Network Security: Network Flooding Seungwon Shin, KAIST Most slides - - PowerPoint PPT Presentation

network security network flooding
SMART_READER_LITE
LIVE PREVIEW

Network Security: Network Flooding Seungwon Shin, KAIST Most slides - - PowerPoint PPT Presentation

Network Security: Network Flooding Seungwon Shin, KAIST Most slides from Dr. Dan Boneh and Darren Anstee What is a Denial of Service Attack? Goal take out a large site with little computing work Network Bandwidth Computing Power Processor


slide-1
SLIDE 1

Network Security: Network Flooding

Seungwon Shin, KAIST

Most slides from Dr. Dan Boneh and Darren Anstee

slide-2
SLIDE 2

What is a Denial of Service Attack?

Goal

take out a large site with little computing work

Network Bandwidth Computing Power

Processor Memory

How: Amplification

Small number of packets ⇒ big effect

Two types of amplification attacks

DoS bug:

Design flaw allowing one machine to disrupt a service

DoS flood:

Command bot-net to generate flood of requests

slide-3
SLIDE 3

What is a Denial of Service Attack

An attempt to consume finite resources, exploit weaknesses in software design

  • r implementation, or exploit lack of infrastructure capacity

Effects the availability and utility of computing and network resources Attacks can be distributed for even more significant effect The collateral damage caused by an attack can be as bad, if not worse, than the attack itself

for t caused

DATA CENTER I P S Load Bala ncer

Application-Layer DDoS Impact Volumetric DDoS Impact

slide-4
SLIDE 4

DoS or DDoS

DoS (Denial of Service)

A DoS attack is targeted at a particular node (machine). Attempts to deny service to that node

Source of the attack:

Single node: DoS (Denial of Service) attack Multiple nodes: DDoS (Distributed Denial of Service) attack

slide-5
SLIDE 5

Which Layer?

Sample Dos at different layers (by order)

Link TCP/UDP Application

Sad truth:

Current Internet… not designed to handle DDoS attacks

slide-6
SLIDE 6

Smurf Attack

Send ping request to broadcast address (ICMP Echo Req) Lots of responses:

Every host on target network generates a ping reply (ICMP Echo Reply) to victim

gateway

DoS Source DoS Target 1 ICMP Echo Req Src: Dos Target Dest: brdct addr 3 ICMP Echo Reply Dest: Dos Target

slide-7
SLIDE 7

DNS Amplification Attack

DNS Query EDNS Reponse

DNS Server

DoS Source DoS Target DNS Query SrcIP: Dos Target (60 bytes) EDNS Reponse (3000 bytes)

slide-8
SLIDE 8

TCP 3-way Handshake

C S SYN: Listening

SNC←randC ANC←0

SYN/ACK: ACK: Store SNC , SNS Wait Established

SNS←randS ANS←SNC SN←SNC AN←SNS

slide-9
SLIDE 9

TCP SYN Flooding

C SYNC1 SYN S Single machine:

  • SYN Packets with

random source IP addresses SYNC2 SYNC3 SYNC4 SYNC5 addresses

  • Fills up backlog queue
  • n server
  • No further connections

possible

slide-10
SLIDE 10

Why is it Vulnerable?

TCP backlog issue

Backlog timeout:

3 minutes

Attacker need only send 128 SYN packets every 3 minutes.

Low rate SYN flood

OS Backlog queue size Linux 1.2.x 10 FreeBSD 2.1.5 128 FreeBSD 2.1.5 128 WinNT 4.0 6 Windows 2000 server: 80 Advanced Windows server: 400

Increase the backlog (Linux RedHat 7.3) # sysctl -w net.ipv4.tcp_max_syn_backlog="2048"

slide-11
SLIDE 11

Backscatter Effect

SYN with forged source IP ⇒ SYN/ACK to random host

slide-12
SLIDE 12

TCP SYN Flood Case

MS Blaster worm (2003)

Infected machines at noon on Aug 16th:

SYN flood on port 80 to windowsupdate.com 50 SYN packets every second. each packet is 40 bytes. Spoofed source IP: a.b.X.Y where X,Y random.

MS solution:

new name: windowsupdate.microsoft.com Win update file delivered by Akamai

slide-13
SLIDE 13

More Interesting Example: SQL Slammer

Damage history (extract):

  • n Jan. 25, 2003
  • ver 260,000 unique IP addresses infected by the Slammer worm within Internet

Security Systems' monitored networks Propagation of the worm overpowered Internet connections with millions of UDP/IP probes hours after the activity began. ETH Zurich was not connected to the Internet for about 3 hours. Service for e- mail and web pages were only partially available.

On Feb. 5, 2003

(W)LAN for visitors and vendors at the Internet Expo in Zurich (with 330 vendors present) was not available due to SQL Slammer infections of vendor’s computers.

slide-14
SLIDE 14

More Interesting Example: SQL Slammer

How the SQL Slammer DDoS attack works

The amplifying network of zombies is built fast by worm spreading based on exploiting a system vulnerability System vulnerability

Exploit Microsoft SQL Servers and MSDE- enabled products vulnerable to the SQL Server resolution service buffer overflow.

Slammer's main function is

propagation, sending 376 bytes of code across port 1434/UDP until the SQL Server shuts down

Scanning/infection/attack code is combined

Countermeasures:

Patch the vulnerable SQL server installations Filter attack traffic to port 1434/UDP

slide-15
SLIDE 15

SQL Slammer

slide-16
SLIDE 16

DDoS with Botnet

slide-17
SLIDE 17

DRDoS with Botnet

DRDoS Attack

Distributed Reflector Denial of Service Reflectors are uncompromised machines. The slave zombies send packets to the reflectors with IP source addresses spoofed as the target

reflectors return packets to the target

The reflectors carry out the flooding rather than the slaves. More distributed than a typical DDoS attack.

slide-18
SLIDE 18

DRDoS with Botnet

slide-19
SLIDE 19

Application Level Attack

Command bot army to do the following operations

make a TCP session send short HTTP HEAD request to a target keep sending

It can evade detection approaches

TCP SYN flooding detection

However,

attacker should use real IP addresses not spoofed ones reason why an attacker uses bots

slide-20
SLIDE 20

DDoS classification

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

Mirkovic et al., ACM CCR 2004

DDoS Attack Mechanisms

Manual (DA-1) Semi-automatic (DA-2) Automatic (DA-3) Direct (CM-1) Indirect (CM-2) Random (HSS-1) Hitlist (HSS-2) Signpost (HSS-3) Permutation (HSS-4) Local subnet (HSS-5) Central (PM-1) Back-chaining (PM-2) Autonomous (PM-3) Semantic (EW-1) Brute-force (EW-2) Filterable (RAVS-1) Non-filterable (RAVS-2) Characterizable (PC-1) Non-characterizable (PC-2) Constant rate (ARD-1) Variable rate (ARD-2) Increasing (RCM-1) Fluctuating (RCM-2) Disruptive (IV-1) Degrading (IV-2) Host (VT-2) Application (VT-1) Network (VT-4) Infrastructure (VT-5) Constant set (PAS-1) Variable (PAS-2) Spoofed (SAV-1) Valid (SAV-2) Non-routable (AR-2) Routable (AR-1) Random (ST-1) Subnet (ST-2) En route (ST-3)

Classification by degree of automation (DA) Classification by host scanning strategy (HSS) Classification by propagation mechanism (PM) Classification by communication mechanism (CM) Classification by attack rate dynamics (ARD) Classification by rate change mechanism (RCM) Classification by possibility of characterization (PC) Classification by relation of attack to victim services (RAVS) Classification by source address validity (SAV) Classification by victim type (VT) Classification by persistence of agent set (PAS) Classification by impact on the victim (IV)

Self-recoverable (PDR-1) Human-recoverable (PDR-2)

Classification by possibility of dynamic recovery (PDR) Classification by exploited weakness (EW) Classification by address routability (AR) Classification by spoofing technique (ST)

Non-recoverable (PDR-3) Fixed (ST-4) Resource (VT-3) Horizontal (VSS-1) Vertical (VSS-2) Coordinated (VSS-3) Stealthy (VSS-4)

Classification by vulnerability scanning strategy (VSS)

slide-21
SLIDE 21

DDoS Defense - next class

Attack Countermeasure Options Example Description

Network Level Device Software patches, packet filtering Ingress and Egress Filtering Software upgrades can fix known bugs and packet filtering can prevent attacking traffic from entering a network. OS Level SYN Cookies, drop backlog connections, shorten timeout time SYN Cookies Shortening the backlog time and dropping backlog connections will free up resources. SYN cookies proactively prevent attacks. Application Level Attacks Intrusion Detection System GuardDog, other vendors. Software used to detect illicit activity. Data Flood

(Amplification, Oscillation, Simple Flooding)

Replication and Load Balancing Akami/Digital Island provide content distribution. Extend the volume of content under attack makes it more complicated and harder for attackers to identify services to attack and accomplish complete attacks. Protocol Feature Attacks Extend protocols to support security. ITEF standard for itrace, DNSSEC Trace source/destination packets by a means

  • ther than the IP address (blocks against IP

address spoofing). DNSSEC would provide authorization and authentication on DNS information.

by Dr. Ruby Lee

slide-22
SLIDE 22

DDoS Trend

slide-23
SLIDE 23

DDoS Trend - CISCO

Manually (hack to servers)

Non critical Protocols (eg ICMP)

Distribution Management

# Attackers

(Bandwidth)

Type of attack Protection

Spoofed SYN

  • Enterprise level
  • Firewall/
  • ACL access routers

X0-X00 attackers (X0 Mbps)

─ Email attach ─ Download from

questionable site

─ via chat ─ ICQ, AIM, IRC ─ Worms

~X00-X,000 Attackers (X00 Mbps)

Via botnets

  • ISP/IDC
  • Blackhole
  • ACL
  • DDoS solutions
  • All type of

applicatios (HTTP, DNS, SMTP)

  • Spoofed SYN

Manually Manually

─ Email attach ─ via chat

ICQ, AIM, IRC…

~X00,000 attackers (X-X0 Gbps)

  • Legitimate

requests

  • Infrastructure

elements (DNS, SMTP, HTTP…)

  • Blackhole (?)
  • ACL (?)
  • DDoS solutions
  • Anycast (?)
slide-24
SLIDE 24

DDoS Trend - from Akamai Report (2015)

Summary

DDoS attacks, Q4 2015 vs. Q4 2014

148.85% increase in total DDoS attacks 168.82% increase in infrastructure layer

DDoS attacks, Q4 2015 vs. Q3 2015

39.89% increase in total DDoS attacks 42.38% increase in infrastructure layer

Web application attacks, Q4 2015 vs. Q3 2015

28.10% increase in total web application attacks 28.65% increase in web application 12.19% increase in SQL attacks

slide-25
SLIDE 25

Percentage Infrastructure Layer DDoS 5 10 15 20 25

Other UDP Fragment UDP Floods NTP SYN SSDP TCP Anomaly ICMP DNS CHARGEN ACK

3.36% 9.34% 13.27% 1.38% 3.17%

RIP

1.19%

RESET

1.00% 7.53% 10.40% 14.27% 9.40% 21.01% 1.58% Application Layer DDoS

PUSH HTTP POST HEAD

0.08%

HTTP GET

2.17% 0.35% 0.51% FIN Floods (0.19%) RP (0.14%) RPC (0.46%) NetBIOS (0.35%) Sentinel (0.03%) SNMP (0.30%) SYN PUSH (0.03%) XMAS (0.08%) Application Layer DDoS 3.11% Infrastructure Layer DDoS 96.89%

DDoS Attack Vector Frequency, Q4 2015

Figure 2-1: Of the 24 DDoS attack vectors tracked this quarter, four — UDP Fragment, NTP , SYN and DNS — made up almost 60% of the attacks

slide-26
SLIDE 26

er ey est c. uk ut ugh ey he

  • p

he n Top 10 Source Countries for DDoS Attacks, Q4 2015

Figure 2-9: In Q4 2015, DDoS attacks were most commonly

  • bserved coming from China, Turkey and the US

India 3% UK 3% Spain 3% Taiwan 4% Indonesia 5% China 28% Turkey 22% US 15% Korea 9% Mexico 8%

slide-27
SLIDE 27

Percentage

Figure 2-10: While the US and China have been in the top fjve every quarter, Q4 2015 marks the fjrst time that Turkey has made the list

5 10 15 20 25 40 30 35

Top 5 Source Countries for DDoS Attacks, Q4 2014 – Q4 2015

Mexico Korea US Turkey China

8.37% 8.52% 15.03% 21.99% 27.67%

Q4 2015

Spain India US China UK

6.87% 6.95% 17.04% 20.70% 25.60%

Q3 2015

Spain India UK US China

6.03% 7.43% 10.21% 17.88% 37.01%

Q2 2015

Spain Italy US Germany China

7.29% 8.38% 12.18% 17.39% 23.45%

Q1 2015

France Mexico Germany China US

7.64% 11.69% 12.00% 17.60% 31.54%

Q4 2014

25

slide-28
SLIDE 28

Software & Technology Retail & Consumer Goods Public Sector Media & Entertainment Internet & Telecom Hotel & Travel Gaming Financial Services Education Business Services 5 10 15 20 25 30 35 50 55 60 45 40 Q4 2015 Q3 2015

25.33% 23.03% 4.72% 4.20% 0.40% 0.05% 50.00% 54.45% 2.66% 2.50% 7.78% 6.84% 0.15% 0.07% 4.99% 4.70% 1.06% 1.35% 2.99% 2.75%

Percentage

DDoS Attack Frequency by Industry

Figure 2-11: The gaming and software & technology industries were targeted 77%

  • f the time in Q4 2015, up from 75% in Q3 2015
slide-29
SLIDE 29

Refmection DDoS Attacks, Q4 2014 – Q4 2015

Figure 2-14: SSDP , NTP , DNS and CHARGEN have consistently been used as the most common refmection attack vectors, as can be seen on the left axis, and the use of refmection attacks has increased dramatically since Q4 2014, as shown on the right axis

slide-30
SLIDE 30

DDoS Refmector Heat Map, Q4 2015

Figure 4-3: The location of vulnerable devices used in refmection-based attacks during Q4 2015 was concentrated in the US, Asia and Europe

slide-31
SLIDE 31

Figure 3-1: Only 11% of the web application attacks observed in Q4 2015 were over encrypted (HTTPS) connections

Web Application Attacks Over HTTP vs. HTTPS

HTTP (89%) HTTPS (11%) LFI 41.05% SQLi 27.00% PHPi 24.32% XSS 4.70% Shellshock 1.28% RFI 0.82% MFU 0.63% CMDi 0.17% JAVAi 0.02%

Web Application Attack Vectors Over HTTP , Q4 2015

Figure 3-2: The three most popular attack vectors — LFI, SQLi and PHPi — were used in more than 92% of the attacks

  • ver HTTP