(Distributed) Denial-of-Service. in theory and in practice

Similar documents
DNSSEC: what every sysadmin should know to keep things working

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC

Cloudflare Advanced DDoS Protection

Chapter 7. Denial of Service Attacks

Computer Security: Principles and Practice

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz

Denial of Service (DoS)

Threat Pragmatics. Target 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

CSE Computer Security (Fall 2006)

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

The Internet is not always a friendly place In fact, hosts on the Internet are under constant attack How to deal with this is a large topic

COMPUTER NETWORK SECURITY

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004

CSE 565 Computer Security Fall 2018

Configuring attack detection and prevention 1

UDP-based Amplification Attacks and its Mitigations

Configuring attack detection and prevention 1

DNS Security. Ch 1: The Importance of DNS Security. Updated

ELEC5616 COMPUTER & NETWORK SECURITY

Network Security. Evil ICMP, Careless TCP & Boring Security Analyses. Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, October 4th, 2018

DNS Authentication-as-a-Service Preventing Amplification Attacks

Dan Boneh, John Mitchell, Dawn Song. Denial of Service

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

Imma Chargin Mah Lazer

DENIAL OF SERVICE ATTACKS

DDoS Testing with XM-2G. Step by Step Guide

Technical White Paper June 2016

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

Guide to DDoS Attacks November 2017

Chapter 8 roadmap. Network Security

NISCC Technical Note 06/02: Response to Distributed Denial of Service (DDoS) Attacks

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Introduction to Network. Topics

Denial of Service. Eduardo Cardoso Abreu - Federico Matteo Bencic - Pavel Alexeenko -

Introduction to DDoS Attacks

Insight Guide into Securing your Connectivity

Denial of Service (DoS) attacks and countermeasures

ch02 True/False Indicate whether the statement is true or false.

Memcached amplification: lessons learned. Artyom Gavrichenkov

Network Security. Network Vulnerabilities

Resources and Credits. Definition. Symptoms. Denial of Service 3/3/2010 COMP Information on Denial of Service attacks can

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

COSC 301 Network Management

HP High-End Firewalls

Prevent DoS using IP source address spoofing

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

Denial of Service Protection Standardize Defense or Loose the War

DDoS Beasts and How to Fight Them. Artyom Gavrichenkov

Different Layers Lecture 20

Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER

network security s642 computer security adam everspaugh

Memcached amplification: lessons learned. Artyom Gavrichenkov

Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One)

DDoS PREVENTION TECHNIQUE

Worldwide Detection of Denial of Service (DoS) Attacks

OpenINTEL an infrastructure for long-term, large-scale and high-performance active DNS measurements. Design and Analysis of Communication Systems

DDoS Mitigation & Case Study Ministry of Finance

HP High-End Firewalls

DDoS on DNS: past, present and inevitable. Töma Gavrichenkov

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

August 14th, 2018 PRESENTED BY:

DDoS and Traceback 1

Denial of Service, Traceback and Anonymity

Check Point DDoS Protector Simple and Easy Mitigation

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

INTRODUCTION ON D-DOS. Presentation by RAJKUMAR PATOLIYA

DDoS attack patterns across the APJ cloud market. Samuel Chen CCIE#9607 Enterprise Security Architect, Manager - APJ

RIPE Network Coordination Centre. K-root and DNSSEC. Wolfgang Nagele RIPE NCC.

CSE Computer Security

Denial of Service. EJ Jung 11/08/10

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Internet-Wide Port Scanners Some history behind the development of high performance port scanners. Things to consider, and necessary preparations

Understanding the Internet

Attack Prevention Technology White Paper

TCP /IP Fundamentals Mr. Cantu

CS244a: An Introduction to Computer Networks

Denial of Service and Distributed Denial of Service Attacks

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

DOMAIN NAME SECURITY EXTENSIONS

H3C SecPath Series High-End Firewalls

ENEE 457: Computer Systems Security 11/07/16. Lecture 18 Computer Networking Basics

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Tadayoshi Kohno

DDoS: Coordinated Attacks Analysis

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

Withstanding the Infinite: DDoS Defense in the Terabit Era

Distributed Denial of Service (DDoS)

Ping of death Land attack Teardrop Syn flood Smurf attack. DOS Attack Methods

Cybersecurity Threat Mitigation using SDN

Transport Layer Overview

Transcription:

(Distributed) Denial-of-Service in theory and in practice

About SURFnet National Research and Education Network (NREN) Founded in 1986, incorporated 1988 > 11000km dark-fibre network Shared ICT innovation centre ~200 connected institutions over 1 million end users

Who am I? M.Sc. in Computer Science from the UT Worked in security past 15 years Ph.D. student (part-time) in the DACS group Love scuba diving ;-)

In the news

The scale of DDoS attacks source: http://www.digitalattackmap.com/

The scale of DDoS attacks Primary effect: service disruption for the victim e.g. ebanking services unavailable Secondary effect: disruption for dependent organisations e.g. IDEAL or credit card transaction processing not available means missed e-commerce transactions Tertiary effect: service degradation for carriers ISPs, Internet Exchanges,

Definition of Denial-of-Service Goal: disrupt a service to point of starvation Two types: Attacks that flood services Attacks that crash services Means: Resource starvation (CPU, disk, network, ) image source: toronto.ctvnews.ca Disruption of configuration (e.g. routing) Disruption of state (e.g. TCP connections) Disruption of physical components (cutting the cable)

Common theme To perform a successful attack, you need to have more resources than the other guy Either a bigger gun e.g. more bandwidth Or more guns e.g. access to a botnet with thousands of machines this is called distributed denial-of-service

Two network-based approaches Network-based denial-of-service can be done two ways: By flooding the application e.g. TCP SYN flood By flooding the pipe to the application e.g. reflection/amplification attacks DNS, SNMP, chargen amplification Smurf attack (ping flooding)

TCP SYN flood (1) Client Server SYN SYN/ACK ACK

TCP SYN flood (2) Client Attacker Server SYN SYN

Reflection attack Attacker Victim spoofed sender IP (victim s IP) Reflectors

Reflection and amplification Reflection attacks leverage connectionless protocols (e.g. based on UDP) DNS SNMP Chargen Reflection is more effective when amplification is also achieved Send a small request -> get a big response

Amplification attack Attacker Victim spoofed sender IP (victim s IP) Amplifiers

Example: DNS amplification $ tcpdump -n -v -i en0 host xxxx... 11:00:19.411981 IP (... proto UDP (17), length 68) yyyy.55023 > xxxx.53: 36075+ [1au] MX? comcast.net.... 11:00:19.430637 IP (... proto UDP (17), length 1500) xxxx.53 > yyyy.55023: 36075$ 3/6/29 comcast.net. MX... 11:00:19.430640 IP (... length 1500) xxxx > yyyy: udp 11:00:19.430641 IP (... length 297) xxxx > yyyy: udp Send: 68 bytes, recv: 3297 bytes, amp. 48.5x!

Interlude: DNSSEC in 1 slide DNS Security Extensions (DNSSEC) Development started in 90s, large scale roll-out since Kaminsky vulnerability in 2008 Goal: add authenticity and integrity to the DNS Solution: add digital signatures to DNS Problem: makes DNS responses much bigger To quote a critic (Daniel Bernstein): DNSSEC is a remote-controlled double barreled shotgun, the worst DDoS amplifier on the Internet

Research results percentage of domains 30% 25% 20% 15% 10% without DNSSEC combined.com.net.org with DNSSEC.uk.se.nl theoretical maximum amplification of regular DNS 5% 0% 0 10 20 30 40 50 60 70 80 Amplification factor [bin=0.1]

Blast from the past: chargen Recently, we have seen a revival of a positively ancient vector for DDoS attacks: chargen To quote RFC 864 (from May 1983): UDP Based Character Generator Service Another character generator service is defined as a datagram based application on UDP. A server listens for UDP datagrams on UDP port 19. When a datagram is received, an answering datagram is sent containing a random number (between 0 and 512) of characters (the data in the received datagram is ignored).

The perfect drive-by malware! Step 1: enable a default Windows component

The perfect drive-by malware! Step 2: start the chargen service

The perfect drive-by malware! Step 3: ET phone home My IP address is 192.87

Holy face palm #FAIL

Man man man

Case study In May 2012 we saw a large increase in the number of queries to SURFnet s infrastructure 3 out of 4 name servers getting large numbers of ANY queries for gigaport.nl ( DNSSEC signed!) Not to the server in Switzerland (neutral?) (we still don't know why, 4 years later!)

Quite visible in our statistics Attempt #1, attack not very effective Tweak some bits in the DNS query, and boom!

Profiling the attack Queries use EDNS0 With a very exotic maximum response size of 9000 bytes And we are not the only ones being abused... 3 name servers of SURFnet customers Also in the UK and across the globe Largest common denominators: queries for DNSSEC-signed zones all with EDNS0, buffer size 9000, DNSSEC OK = 0 (!) fixed query ID, 25 subsequent queries, spoofed sender IP Takeaway: we can filter this traffic!

But where is it coming from? IP packets contain a time-to-live field Maximum value is 255, is lowered on every hop (or every second) If you know the starting value: good measure for distance All query packets in the attack had a TTL 250 That almost certainly means they set the initial value to 255, so the packets traversed at most 6 hops That is very close in network terms E.g. route from ns1.surfnet.nl to www.xs4all.nl has 6 hops

Let s look at AMS-IX graphs

Let s drop a peering on AMS-IX Bingo :-)

There s another twist to the story We see this attack being used against our customers One of our customers appeared in a list of spoofed IP addresses for this particular attack And was the victim of a number of DDoS attacks The timing of the attacks was rather suggestive... Always during school hours! Let s have a look at what the school found

What if The external NAT IP address is changed Will the attack follow? We look at the time lines Comparing attack times against class schedule We ask teachers about suspicious behaviour Are there signs that the culprit is among the students? We use Policy-Based Routing (PBR) Giving a suspected class a different external IP address with thanks to Graafschap College!

Ladies & gentlemen: we got him! Time to have a sit-down with someone CENSORED

Booters

How do you stop a DDoS? Firewall Usually not a good solution The traffic is already on your network; does not help against pipe flooding Partially effective against things like SYN flooding (rate limiting) Upstream on the network (SURFnet!) Use a washing machine to filter traffic (more in part 2 of the lecture) Block or rate limit attack traffic on core routers Using a DDoS Protection Service (commercial)

Prevention DDoS research SURFnet works with a number of research groups to analyse traffic, to better separate attacks from real traffic Show that we take this seriously! Collaborate with THTC, NCSC and public prosecution service ( OM ) to collect relevant evidence Chase down attackers in our own network

Research at DACS Detection of attacks, so we can better filter them Improving DNSSEC so it s not such a bad amplifier Learn how Booters work, and what their infrastructure is, so we can stop them Crawl the Internet for Booter websites to create blacklists Study and improve DDoS Protection Services

Thank you for your attention! Questions? F nl.linkedin.com/in/rolandvanrijswijk L @reseauxsansfil roland.vanrijswijk@surfnet.nl r.m.vanrijswijk@utwente.nl