lehrstuhl f r systemsicherheit
play

Lehrstuhl fr Systemsicherheit Amplification DDoS Attacks Marc Khrer - PowerPoint PPT Presentation

Lehrstuhl fr Systemsicherheit Amplification DDoS Attacks Marc Khrer SPRING 9 Bochum, 31. Juli 2014 Outline Background UDP-based Amplification TCP-based Amplification Comparison UDP- / TCP-based Amplification 2 AMPLIFICATION


  1. Lehrstuhl für Systemsicherheit Amplification DDoS Attacks Marc Kührer SPRING 9 Bochum, 31. Juli 2014

  2. Outline • Background • UDP-based Amplification • TCP-based Amplification • Comparison UDP- / TCP-based Amplification 2 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  3. Background Publications [1] Christian Rossow . "Amplification Hell: Revisiting Network Protocols for DDoS Abuse". 2014 Network and Distributed System Security Symposium , NDSS 2014, San Diego, CA, USA. [2] Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz . "Exit from Hell? Reducing the Impact of Amplification DDoS Attacks". 23rd USENIX Security Symposium , USENIX Sec '14, San Diego, CA, USA. [3] Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz . "Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks". 8th USENIX Workshop on Offensive Technologies , WOOT '14, San Diego, CA, USA. 3 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  4. Background Amplification Attack Attacker Amplifier Victim 4 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  5. Background Scanning in IPv4 • Internet-wide scans (4.294.967.296 IP addresses) • No aggressive scanning – distributed scans over time • Linear feedback shift register to compute order of IP addresses • Reverse DNS record + web server for project information • Explanation how to opt-out from repeated scans 5 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  6. Outline • Background • UDP-based Amplification • TCP-based Amplification • Comparison UDP- / TCP-based Amplification 6 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  7. UDP-based Amplification Vulnerable Protocols • 14 UDP-based protocols vulnerable to amplification [1] • Highest amplification found for the NTP monlist feature: 4,670x • Selected the five most severe protocols: DNS, NetBIOS, NTP, SNMP, and SSDP • Performed scans to enumerate hosts vulnerable to amplification 7 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  8. UDP-based Amplification Amplifier Magnitude • Scans performed for three months • Observed more than 5 million amplifiers for 4 of the 5 protocols 8 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  9. UDP-based Amplification IP Churn (1 / 3) • How fast does a set of amplifiers change? • Enumerated amplifiers based on IP address on Nov 22, 2013 • Checked if amplifiers were still reachable the following weeks 9 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  10. UDP-based Amplification IP Churn (2 / 3) • For most protocols the churn is high (~50% after a week) • Amplifiers outdated within a week: mostly routing devices - validated via device fingerprinting and reverse DNS (82.8% include „dyn“, „dialup“, „pool“) • Amplifiers reachable after 13 weeks: located in countries with longer IP-lease times (Korea, United States, Canada) 10 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  11. UDP-based Amplification IP Churn (3 / 3) • 90% of the NTP amplifiers are still reachable after four weeks • Hosts still available after 13 weeks: • 40% run Cisco IOS • 53% are located in United States, South Korea, and Japan 11 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  12. UDP-based Amplification NTP monlist Campaign • Collaborated with organizations to create technical advisories • Published lists of hosts vulnerable to monlist amplification to security organizations (ShadowServer / NTP Pool Project) 12 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  13. Outline • Background • UDP-based Amplification • TCP-based Amplification • Comparison UDP- / TCP-based Amplification 13 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  14. TCP-based Amplification Amplifier Magnitude (1 / 2) • Send a single SYN to a target host and record the traffic (no ACK / RST is sent back) 14 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  15. TCP-based Amplification Amplifier Magnitude (2 / 2) • Consider hosts that amplify our SYN by a factor > 20x (including Ethernet, IP, TCP headers) • Almost 2 % of responsive FTP / Telnet hosts amplify a single SYN by factor > 20x • In total 4.8 million amplifiers 15 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  16. TCP-based Amplification Amplification Type • Distribution of TCP flags shows three main amplification types • Traffic volume • NetBIOS • 8,863 SYN/ACK amplifiers: 25 MB of traffic • 3,087 RST amplifiers: 12 GB of traffic • FTP • 2,907,279 SYN/ACK amplifiers: 3.2 GB of traffic • 5,577 RST amplifiers: 15.1 GB of traffic 16 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  17. TCP-based Amplification Packet Frequency • High number of packets that reach the target simultaneously is import for a high impact • We measured the number of packets that reach the target within 10, 30, and 60 seconds after observing the first response of a host • Besides a high amplification factor, RST amplifiers also cause a high packet frequency 17 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  18. TCP-based Amplification Real-World Attacks • Can TCP-based amplifiers be used in real-world attacks, in which an attacker would repeatedly send spoofed SYN packets to the amplifiers to flood the victim’s network? • We forwarded 1, 5, and 10 SYN packets to different types of amplifiers and measured the traffic that arrived up to 60 seconds after sending the last SYN segment: • SYN/ACK amplifiers: • 1x SYN - 34.2 MB • 5x SYN - 55.1 MB • 10x SYN - 76.0 MB (increase of factor 2.2x) • PSH amplifiers: • 1x SYN - 11.2 MB • 10x SYN - 110.8 MB (increase of factor 10x) • RST amplifiers: • 1x SYN - 89.6 MB • 5x SYN - 392.4 MB (increase of factor 4.4x) • 10x SYN - 789.2 MB (increase of factor 8.8x) 18 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  19. Outline • Background • UDP-based Amplification • TCP-based Amplification • Comparison UDP- / TCP-based Amplification 19 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  20. Comparison UDP-based vs. TCP-based Amplification (1 / 2) • Amplification factor • UDP-based protocols: • 3.8x (NetBIOS) • 98.3x (DNS) • 4,670x (NTP monlist ) • Actual bandwidth amplification much lower (<1,000 for NTP) • TCP-based protocols: • Allow much higher bandwidth amplification • Up to 80,000x for RST amplifiers 20 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  21. Comparison UDP-based vs. TCP-based Amplification (2 / 2) • Number of amplifiers • UDP-based protocols: • 2.8 million (NetBIOS) • 30.5 million (DNS) • 87,463 (NTP monlist ) • TCP-based protocols: • Low number of amplifiers (particularly for RST ) • DNS amplifiers can cause higher impact (about 10x compared to an attack using FTP) • Attackers currently stick to UDP-based attacks • TCP attacks presumably much harder to block, though 21 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  22. Questions? Contact: Marc Kührer marc.kuehrer@rub.de More Information: http://syssec.rub.de 22 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  23. Background Reflection Attack Attacker Reflector Victim 23 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  24. UDP-based Amplification Intersection of Amplifiers • Largest overlap between SNMP and DNS • Almost 46 million amplifiers for all scanned protocols 24 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  25. UDP-based Amplification Device Fingerprinting • Device fingerprinting based on 1,873 manually compiled regular expressions, applied to the returned UDP payload data (+ performed TCP scans) • Majority of vulnerable hosts are routing devices (NTP: 40.8% Cisco IOS) • 1,267,008 amplifiers (17.4%) running Linux on MIPS and 357,076 devices (4.9%) running Linux on PowerPC • Smaller clusters: 695 devices running Miele Logic, 51,351 DVRs, 20,927 NAS 25 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

  26. UDP-based Amplification NTP monlist Campaign (2 / 2) • On Feb 24, 2014, the number of monlist amplifiers reached 126,080 (a decrease of 92.4%) • As of Jun 2014, 87,463 amplifiers still reachable (a decrease of almost 40,000 hosts since Feb 2014) 26 AMPLIFICATION DDOS ATTACKS | HORST GÖRTZ INSTITUT FÜR IT-SICHERHEIT | BOCHUM | 31.07.2014

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend