1000 days of udp amplification ddos attacks
play

1000 days of UDP amplification DDoS attacks Daniel R. Thomas , - PowerPoint PPT Presentation

1000 days of UDP amplification DDoS attacks Daniel R. Thomas , Richard Clayton, Alastair R. Beresford Firstname.Lastname@cl.cam.ac.uk Daniel: 5017 A1EC 0B29 08E3 CF64 7CCD 5514 35D5 D749 33D9 Richard: 899A 94CE BFCE CCE2 5744 5ACE 3BBC CF52


  1. 1000 days of UDP amplification DDoS attacks Daniel R. Thomas , Richard Clayton, Alastair R. Beresford Firstname.Lastname@cl.cam.ac.uk Daniel: 5017 A1EC 0B29 08E3 CF64 7CCD 5514 35D5 D749 33D9 Richard: 899A 94CE BFCE CCE2 5744 5ACE 3BBC CF52 A8B9 ECFB Alastair: 9217 482D D647 8641 44BA 10D8 83F4 9FBF 1144 D9B3

  2. UDP scanning Refmector 8.8.8.8 big.gov IN TXT big.gov IN TXT " src: 192.168.25.4 Extremely long dst: 8.8.8.8 response.............. (2) (1) ........................... ........................... Attacker .........................." 192.168.25.4 src: 8.8.8.8 dst: 192.168.25.4 2

  3. UDP refmectjon DDoS atuacks big.gov IN TXT " Refmector Extremely long response.............. 8.8.8.8 ........................... big.gov IN TXT ........................... .........................." src: src: 8.8.8.8 dst: 8.8.8.8 dst: 172.16.6.2 Victim Attacker 172.16.6.2 192.168.25.4 3

  4. We run lots of UDP honeypots ● Median 65 nodes since 2014 ● Hopscotch emulates abused protocols – QOTD, CHARGEN, DNS, NTP, SSDP, SQLMon, Portmap, mDNS, LDAP ● Snifger records all resultjng UDP traffjc ● (try to) Only reply to black hat scanners 4

  5. Estjmatjng total atuacks using capture-recapture B=200 A=160 80 80 Estimated population: 400 ± 62 5

  6. 100000 Estimated number of attacks per day (log) CHARGEN DNS NTP SSDP 10000 1000 100 10 2014-07 2014-10 2015-01 2015-04 2015-07 2015-10 2016-01 2016-04 2016-07 2016-10 2017-01 2017-04 2017-07 6

  7. 1 90 Proportion of all attacks that we observe 80 0.8 70 60 0.6 50 40 0.4 30 20 CHARGEN 0.2 DNS 10 NTP SSDP 0 0 2 2 2 2 2 2 2 2 2 2 2 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 4 4 5 5 5 5 6 6 6 6 7 7 7 - - - - - - - - - - - - - 0 1 0 0 0 1 0 0 0 1 0 0 0 7 0 1 4 7 0 1 4 7 0 1 4 7 7

  8. 1 90 80 Number of honeypots in operation 0.8 70 60 0.6 50 40 0.4 30 20 0.2 10 # A+B # A 0 0 2 2 2 2 2 2 2 2 2 2 2 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 4 4 5 5 5 5 6 6 6 6 7 7 7 - - - - - - - - - - - - - 0 1 0 0 0 1 0 0 0 1 0 0 0 7 0 1 4 7 0 1 4 7 0 1 4 7 8

  9. 1 90 Proportion of all attacks that we observe 80 Number of honeypots in operation 0.8 70 60 0.6 50 40 0.4 30 # A+B # A 20 CHARGEN 0.2 DNS 10 NTP SSDP 0 0 2 2 2 2 2 2 2 2 2 2 2 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 4 4 5 5 5 5 6 6 6 6 7 7 7 - - - - - - - - - - - - - 0 1 0 0 0 1 0 0 0 1 0 0 0 7 0 1 4 7 0 1 4 7 0 1 4 7 9

  10. NTP 1 Frequency of attacks (millions) 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 60 120 Duration of attack (minutes) 10

  11. NTP P(attack ends in <5min | duration) 0.6 0.5 0.4 0.3 0.2 0.1 0 60 120 Duration of attack (minutes) 11

  12. Vdos coverage NTP 1400 Seen Missing Number of attacks 1200 1000 800 600 400 200 0 2015-09 2015-11 2016-01 2016-03 2016-05 2016-07 2016-09 12

  13. Vdos coverage SSDP 900 Seen 800 Missing Number of attacks 700 600 500 400 300 200 100 0 2 2 2 2 2 2 2 0 0 0 0 0 0 0 1 1 1 1 1 1 1 5 5 6 6 6 6 6 - - - - - - - 0 1 0 0 0 0 0 9 1 3 7 1 5 9 13

  14. This was ethical ● We reduce harm by absorbing atuack traffjc ● We don’t reply to white hat scanners (no tjmewastjng) ● We used leaked data for validatjon, this was necessary and did not increase harm. ● We have a paper under submission on the ethics of using leaked data for research. 14

  15. Running a honeypot network is cheap (but we do it for you) ● Median of 65 nodes. ● 200GB/month inbound per node. ● Hostjng costs of $170/month (+stafg costs) ● Need 10 to 100 sensors depending on protocol. ● Our collectjon is ongoing and you can use our data. You can also contribute. 15

  16. This is a solvable problem ● BCP38/SAVE ● Follow the money ● Enforce the law ● Warn customers it is illegal 16

  17. Ongoing work ● Selectjve reply (like Krupp et al. 2016) ● More cross validatjon ● Estjmate atuack volume ● Collaboratjon – What do you want to do with this data? – You can run our code. – Do you have ground truth for atuack volumes? 17

  18. Data is available through the Cambridge Cybercrime Centre https://cambridgecybercrime.uk/ Daniel R. Thomas Richard Clayton Alastair R. Beresford Firstname.Lastname@cl.cam.ac.uk Daniel: 5017 A1EC 0B29 08E3 CF64 7CCD 5514 35D5 D749 33D9 Richard: 899A 94CE BFCE CCE2 5744 5ACE 3BBC CF52 A8B9 ECFB Alastair: 9217 482D D647 8641 44BA 10D8 83F4 9FBF 1144 D9B3

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend