Top Banner
ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS
17

ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

Dec 24, 2015

Download

Documents

Maude Butler
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

ISSA Nashville Chapter, May 17th 2013

Alexander KarstensSenior Systems Engineer

IXIA Communications

Preparing your organization for DDoS

Page 2: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

Agenda

DDoS Trends DDoS Attacks DDoS Mitigation Useful tools Q&A

Page 3: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

DDoS Trends

Page 4: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

DDoS Trends

• Motivation Behind DDoS/DoS Attacks– Political/Hacktivism– Ransoms– Retaliation– Competition– Unknown

Page 5: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

DDoS Trends

Network

Server

Application

Business

Large volume network flood attacks

High & Low rate application DoS attacks

“Low & Slow” DoS attacks

Brute force attack

Web application attacks (e.g. XSS, Injections, CSRF)

SYN flood

Port scan

Network scan

Intrusion

Intrusion, Malware

SHUTDOWN

Page 6: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

DDoS TrendsNetwork

Server

Application

Business

• Volumetric network level• Application level , Encrypted• Low & Slow• Directed Application DoS• Intrusions • Web attacks (injections, XSS,…)

Page 7: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

DDoS Trends (future?)

• What about IPv6? You may not use in your organization, yet most newer desktops (Windows 7 anyone?)

– Tunnel IPv6 over IPv4 (Utilities moving to IPv6 to address meters)….and on top of that they are wireless as well.

• It’s seem feasible for someone to build a botnet using mobile phones. Add 4G to the mix and you have plenty of bandwidth to ‘play’ with. QR codes anyone?

• WiFi is now carrying critical applications. There are host of WiFi level DDoS attacks (both AP and controller)

• OpenFlow?

Page 8: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

DDoS Mitigation

Page 9: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

The Attack Cycle

Page 10: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

DDoS Attacks• Volume Metric attacks (pipe fillers)

– SYN Floods– UDP Floods– DNS Floods – Amplification attacks (mostly DNS, but could

also be VoIP)• Application layer attacks (low and slow)

– SlowLoris– Hash Attack– PyLoris (HTTP, SMTP, IMAP…)– RUDY (R-U-DEAD-YET)– SSL (server has to work 10 times harder than

the SSL client)

Page 11: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

DDoS Mitigation

Internet

Ingress Traffic with Attack

Network

Traffi

c – In

/Out-

boundIngress Clean Traffic

Scrubbing centers

Protected customer

Anti-DDoS 24x7 SOC

MSP

“CPE” Mitigator

Premise Based Scrubbing 1. Better visibility and response time2. Coverage• Low & Slow • Application level DoS attacks• Encrypted attacks • Asymmetrical traffic issues• “Local” Mitigation

3. Signaling capabilities • Detection • Base lines• RT signatures

Scrubbing center

• Bandwidth attacks• High capacity scrubber• Multi-home (Carrier agnostic)• Anti-DoS SOC

Signaling(Diversion decision)

“Always-On” Solution

Page 12: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

DDoS Mitigation• Who can solve the problem

– Firewalls– IPS– WAF– ADC– Web Proxies

• A single technology does not solve the problem

• Architecture, Architecture• Elements and Architecture need to

be sized and verified

Page 13: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

DDoS Mitigation• Architecture

– Cloud Scrubber- volumetric attacks

– CPE Scrubber- app attacks, low and slow

– Border Routers – Tier 1 FW- presentation– ADC- SSL termination– WAF- application attacks,

SQL Injection– IPS- host based attacks– Tier 2 FW- application

Border Router Border Router

SSL TerminatorCPE Scrubber

SSL TerminatorCPE Scrubber

Border FWBorder FW

ADC ADC

WAFWAF

IPS IPS

Cloud Scrubber

Page 14: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

Helmuth von Moltke Explains Modern DDoS

"No plan of operations extends with certainty beyond the first encounter with the enemy's

main strength” or

"no plan survives initial contact with the enemy”

Page 15: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

Usefool tools

• Logstalgia (visualization tool…reads NCSA formatted server logs)

• PyLoris (multi purpose application layer attack tool…requires Python)

• SlowLoris (HTTP only)• LOIC (sourceforge.net…Low Orbit because it send attacks at

L3/4)• HOIC (similar to SlowLoris, but has booster back to ‘adapt’ to

countermeasures)

Page 16: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

17

How can individual machines cause a big enough distraction with todays typical volume of network traffic?

My lowend Core i3 laptop can put out a 12K PPS DDoS

Multiply that by even a few thousand machines…

Page 17: ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.

Thank You