5FM-SM-uM-yM-CM-PM->GM-]M-hiM-?M-wQM-KFM-HM.0M-wM- zm-_um-zm-mwm-rm-c6m-?m-ppwm-trpm-rm-fwyum-\qm- FGtM-NBM-sgM-<huuTNl6NQ1FM-KvSkWM-H9ESaIM-AX.M-OHM- OM-bYM-wM-PM-C3MM-MM-dM-HAM-\3rM-bM-LMM-QfM-^ALM- UM-g18UhM-]CQaM-K6M-lM-mlM-IM-`M-naIDM-NM-cM- >.test.domain.nl. (274)