tr ddos attack
play

.tr DDoS Attack December 2015 Attila zgit .tr ccTLD Manager Dec, - PowerPoint PPT Presentation

.tr DDoS Attack December 2015 Attila zgit .tr ccTLD Manager Dec, 2015 .tr DDoS Attack A Summary of a 3 weeks long experience 2016-03-07 Dec 2015 DDoS Attack on .TR 2 Before DDoS q Infrequent Small scale DoS and DDos Attacks Few


  1. .tr DDoS Attack December 2015 Attila Özgit .tr ccTLD Manager

  2. Dec, 2015 .tr DDoS Attack A Summary of a 3 weeks long experience … 2016-03-07 Dec 2015 DDoS Attack on .TR 2

  3. Before DDoS q Infrequent Small scale DoS and DDos Attacks § Few times every year § 5-30 mins. each § Mostly to our registry services ² www.nic.tr q 6 NS at 5 different locations § All open source ² Linux, Bind, NSD § Average Bandwidth: 1.5 Mbps per server § 1.250 QPS per server 2016-03-07 Dec 2015 DDoS Attack on .TR 3

  4. Communication Infrastructure q 3 major ISPs serving TR Internet § Each connected to Tier-1 at various locations ² No topology info on our side § Abstraction: 3 major pipes to TR q 4 NSs downstream of ISP-A q 1 NS downstream of ISP-B q 1 NS @Europe 2016-03-07 Dec 2015 DDoS Attack on .TR 4

  5. Anatomy of the DDoS 2016-03-07 Dec 2015 DDoS Attack on .TR 5

  6. DDoS Attack q Started at 14 December 2015 10:20 § Went on nearly for 3 weeks § Towards the end, changed its target to Finance and Government sectors q Basically a “DNS (UDP) Amplification Attack” § Botnets sending spoofed query packets to ² Open DNS resolvers ² Authoritative DNS servers (no rate limiting) § Amplified by 10-150 times by victims § %25 of victims are from TR IPs § Targets 6 NS Servers § Secondary target was our registry services (Web) 2016-03-07 Dec 2015 DDoS Attack on .TR 6

  7. During the Attack … q Mainly between 09:00-17:00 § Working hours! (1 st shift) § 185.000 QPS per server q Reduced rate and different nature of attack during 2 nd and 3 rd shift q All NSs were almost always up § Reachability and delay problems due to overloaded pipes q Volume § One ISP reported 220 Gbps attack bandwidth § No synchronized picture of attack history q Might be one of the largest DDoS attack observed at the time 2016-03-07 Dec 2015 DDoS Attack on .TR 7

  8. Basic Defense Mechanisms q Make the surface to be attacked wider § Increasing the # of NSs q Analyze traffic § Figure out drop rules to be used q Adaptively react by reconfiguring mitigation services and devices § Attackers were highly adaptive to our defence 2016-03-07 Dec 2015 DDoS Attack on .TR 8

  9. Observations q Major attack classes § UDP flooding § Spoofed packets ² Source Port 53, Destination Port 53 ² … ² Almost all known attack patterns q Other attacks § Application attacks ² TCP based q No Ingress/Egress filtering in subnets q 8% of registered NSs in our registry DB are “Open Resolvers” 2016-03-07 Dec 2015 DDoS Attack on .TR 9

  10. Observations and Lessons q Importance of quick RZM mechanisms § Updates were not quick enough ² DOC Checks (Not Anymore) q Effective communication mechanisms § Within the registry tech team ² Use of Near Real Time technologies (Chat, etc.) § Between Registry and Upstream Operator ² Tech team correspondance § Critical communication should be in written form ² Rules to be coded § All critical communication should be tolerant to DNS failures 2016-03-07 Dec 2015 DDoS Attack on .TR 10

  11. Observations and Lessons q Effective (and concurrent) communication with § IANA/ICANN § Other ccTLDs § Other organizations within the country ² National CERT § Press (Media) § Upstream operators 2016-03-07 Dec 2015 DDoS Attack on .TR 11

  12. After the Attack q Infrequent, relatively light, 5-10 minutes DDoS Attacks are still coming in q Administrative measures § List of critical domain names (Gov, Banks, etc.) expanded ² 100 à 600 à 1.000+ q Temporarily § Zone Updates are done 3 times per day § Manual inspection of zone updates 2016-03-07 Dec 2015 DDoS Attack on .TR 12

  13. Current DNS infrastructure q 8 ns for tr. § 2 of 8 are ANYCAST (DynDNS) q 12 ns for second level (com.tr , gov.tr etc…) § 3 of 12 are ANYCAST (DynDNS, PCH) q With ANYCAST 100+ DNS servers q Isolated zone creation § Locked critical names § Automated security checks § Security checks by humans q Multiple hidden master servers 2016-03-07 Dec 2015 DDoS Attack on .TR 13

  14. J Thank You 2016-03-07 Dec 2015 DDoS Attack on .TR 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend