denial of service attacks. understanding to denial of services

55
Denial of Service Attacks

Upload: reynard-mosley

Post on 25-Dec-2015

231 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Denial of Service Attacks. Understanding to Denial of Services

Denial of Service Attacks

Page 2: Denial of Service Attacks. Understanding to Denial of Services

Understanding to Denial of Services

Page 3: Denial of Service Attacks. Understanding to Denial of Services

Using up resources is the most common approach

Several ways..Crash the machinePut it into an infinite loopCrash routers on the path to the machineUse up a machine resourceUse up a network resourceDeny another service needed for this one (e.g.

DNS)

How can a service be denied?

Page 4: Denial of Service Attacks. Understanding to Denial of Services

What is Denial of Service?Denial of Service (DoS)

Attack to disrupt the authorized use of networks, systems, or applications

Distributed Denial of Service (DDoS)Employ multiple compromised computers to

perform a coordinated and widely distributed DoS attack

Page 5: Denial of Service Attacks. Understanding to Denial of Services

DoS Single Source

Page 6: Denial of Service Attacks. Understanding to Denial of Services

DDoS

Collateral damage points

Page 7: Denial of Service Attacks. Understanding to Denial of Services

DDoS Attack Traffic (1)

One Day Traffic Graph

Page 8: Denial of Service Attacks. Understanding to Denial of Services

DDoS Attack Traffic (2)

One Week Traffic Graph

Page 9: Denial of Service Attacks. Understanding to Denial of Services

DDoS Attack Traffic (3)

One Year Traffic Graph

Page 10: Denial of Service Attacks. Understanding to Denial of Services

How Severe?

Page 11: Denial of Service Attacks. Understanding to Denial of Services

DDoS BotnetsBotnet: Collection of compromised computers

that are controlled for the purposes of carrying out DDoS attacks or other activities

Can be large in number

Systems join a botnet when they become infected by certain types of malware Like a virus, but instead of harming the system, it

wants to take it over and control it Through email attachments, website links, or IM links Through unpatched operating system vulnerabilities

Page 12: Denial of Service Attacks. Understanding to Denial of Services

Botnets Modus Operandi

Zombies

Zombies

multi-tier design

Page 13: Denial of Service Attacks. Understanding to Denial of Services

13

Bot: Direct control

Page 14: Denial of Service Attacks. Understanding to Denial of Services

14

Bot: Indirect control

Page 15: Denial of Service Attacks. Understanding to Denial of Services

Cost of DDoS AttacksVictims of (D)DoS attacks

Service-providers (in terms of time, money, resources, good will)

Legitimate users (deprived of availability of service)

Hard to quantify Incomplete data – Companies reluctant to admit

they have been victimizedLost businessLost productivity

Page 16: Denial of Service Attacks. Understanding to Denial of Services

Why? Who? Several motives

Earlier attacks were proofs of conceptsPseudo-supremacy feelingEye-for-eye attitudePolitical issuesCompetitionHired

Levels of attackers Highly proficient attackers who are rarely identified or

caughtScript-kiddies

16

Page 17: Denial of Service Attacks. Understanding to Denial of Services

The DDoS Landscape

Page 18: Denial of Service Attacks. Understanding to Denial of Services

DDoS Timeline

Page 19: Denial of Service Attacks. Understanding to Denial of Services

DoS Attacks Fast Facts Early 1990s: Individual Attacks single source. First DoS Tools

Late 1990s: Botnets, First DDoS Tools

Feb 2000: First Large-Scale DDoS Attack CNN, Yahoo, E*Trade, eBay, Amazon.com, Buy.com

2001: Microsoft’s name sever infrastructure was disabled

2002: DDoD attack Root DNS

2004: DDoS for hire and Extortion

2007: DDoS against Estonia

2008: DDoS against Georgia during military conflict with Russia

2009: Ddos on Twitter and Facebook

2010: Ddos on VISA and Master Card

Page 20: Denial of Service Attacks. Understanding to Denial of Services

2000 DoS Attacks In Feb 2000, series of massive DoS attacks

Yahoo, Amazon, eBay, CNN, E*Trade, ZDNet, Datek and Buy.com all hit

Attacks allegedly perpetrated by teenagers

Used compromised systems at UCSB

Yahoo : 3 hours down with $500,000 lost revenue

Amazon: 10 hours down with $600,000 lost revenue

Page 21: Denial of Service Attacks. Understanding to Denial of Services

2002 DNS DoS Attacks ICMP floods 150 Kpps (primitive attack)

Took down 7 root servers (two hours)

DNS root servers

Page 22: Denial of Service Attacks. Understanding to Denial of Services

Hours-long service outage44 million users affected

At the same time Facebook, LiveJournal, and YouTube were under attackedsome users experienced an outage

Real target: a Georgian blogger

2009 DDoS on Twitter

Page 23: Denial of Service Attacks. Understanding to Denial of Services

December 2010

Targets: MasterCard, Visa, Amazon, Paypal, Swiss Postal Finance, and more

DDoS on Mastercard and Visa

Attack launched by a group of vigilantes called Anonymous (~5000 people) DDoS tool is called LOIC or “Low Orbit Ion Cannon” Bots recruited through social engineering Directed to download DDoS software and take instructions

from a master Motivation: Payback, due to cut support of WikiLeaks after

their founder was arrested on unrelated charges

Page 24: Denial of Service Attacks. Understanding to Denial of Services

The new DDoS tool by Anonymous

New operation is beginning

A successor of LOIC

Using SQL and .js vulnerability, remotely deface page

May be available in this September 2011

V for Vendetta

Page 25: Denial of Service Attacks. Understanding to Denial of Services

Operation FacebookAnnouncement on

YouTube to bomb Facebook on Nov. 5 2011

Facebook’s privacy reveals issues

Remember Remember poemRemember remember the fifth of November

Gunpowder, treason and plot.I see no reason why gunpowder, treasonShould ever be forgot...Why Nov. 5? V

Page 26: Denial of Service Attacks. Understanding to Denial of Services

DDoS Attack Classification

Page 27: Denial of Service Attacks. Understanding to Denial of Services

DOS attack listFlood attack

TCP SYN flood UDP flood ICMP (PING) flood Amplification (Smurf, Fraggle since 1998)

Vulnerability attackPing of Death (since 1990)Tear Drop (since 1997)Land (since 1997)

Page 28: Denial of Service Attacks. Understanding to Denial of Services

Flooding attack Commonly used DDoS attack

Sending a vast number of messages whose processing consumes some key resource at the target

The strength lies in the volume, rather than the content

Implications :The traffic look legitimateLarge traffic flow large enough to consume victim’s

resourcesHigh packet rate sending

28

Page 29: Denial of Service Attacks. Understanding to Denial of Services

Vulnerability DoS attack Vulnerability : a bug in implementation or a bug

in a default configuration of a service

Malicious messages (exploits) : unexpected input that utilize the vulnerability are sent

Consequences :The system slows down or crashes or freezes or

reboots Target application goes into infinite loopConsumes a vast amount of memory

29

Page 30: Denial of Service Attacks. Understanding to Denial of Services

TCP SYN floodSYN RQST

SYN ACKclient

server

Spoofed SYN RQST

zombie victim

Waiting queue

overflowsZombies

SYN ACK

Page 31: Denial of Service Attacks. Understanding to Denial of Services

Smurf attack Amplification attack

Sends ICMP ECHO to network

Amplified network floodwidespread pings with

faked return address (broadcast address)

Network sends response to victim system

The "smurf" attack's cousin is called "fraggle", which uses UDP echo packets in the same fashion

31

Page 32: Denial of Service Attacks. Understanding to Denial of Services

DoS : Smurf

A B

Ping BroadcastSrc Addr : BDst Addr : Broadcast

Page 33: Denial of Service Attacks. Understanding to Denial of Services

DoS : Fraggle

UDP Broadcastsrc port : echodest port: chargen port

A BInfinite Loop!

Src Addr : BDst Addr : Broadcast

Well known exploit Echo/Chargen

Page 34: Denial of Service Attacks. Understanding to Denial of Services

Ping of DeathSending over size ping packet to victim

>65535 bytes ping violates IP packet length Causes buffer overflow and system crash

Problem in implementation, not protocol

Has been fixed in modern OSesWas a problem in late 1990s

Page 35: Denial of Service Attacks. Understanding to Denial of Services

Teardrop A bug in their TCP/IP fragment reassembly code

Mangle IP fragments with overlapping, over-sized payloads to the target machine

Crash various operating systems

Page 36: Denial of Service Attacks. Understanding to Denial of Services

LAND A LAND (Local Area Network Denial) attack

First discovered in 1997 by “m3lt” Effect several OS :

AIX 3.0 FressBSD 2.2.5 IBM AS/400 OS7400 3.7 Mac OS 7.6.1 SUN OS 4.1.3, 4.1.4 Windows 95, NT and XP SP2

IP packets where the source and destination address are set to address the same device The machine replies to itself continuously Published code land.c

Page 37: Denial of Service Attacks. Understanding to Denial of Services

LAND

Page 38: Denial of Service Attacks. Understanding to Denial of Services

Well known old DDoS ToolsBotnet Communication

TypeAttack Type Encrypted

Communication?

Trinoo or trin00 TCP/UDP UDP Flood No

Tribe Flood Network (TFN)

TCP/UDP/ICMP Multiple No

TFN2K TCP/UDP/ICMP Randomized

Multiple Randomized

No

Stacheldraht TCP/UDP/ICMP Randomized

Multiple Randomized

Yes

Page 39: Denial of Service Attacks. Understanding to Denial of Services

DDoS Defense

Page 40: Denial of Service Attacks. Understanding to Denial of Services

Are we safe from DDoS?My machine are well secured

It does not matter. The problem is not your machine but everyone else

I have a Firewall It does not matter. We slip with legitimate traffic or we

bomb your firewall

I use VPN

It does not matter. We can fill your VPN pipe

My system is very high provision

It does not matter. We can get bigger resource than you have

40

Page 41: Denial of Service Attacks. Understanding to Denial of Services

Why DoS Defense is difficult Conceptual difficulties

Mostly random source packet Moving filtering upstream requires communication

Practical difficulties Routers don’t have many spare cycles for analysis/filtering Networks must remain stable—bias against infrastructure change Attack tracking can cross administrative boundaries End-users/victims often see attack differently (more urgently) than

network operators

Nonetheless, need to: Maximize filtering of bad traffic Minimize “collateral damage”

Page 42: Denial of Service Attacks. Understanding to Denial of Services

Defenses against DoS attacks

DoS attacks cannot be prevented entirely

Impractical to prevent the flash crowds without compromising network performance

Three lines of defense against (D)DoS attacks Attack prevention and preemption Attack detection and filteringAttack source traceback and identification

42

Page 43: Denial of Service Attacks. Understanding to Denial of Services

Attack preventionLimit ability of systems to send spoofed packets

Filtering done as close to source as possible by routers/gateways

Reverse-path filtering ensure that the path back to claimed source is same as the current packet’s pathEx: On Cisco router “ip verify unicast reverse-path”

command

Rate controls in upstream distribution nets On specific packet types Ex: Some ICMP, some UDP, TCP/SYN

Block IP broadcasts

43

Page 44: Denial of Service Attacks. Understanding to Denial of Services

Responding to attacksNeed good incident response plan

With contacts for ISPNeeded to impose traffic filtering upstreamDetails of response process

Ideally have network monitors and IDSTo detect and notify abnormal traffic patterns

44

Page 45: Denial of Service Attacks. Understanding to Denial of Services

Responding to attacks cont’d ….

Identify the type of attackCapture and analyze packetsDesign filters to block attack traffic upstream Identify and correct system application bugs

Have ISP trace packet flow back to sourceMay be difficult and time consumingNecessary if legal action desired

Implement contingency plan

Update incident response plan

45

Page 46: Denial of Service Attacks. Understanding to Denial of Services

How are DDoS practical handled?

46

Page 47: Denial of Service Attacks. Understanding to Denial of Services

Router Filtering

47Server1 Victim Server2

....

....

R3

R1

R2

R5R4

RR R

1000 1000

FE

peering

100

ACLs, CARs

Page 48: Denial of Service Attacks. Understanding to Denial of Services

Cisco uRPF

48

Router A

Router BPkt w/ source comes in

Path back on this line?

Accept pkt

Path via different interface?

Reject pkt

Check source in routing table

Unicast Reverse Path Forwarding

Does routing back to the source go through same interface ?

Cisco interface command: ip verify unicast rpf

Page 49: Denial of Service Attacks. Understanding to Denial of Services

Black hole Routing

49Server1 Victim Server2

....

....

R3

R1

R2

R5R4

RR R

1000 1000

FE

peering

100

ip route A.B.C.0 255.255.255.0 Null0

Page 50: Denial of Service Attacks. Understanding to Denial of Services

Blackhole in Practice (I)

50

Victim

Non-victimized servers

Upstream = Not on the Critical Path

Guard

Detector

Page 51: Denial of Service Attacks. Understanding to Denial of Services

Blackhole in Practice (II)

51

Guard

Victim

Non-victimized servers

BGP announcement

1. Detect

2. Activate: Auto/Manual

3. Divert only victim’s traffic

Activate

Detector

Page 52: Denial of Service Attacks. Understanding to Denial of Services

Blackhole in Practice (III)

52

Guard

Victim

Non-victimized servers

Traffic destined to the victim

Legitimate traffic to victim

Inject= GRE, VRF, VLAN, FBF, PBR…

Hijack traffic = BGP

Detector

Page 53: Denial of Service Attacks. Understanding to Denial of Services

DDoS Epilogue

53

Page 54: Denial of Service Attacks. Understanding to Denial of Services

Attackers follow defense approaches, adjust their code to bypass defenses

Use of subnet spoofing defeats ingress filtering

Use of encryption and decoy packets, IRC or P2P obscures master-slave communication

Encryption of attack packets defeats traffic analysis and signature detection

Pulsing attacks defeat slow defenses and traceback

Flash-crowd attacks generate application traffic

DDoS Attack Trends

Page 55: Denial of Service Attacks. Understanding to Denial of Services

More complex attacks

Recently seen trends: Larger networks of attack machines Rolling attacks from large number of machines Attacks at higher semantic levels Attacks on different types of network entities Attacks on DDoS defense mechanisms

Need flexible defenses that evolve with attacks

Implications For the Future