SLIDE 1 Network Security: Network Flooding
Seungwon Shin, KAIST
Most slides from Dr. Dan Boneh and Darren Anstee
SLIDE 2 What is a Denial of Service Attack?
Goal
take out a large site with little computing work
Network Bandwidth Computing Power
Processor Memory
How: Amplification
Small number of packets ⇒ big effect
Two types of amplification attacks
DoS bug:
Design flaw allowing one machine to disrupt a service
DoS flood:
Command bot-net to generate flood of requests
SLIDE 3 What is a Denial of Service Attack
An attempt to consume finite resources, exploit weaknesses in software design
- r implementation, or exploit lack of infrastructure capacity
Effects the availability and utility of computing and network resources Attacks can be distributed for even more significant effect The collateral damage caused by an attack can be as bad, if not worse, than the attack itself
for t caused
DATA CENTER I P S Load Bala ncer
Application-Layer DDoS Impact Volumetric DDoS Impact
SLIDE 4
DoS or DDoS
DoS (Denial of Service)
A DoS attack is targeted at a particular node (machine). Attempts to deny service to that node
Source of the attack:
Single node: DoS (Denial of Service) attack Multiple nodes: DDoS (Distributed Denial of Service) attack
SLIDE 5
Which Layer?
Sample Dos at different layers (by order)
Link TCP/UDP Application
Sad truth:
Current Internet… not designed to handle DDoS attacks
SLIDE 6
Smurf Attack
Send ping request to broadcast address (ICMP Echo Req) Lots of responses:
Every host on target network generates a ping reply (ICMP Echo Reply) to victim
gateway
DoS Source DoS Target 1 ICMP Echo Req Src: Dos Target Dest: brdct addr 3 ICMP Echo Reply Dest: Dos Target
SLIDE 7
DNS Amplification Attack
DNS Query EDNS Reponse
DNS Server
DoS Source DoS Target DNS Query SrcIP: Dos Target (60 bytes) EDNS Reponse (3000 bytes)
SLIDE 8
TCP 3-way Handshake
C S SYN: Listening
SNC←randC ANC←0
SYN/ACK: ACK: Store SNC , SNS Wait Established
SNS←randS ANS←SNC SN←SNC AN←SNS
SLIDE 9 TCP SYN Flooding
C SYNC1 SYN S Single machine:
random source IP addresses SYNC2 SYNC3 SYNC4 SYNC5 addresses
- Fills up backlog queue
- n server
- No further connections
possible
SLIDE 10 Why is it Vulnerable?
TCP backlog issue
Backlog timeout:
3 minutes
Attacker need only send 128 SYN packets every 3 minutes.
Low rate SYN flood
OS Backlog queue size Linux 1.2.x 10 FreeBSD 2.1.5 128 FreeBSD 2.1.5 128 WinNT 4.0 6 Windows 2000 server: 80 Advanced Windows server: 400
Increase the backlog (Linux RedHat 7.3) # sysctl -w net.ipv4.tcp_max_syn_backlog="2048"
SLIDE 11
Backscatter Effect
SYN with forged source IP ⇒ SYN/ACK to random host
SLIDE 12
TCP SYN Flood Case
MS Blaster worm (2003)
Infected machines at noon on Aug 16th:
SYN flood on port 80 to windowsupdate.com 50 SYN packets every second. each packet is 40 bytes. Spoofed source IP: a.b.X.Y where X,Y random.
MS solution:
new name: windowsupdate.microsoft.com Win update file delivered by Akamai
SLIDE 13 More Interesting Example: SQL Slammer
Damage history (extract):
- n Jan. 25, 2003
- ver 260,000 unique IP addresses infected by the Slammer worm within Internet
Security Systems' monitored networks Propagation of the worm overpowered Internet connections with millions of UDP/IP probes hours after the activity began. ETH Zurich was not connected to the Internet for about 3 hours. Service for e- mail and web pages were only partially available.
On Feb. 5, 2003
(W)LAN for visitors and vendors at the Internet Expo in Zurich (with 330 vendors present) was not available due to SQL Slammer infections of vendor’s computers.
SLIDE 14 More Interesting Example: SQL Slammer
How the SQL Slammer DDoS attack works
The amplifying network of zombies is built fast by worm spreading based on exploiting a system vulnerability System vulnerability
Exploit Microsoft SQL Servers and MSDE- enabled products vulnerable to the SQL Server resolution service buffer overflow.
Slammer's main function is
propagation, sending 376 bytes of code across port 1434/UDP until the SQL Server shuts down
Scanning/infection/attack code is combined
Countermeasures:
Patch the vulnerable SQL server installations Filter attack traffic to port 1434/UDP
SLIDE 15
SQL Slammer
SLIDE 16
DDoS with Botnet
SLIDE 17
DRDoS with Botnet
DRDoS Attack
Distributed Reflector Denial of Service Reflectors are uncompromised machines. The slave zombies send packets to the reflectors with IP source addresses spoofed as the target
reflectors return packets to the target
The reflectors carry out the flooding rather than the slaves. More distributed than a typical DDoS attack.
SLIDE 18
DRDoS with Botnet
SLIDE 19
Application Level Attack
Command bot army to do the following operations
make a TCP session send short HTTP HEAD request to a target keep sending
It can evade detection approaches
TCP SYN flooding detection
However,
attacker should use real IP addresses not spoofed ones reason why an attacker uses bots
SLIDE 20 DDoS classification
A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
Mirkovic et al., ACM CCR 2004
DDoS Attack Mechanisms
Manual (DA-1) Semi-automatic (DA-2) Automatic (DA-3) Direct (CM-1) Indirect (CM-2) Random (HSS-1) Hitlist (HSS-2) Signpost (HSS-3) Permutation (HSS-4) Local subnet (HSS-5) Central (PM-1) Back-chaining (PM-2) Autonomous (PM-3) Semantic (EW-1) Brute-force (EW-2) Filterable (RAVS-1) Non-filterable (RAVS-2) Characterizable (PC-1) Non-characterizable (PC-2) Constant rate (ARD-1) Variable rate (ARD-2) Increasing (RCM-1) Fluctuating (RCM-2) Disruptive (IV-1) Degrading (IV-2) Host (VT-2) Application (VT-1) Network (VT-4) Infrastructure (VT-5) Constant set (PAS-1) Variable (PAS-2) Spoofed (SAV-1) Valid (SAV-2) Non-routable (AR-2) Routable (AR-1) Random (ST-1) Subnet (ST-2) En route (ST-3)
Classification by degree of automation (DA) Classification by host scanning strategy (HSS) Classification by propagation mechanism (PM) Classification by communication mechanism (CM) Classification by attack rate dynamics (ARD) Classification by rate change mechanism (RCM) Classification by possibility of characterization (PC) Classification by relation of attack to victim services (RAVS) Classification by source address validity (SAV) Classification by victim type (VT) Classification by persistence of agent set (PAS) Classification by impact on the victim (IV)
Self-recoverable (PDR-1) Human-recoverable (PDR-2)
Classification by possibility of dynamic recovery (PDR) Classification by exploited weakness (EW) Classification by address routability (AR) Classification by spoofing technique (ST)
Non-recoverable (PDR-3) Fixed (ST-4) Resource (VT-3) Horizontal (VSS-1) Vertical (VSS-2) Coordinated (VSS-3) Stealthy (VSS-4)
Classification by vulnerability scanning strategy (VSS)
SLIDE 21 DDoS Defense - next class
Attack Countermeasure Options Example Description
Network Level Device Software patches, packet filtering Ingress and Egress Filtering Software upgrades can fix known bugs and packet filtering can prevent attacking traffic from entering a network. OS Level SYN Cookies, drop backlog connections, shorten timeout time SYN Cookies Shortening the backlog time and dropping backlog connections will free up resources. SYN cookies proactively prevent attacks. Application Level Attacks Intrusion Detection System GuardDog, other vendors. Software used to detect illicit activity. Data Flood
(Amplification, Oscillation, Simple Flooding)
Replication and Load Balancing Akami/Digital Island provide content distribution. Extend the volume of content under attack makes it more complicated and harder for attackers to identify services to attack and accomplish complete attacks. Protocol Feature Attacks Extend protocols to support security. ITEF standard for itrace, DNSSEC Trace source/destination packets by a means
- ther than the IP address (blocks against IP
address spoofing). DNSSEC would provide authorization and authentication on DNS information.
by Dr. Ruby Lee
SLIDE 22
DDoS Trend
SLIDE 23 DDoS Trend - CISCO
Manually (hack to servers)
Non critical Protocols (eg ICMP)
Distribution Management
# Attackers
(Bandwidth)
Type of attack Protection
Spoofed SYN
- Enterprise level
- Firewall/
- ACL access routers
X0-X00 attackers (X0 Mbps)
─ Email attach ─ Download from
questionable site
─ via chat ─ ICQ, AIM, IRC ─ Worms
~X00-X,000 Attackers (X00 Mbps)
Via botnets
- ISP/IDC
- Blackhole
- ACL
- DDoS solutions
- All type of
applicatios (HTTP, DNS, SMTP)
Manually Manually
─ Email attach ─ via chat
ICQ, AIM, IRC…
~X00,000 attackers (X-X0 Gbps)
requests
elements (DNS, SMTP, HTTP…)
- Blackhole (?)
- ACL (?)
- DDoS solutions
- Anycast (?)
SLIDE 24
DDoS Trend - from Akamai Report (2015)
Summary
DDoS attacks, Q4 2015 vs. Q4 2014
148.85% increase in total DDoS attacks 168.82% increase in infrastructure layer
DDoS attacks, Q4 2015 vs. Q3 2015
39.89% increase in total DDoS attacks 42.38% increase in infrastructure layer
Web application attacks, Q4 2015 vs. Q3 2015
28.10% increase in total web application attacks 28.65% increase in web application 12.19% increase in SQL attacks
SLIDE 25 Percentage Infrastructure Layer DDoS 5 10 15 20 25
Other UDP Fragment UDP Floods NTP SYN SSDP TCP Anomaly ICMP DNS CHARGEN ACK
3.36% 9.34% 13.27% 1.38% 3.17%
RIP
1.19%
RESET
1.00% 7.53% 10.40% 14.27% 9.40% 21.01% 1.58% Application Layer DDoS
PUSH HTTP POST HEAD
0.08%
HTTP GET
2.17% 0.35% 0.51% FIN Floods (0.19%) RP (0.14%) RPC (0.46%) NetBIOS (0.35%) Sentinel (0.03%) SNMP (0.30%) SYN PUSH (0.03%) XMAS (0.08%) Application Layer DDoS 3.11% Infrastructure Layer DDoS 96.89%
DDoS Attack Vector Frequency, Q4 2015
Figure 2-1: Of the 24 DDoS attack vectors tracked this quarter, four — UDP Fragment, NTP , SYN and DNS — made up almost 60% of the attacks
SLIDE 26 er ey est c. uk ut ugh ey he
he n Top 10 Source Countries for DDoS Attacks, Q4 2015
Figure 2-9: In Q4 2015, DDoS attacks were most commonly
- bserved coming from China, Turkey and the US
India 3% UK 3% Spain 3% Taiwan 4% Indonesia 5% China 28% Turkey 22% US 15% Korea 9% Mexico 8%
SLIDE 27 Percentage
Figure 2-10: While the US and China have been in the top fjve every quarter, Q4 2015 marks the fjrst time that Turkey has made the list
5 10 15 20 25 40 30 35
Top 5 Source Countries for DDoS Attacks, Q4 2014 – Q4 2015
Mexico Korea US Turkey China
8.37% 8.52% 15.03% 21.99% 27.67%
Q4 2015
Spain India US China UK
6.87% 6.95% 17.04% 20.70% 25.60%
Q3 2015
Spain India UK US China
6.03% 7.43% 10.21% 17.88% 37.01%
Q2 2015
Spain Italy US Germany China
7.29% 8.38% 12.18% 17.39% 23.45%
Q1 2015
France Mexico Germany China US
7.64% 11.69% 12.00% 17.60% 31.54%
Q4 2014
25
SLIDE 28 Software & Technology Retail & Consumer Goods Public Sector Media & Entertainment Internet & Telecom Hotel & Travel Gaming Financial Services Education Business Services 5 10 15 20 25 30 35 50 55 60 45 40 Q4 2015 Q3 2015
25.33% 23.03% 4.72% 4.20% 0.40% 0.05% 50.00% 54.45% 2.66% 2.50% 7.78% 6.84% 0.15% 0.07% 4.99% 4.70% 1.06% 1.35% 2.99% 2.75%
Percentage
DDoS Attack Frequency by Industry
Figure 2-11: The gaming and software & technology industries were targeted 77%
- f the time in Q4 2015, up from 75% in Q3 2015
SLIDE 29
Refmection DDoS Attacks, Q4 2014 – Q4 2015
Figure 2-14: SSDP , NTP , DNS and CHARGEN have consistently been used as the most common refmection attack vectors, as can be seen on the left axis, and the use of refmection attacks has increased dramatically since Q4 2014, as shown on the right axis
SLIDE 30
DDoS Refmector Heat Map, Q4 2015
Figure 4-3: The location of vulnerable devices used in refmection-based attacks during Q4 2015 was concentrated in the US, Asia and Europe
SLIDE 31 Figure 3-1: Only 11% of the web application attacks observed in Q4 2015 were over encrypted (HTTPS) connections
Web Application Attacks Over HTTP vs. HTTPS
HTTP (89%) HTTPS (11%) LFI 41.05% SQLi 27.00% PHPi 24.32% XSS 4.70% Shellshock 1.28% RFI 0.82% MFU 0.63% CMDi 0.17% JAVAi 0.02%
Web Application Attack Vectors Over HTTP , Q4 2015
Figure 3-2: The three most popular attack vectors — LFI, SQLi and PHPi — were used in more than 92% of the attacks