Top Banner
Rob Thomas [email protected] http://www.cymru.com/ ~robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001
37

Rob Thomas [email protected] robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Mar 26, 2015

Download

Documents

Adrian Oliver
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

60 Days of Basic Naughtiness

Probes and Attacks Endured by an Active Web Site

16 March 2001

Page 2: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

60 Days of Basic Naughtiness

• Statistical analysis of log and IDS files.

• Statistical analysis of a two-day DDoS attack.

• Methods of mitigation.

• Questions.

Page 3: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

About the Site

• Production site for several (> 4) years.

• Largely static content.

• No e-commerce.

• Layers of defense – more on that later!

Page 4: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

About the Data

• Data from router logs.

• Data from IDS logs.

• Snapshot taken from 60 days of combined data.

• Data processed by several home-brew tools (mostly Perl and awk).

Page 5: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Definition of “Naughty”

• Any traffic that is logged by a specific “deny” ACL.

• Any traffic that presents a pattern detected by the IDS software.

• The two log sources are not necessarily synchronized.

Page 6: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Daily Probes and Attacks

• TCP and UDP Probes and Attacks – ICMP not counted.

• Average – 529.00

• Standard deviation – 644.10!

• 60 Day Low – 83.00

• 60 Day High – 4355.00

Page 7: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Daily Probes and AttacksDaily Probes and Attacks

0

500

1000

1500

2000

2500

3000

3500

4000

4500

5000

11/1

7/00

11/2

2/00

11/2

7/00

12/2

/00

12/7

/00

12/1

2/00

12/1

7/00

12/2

2/00

12/2

7/00

1/1/

01

1/6/

01

1/11

/01

Day

Hit

s TCP

UDP

Page 8: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Weekly Probes and Attacks

• There is no steady-state.• Attacks come in waves, generally on the

heels of a new exploit and scan.• Certain types of scans (e.g. Netbios) tend to

run 24x7x365. • Proactive monitoring, based on

underground and public alerts, will result in significant data capture.

Page 9: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Weekly Probes and AttacksTrend Analysis

Weekly Probes and Attacks

0

1000

2000

3000

4000

5000

6000

7000

8000

11/12 -11/18

11/19 -11/25

11/26 -12/02

12/03 -12/09

12/10 -12/16

12/17 -12/23

12/24 -12/30

12/31 -01/06

01/07 -01/13

01/14 -01/20

Week

Hit

s

Hits

Page 10: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Hourly Probes and Attacks

• Myth: “Most attacks occur at night.”

• An attacker’s evening may be a victim’s day – the nature of a global network.

• Truth: Don’t plan based on the clock.

Page 11: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Hourly Probes and AttacksTrend Analysis

Hourly Probes and Attacks

0

1000

2000

3000

4000

5000

6000

7000

8000

9000

10000

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24

24 Hour Clock

Hit

s

Page 12: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

UDP Probes and AttacksTop Five Destination Ports

• First – 137 NETBIOS

• Second – 53 DNS

• Third – 27960

• Fourth – 500 ISAKMP

• Fifth – 33480 (likely UNIX traceroute)

Page 13: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

UDP Probes and AttacksTrend Analysis

UDP Probes and Attacks

0

50

100

150

200

250

300

350

11/1

7/00

11/2

4/00

12/1

/00

12/8

/00

12/1

5/00

12/2

2/00

12/2

9/00

1/5/

01

1/12

/01

Day

Nu

mb

er

of

Hit

s

Port 137 Hits

Port 53 Hits

Page 14: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

TCP Probes and AttacksTop Five Destination Ports

• First – 3663 (DDoS Attack)

• Second – 0 Reserved (DDoS Attack)

• Third – 6667 IRC (DDoS Attack)

• Fourth – 81 (DDoS Attack)

• Fifth – 21 FTP-control

Page 15: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

TCP Probes and AttacksTrend Analysis

TCP Probes and Attacks

0

20

40

60

80

100

120

11/1

7/00

11/2

4/00

12/1

/00

12/8

/00

12/1

5/00

12/2

2/00

12/2

9/00

1/5/

01

1/12

/01

Date

Hit

s Port 0 Hits

Port 21 Hits

Page 16: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Source Address of Probes and Attacks

Classful Sources of Probes and Attacks

0

500

1000

1500

2000

2500

3000

3500

A B C D E

IP Netblock Class

Nu

mb

er

of

Un

iqu

e IP

Ad

dre

ss

es

Se

en

Source Address Class Percentage

20%

7%

20%

26%

27%

A

B

C

D

E

Page 17: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Source Address of Probes and AttacksBogon Source Percentages

2346

803

2275

1128

167

270

0

500

1000

1500

2000

2500

3000

3500

4000

A B C

IP Netblock Class

Un

iqu

e I

P A

dd

ress

es

Bogon Addresses

Total Addresses

Page 18: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Source Address of Probes and Attacks

• Bogon source attacks still common.• Of all source addresses, 53.39% were in the

Class D and Class E space.• Percentage of bogons, all classes –

66.85%!• This is good news – prefix-list, ACL

defense, and uRPF will block 66.85% of these nasties!

Page 19: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Source Region of the NaughtyA dangerously misleading slide

RIR for Source Addresses

58%

37%

5%

ARIN

RIPE

APNIC

Page 20: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Intrusion (attempt) Detection

• IDS is not foolproof!

• Incorrect fingerprinting does occur.

• You can not identify that which you can not see.

Page 21: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Top Five IDS Detected ProbesIDS Detected Probes

0

200

400

600

800

1000

1200

1400

NetBus Backorifice TFTP IDENT Deep Throat

Type

Hits

Page 22: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Top Five Detected IDS ProbesIDS Detected Probes - Trend Analysis

0

20

40

60

80

100

120

140

160

180

1 4 7 10 13 16 19 22 25 28 31 34 37 40 43 46 49 52

Date

Hits

NetBus

Backorifice

TFTP

IDENT

Deep Throat

Page 23: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Top Five IDS Detected AttacksIDS Detected Attacks

0

50

100

150

200

250

300

350

400

450

500

TCP Port 0 FIN flood Fragments ICMP flood RST flood

Type

Hits Number

Page 24: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Top Five IDS Detected SourcesIDS Detected Source Netblocks

0

20

40

60

80

100

120

140

160

180

200

Azerbaijan USA 01 South Korea USA 02 Canada

Netblock Location

Hit

s

Count

Page 25: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Top Five IDS Detected SourcesIDS Detected Attacks - Trend Analysis

0

20

40

60

80

100

120

140

160

1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45 47 49

Day

Hits

A

B

C

D

E

Page 26: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Match a Source with a ScanSource to Hit Matching

0

20

40

60

80

100

120

140

160

1 2 3 4 5 6 7

Day

Hit

s

B

NetBus

Backorifice

TFTP

IDENT

Deep Throat

Page 27: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Two Days of DDoS

• Attack that resulted in 10295 hits on day one and 77466 hits on day two.

• Attack lasted 25 hours, 25 minutes, and 44 seconds.

• Quasi-random UDP high ports (source and destination), small packets.

Page 28: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Two Days of DDoS

• Perhaps as many as 2000 hosts used by the attackers.

• 23 unique organizations.

• 9 different nations located in the Americas, Europe, and Asia.

• Source netblocks all legitimate.

Page 29: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Two Days of DDoSPackets per minute

0

10

20

30

40

50

60

70

24

:21

:13

24

:22

:03

24

:22

:53

24

:23

:46

25

:00

:36

25

:01

:26

25

:02

:16

25

:03

:06

25

:03

:56

25

:04

:46

25

:05

:36

25

:06

:26

25

:07

:16

25

:08

:06

25

:08

:56

25

:09

:46

25

:10

:36

25

:11

:26

25

:12

:16

25

:13

:06

25

:13

:56

25

:14

:46

25

:15

:36

25

:16

:26

25

:17

:16

25

:18

:06

25

:18

:57

25

:19

:48

25

:20

:39

25

:21

:37

25

:22

:29

DATE:HOUR:MINUTE

Pa

ck

ets

Page 30: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Two Days of DDoSDDoS Sources

0

500

1000

1500

2000

2500

3000

3500

4000

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

Hour

Pa

ck

ets

Page 31: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Site Defense and Attack Mitigation

• While you can not prevent an attack, you can choose how to react to an attack.

• Layers of defense that use multiple tools.

• Layers of monitoring and alert mechanisms.

• Know how to respond before the attack begins.

Page 32: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Site Defense and Attack Mitigation

• Border router– Protocol shaping and filtering.– Anti-bogon and anti-spoofing defense (uRPF),

ingress and egress filtering.– NetFlow.

• IDS device(s)– Attack and probe signatures.– Alerts.

Page 33: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Site Defense and Attack Mitigation

• Border firewall– Port filtering.– Logging.– Some IDS capability.

• End systems– Tuned kernel.– TCP wrappers, disable services, etc.– Crunchy through and through!

Page 34: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Site Defense and Attack Mitigation

• Don’t panic!

• Collect data!

• The good news - you can survive!

Page 35: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

References and shameless self advertisements

• RFC 2267 - http://rfc.net/rfc2267.html• Secure IOS Template –

http://www.cymru.com/~robt/Docs/Articles/secure-ios-template.html

• Secure BGP Template – http://www.cymru.com/~robt/Docs/Articles/secure-bgp-template.html

• UNIX IP Stack Tuning Guide – http://www.cymru.com/~robt/Docs/Articles/ip-stack-tuning.html

Page 36: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Any questions?

Page 37: Rob Thomas robt@cymru.com robt 60 Days of Basic Naughtiness Probes and Attacks Endured by an Active Web Site 16 March 2001.

Rob Thomas [email protected]://www.cymru.com/~robt

Thank you for your time!

• Thanks to Jan, Luuk, and Jacques for inviting me to speak with you today.

• Thanks to Surfnet/CERT-NL for picking up the travel.

• Thanks for all of the coffee!