Top Banner
DDOS Attacks and Mitigation Methods Özkan Erdoğan ozkan.erdogan@btpsec. com Ms.C, CISA, CEH, ISO 27001 LA BTPSec Corp [email protected] Office:+90 216 4647475 +44 203 6084760 Address:Turaboğlu Sk. Hamdiye Yazgan İş Merkezi, Kozyatağı Kadıköy İSTANBUL
47

Ddos and mitigation methods.pptx (1)

Apr 16, 2017

Download

Internet

btpsec
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ddos and mitigation methods.pptx (1)

DDOS Attacksand Mitigation Methods

Özkan Erdoğ[email protected]

Ms.C, CISA, CEH, ISO 27001 LA

BTPSec Corp [email protected]

Office:+90 216 4647475 +44 203 6084760

Address:Turaboğlu Sk. Hamdiye Yazgan İş Merkezi, Kozyatağı Kadıköy İSTANBUL

Page 2: Ddos and mitigation methods.pptx (1)

What is DOS & DDOS?

D = Distributed DOS : focused on vulnerabilities, using single source DDOS : overflow focused, using multiple sources Target of attacks is to eliminate availability of the resource

Page 3: Ddos and mitigation methods.pptx (1)

What is DDOS

Page 4: Ddos and mitigation methods.pptx (1)

Is it possible to mitigate Ddos attacks?Our experience shows that its quite possible to mitigate ddos attacks. However, there are caveats such

that: Most ddos attacks come big in volume where it saturates your bandwidth . Attack volume > Target

network bandwidth (mbps).These attacks can be handled by obtaining service from global anti ddos providers: e.g. Cloudflare, Incapsula, Akamai etc.

Other kinds of attacks are usually ineffective if we configure our network with correct measures.

Page 5: Ddos and mitigation methods.pptx (1)

Botnet Lethic , Cutwail, Grum (spam), Flashback (Mac), Zeus (bank),

Spyeye (banka) etc..

Page 6: Ddos and mitigation methods.pptx (1)

Botnet Builder (10$)

Page 7: Ddos and mitigation methods.pptx (1)

Ddos Survey Results

61% loss of access to information

38% business stop

33% loss of job opportunities

29% reputation loss

26% insurance premium increases

65% Received security consultancy

49% More investments on IT

46% Started legal processes

43% Informed customers

36% Applied legal ways

26% Informed the media

● Spamhaus● Chinese domain authority (.cn)● Pohjola -Finland bank ● Nasdaq● Bitcoin● Bank of America

Page 8: Ddos and mitigation methods.pptx (1)

Ddos Costs

Page 9: Ddos and mitigation methods.pptx (1)

BOTNETs

Controlled by Botnet herders Commanded via : Mirc, http(s), Tor (popular now) Injection methods: Wordpress, Joomla etc. old Windows systems are

easiest targets.

Botnet members are targeted to be amongst data center systems.

Page 10: Ddos and mitigation methods.pptx (1)
Page 11: Ddos and mitigation methods.pptx (1)

DDOS events

1. Spamhaus (DNS Amplification) 300gbps.a. 11 Feb 2015: New NTP attack: 400gbps

2. Brobot (American Financial companies)3. Chinese attacks4. Russia: DDOS gangs5. Syn reflection attacks are gaining a rise.

Page 12: Ddos and mitigation methods.pptx (1)

DDOS Detection Methods

Honeypot Flow DPI

Page 13: Ddos and mitigation methods.pptx (1)

DDOS Mitigation Methods (General)

ACL BGP Routing (Cloud service) Blackhole Mitigation devices (Inline, Offline)

Page 14: Ddos and mitigation methods.pptx (1)

Basic DDOS Attacks

Signature based attacks (Teardrop, Land, Smurf, Nuke,Fraggle vb) Volumetric attacks (legal and illegal attacks) Reflection (dns, syn) Application based attacks: e.g. Slow attacks Connection attacks

Page 15: Ddos and mitigation methods.pptx (1)

Protocols used in DDOS

TCP/IP Tcp,udp, icmp,

Other (GRE, ESP etc) IPv4 IPv6 Application layer

Http, dns, VOIP etc.

Page 16: Ddos and mitigation methods.pptx (1)

IP Spoofing (&How to detect it)

uRPF- Unicast reverse path forwarding. Source IP of packet is compared to the FIB table in router and

dropped if routes are not the same. Authentication First packet drop, and let following packets go.

Page 17: Ddos and mitigation methods.pptx (1)

Attack Tools

Hping, nping, mz, isic Slowloris, httpflooder, Torshammer, jmeter, ab, httpDOS, R-U-D-Y,

pyloris etc. Scripts (socket programming: Python, Perl etc)

Page 18: Ddos and mitigation methods.pptx (1)

Volumetric Attacks

Band filling attacks Network attacks (syn, syn-ack, ack, udp flood etc) Application Attacks (http, https, dns, voip etc) Botnet, HOIC, LOIC

Page 19: Ddos and mitigation methods.pptx (1)

Application Layer DDOS

Slow attack (Apache)- slowloris, pyloris etc Slow Read- tcp window size RUDY- HTTP post XML dos SIP invite- multiple udp calls to overwhelm server..

Page 20: Ddos and mitigation methods.pptx (1)

How to mitigate DDOS attacks?

WL/BL (ALL protocols) ACL (All protocols) Fingerprint (udp, dns) Authentication (tcp, http, dns) Session management (dns, tcp) Statistical Methods Rate Limit

Page 21: Ddos and mitigation methods.pptx (1)

Syn Flood and Prevention

Attacker

ServerSyn

Syn

SynSyn

Syn-Ack

Syn-AckSyn-Ack

• Most popular ddos attack is syn flood.• Protection method: Authentication and WL. (Whitelisting) (Syn

cookie vs. syn proxy)• Syn reflection factor• Syn flood from real IP addresses: TCP ratio mechanism

Page 22: Ddos and mitigation methods.pptx (1)

Syn-Ack Flood and Mitigation

Attacker

ServerSyn-AckSyn-Ack

Syn-AckSyn-Ack

• Protection: Check session table if syn-ack’s are real.

Page 23: Ddos and mitigation methods.pptx (1)

Ack Flood ve Mitigation

Attacker

ServerAckAck

AckAck

• Protection: Check session table if ack’s are real.

Page 24: Ddos and mitigation methods.pptx (1)

FIN/RST Flood and Mitigation

Attacker

ServerFin/RstFin/Rst

Fin/RstFin/Rst

• Protection: Check session table if packets are real.

Page 25: Ddos and mitigation methods.pptx (1)

Udp Flood and Mitigation

Attacker

ServerUdpUdp

UdpUdp

• Udp is the most effective for ddos • Protect method: Payload and Header.

(Fingerprint)• Dest.port, source port, ttl, source/dest IP

also checked• ACL• Traffic limiting

Page 26: Ddos and mitigation methods.pptx (1)

Icmp Flood and Mitigation

Attacker

ServerIcmpIcmp

IcmpIcmp

• Protect method: Payload and Header. (Fingerprint)

• Session check (query, response)• Rate limit• ACL

Page 27: Ddos and mitigation methods.pptx (1)

TCP Connection Flood & Mitigation Low rate attack (Protection: Number of connections are analyzed- Bot detection methods

are used) TCP Null connection attack (No packets after handshake) Also check for rates of:

New connections Total connections per

second

Page 28: Ddos and mitigation methods.pptx (1)

TCP Retransmission Attack

Page 29: Ddos and mitigation methods.pptx (1)

SIP Flood

Page 30: Ddos and mitigation methods.pptx (1)

SIP Invite Flood

Page 31: Ddos and mitigation methods.pptx (1)

SIP Flood Prevention Methods

Traffic limiting Source IP limiting Fingerprint

Page 32: Ddos and mitigation methods.pptx (1)

Http(s) Get/Post Flood

Attacker

ServerSyn

HTTP get

AckSyn-Ack

HTTP getHTTP get

HTTP get

Page 33: Ddos and mitigation methods.pptx (1)

Http Ddos Detection & Mitigation Methods Authentication (Http redirection) SSL Ddos (Crypto handshake messages increase abnormally) Captcha usage Fingerprint

Page 34: Ddos and mitigation methods.pptx (1)

Example: Http Get Attack

Page 35: Ddos and mitigation methods.pptx (1)

DNS Flood Is the target DNS: Authoritative DNS or cache DNS?

Page 36: Ddos and mitigation methods.pptx (1)

DNS Attacks- Continued

Dns Cache poisoning attack

Dns reflection attack

Dns query/repsonse attacks

Page 37: Ddos and mitigation methods.pptx (1)

DNS Query/Response Attacks

SP DNS

1. What is the IP for abc.google.com?

2. What is the IP for abc.google.com?

Attacker

3. IP= XXX.XXX.XXX =news.google.com

DNS Reply Flood

Attacker

Page 38: Ddos and mitigation methods.pptx (1)

DNS Cache Poisoning

SP DNS

1. What is the IP for abc.google.com?

2. What is the IP for abc.google.com?

Attacker

3. abc.google.com= x.x.x.x

DNS Reply

Attacker

• Domain info on Cache DNS servers are attempted to be changed with the fake one.

• Attacker should guess the query id correctly. (which is so easy if query id’s are not random)

DNS Reply

Page 39: Ddos and mitigation methods.pptx (1)

DNS Reflection

Open DNS resolvers

1. What is the IP for abc.google.com?

2. What is the IP for abc.google.com?

Attacker

DNS Reply

• Attacker uses victim’s IP address as his source, and sends a dns query to all known dns servers.

• Thousands of resolvers return the answer to the victim and victim is Ddos’ed

DNS Reply

DNS authority

Victim

Page 40: Ddos and mitigation methods.pptx (1)

DNS Attacks

Conclusion:

DNS attacks are very dangerous and can be performed with the least effort and cost .

Ddos attacks are on the rise every year and quite possible to be so in the future.

Udp and Dns based ddos attacks are the most effective protocols for ddos.

Page 41: Ddos and mitigation methods.pptx (1)

Methods To Protect Against DNS Ddos Attacks Session control (Two way traffic) DNS proxy, caching DNS-Tcp Authentication First packet drop Domain name limiting Traffic limiting

Page 42: Ddos and mitigation methods.pptx (1)

An Effective Mitigation Technique: Fingerprinting Packet header and payload is analyzed to determine a fingerprint of

attack.

Page 43: Ddos and mitigation methods.pptx (1)

Syn Reflection

Page 44: Ddos and mitigation methods.pptx (1)

DNS Reflection (Attack multiplier 10x)

Page 45: Ddos and mitigation methods.pptx (1)

NTP Amplification ( Attack multiplier 300x)

Can also use snmp for upto 600x , however snmp seldom allows nonauthenticated clients

11 February 2015: New NTP attack: 400gbps

Page 46: Ddos and mitigation methods.pptx (1)

Ddos Summary

Extremely easy to attack ( Many free and user friendly tools) Impossible to be detected (If correctly hides) Big effects on the victim Attack types and methods are broad. Every application or service has its own ddos vulnerabilities ...Spoofing is possible and mostly costless ...AGAIN.. attack tools are free

Page 47: Ddos and mitigation methods.pptx (1)

THANKS

QUESTIONS???