YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Karim El Defrawy, Minas Gjoka, Athina Markopoulou

UC Irvine

Page 2: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 3: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Introduction

o In 2006, 60% of Internet traffic was due to peer-to-peer (P2P) protocols (Cache Logic)

o BitTorrent is more than 35% by end of 2006 (Cache Logic)

o Mininova torrent search engine hit 2 billion downloads (Mininova - June 13th 2007)

Page 4: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
Page 5: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

P2P traffic is rising

Page 6: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
Page 7: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

BitTorrent is responsible for a significant amount of P2P traffic

Page 8: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

P2P based DDoS attacks recently observed

o announced on May 14th 2007 observing an increase in P2P based DDoS attackso Attack based on the direct connect (DC) P2P systemo Attack involved over 300 000 IPso http://www.prolexic.com/news/20070514-alert.php

Page 9: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

P2P based DDoS attacks recently observed

o announced on May 14th 2007 observing an increase in P2P based DDoS attackso Attack based on the direct connect (DC) P2P systemo Attack involved over 300 000 IPso http://www.prolexic.com/news/20070514-alert.php

P2P DDoS is already happening !

Page 10: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 11: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How BitTorrent works?- User publishes torrents

- Set up a tracker to coordinate the download

Page 12: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How BitTorrent works?- User publishes torrents

- Set up a tracker to coordinate the download

1- Users download torrents

Page 13: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How BitTorrent works?- User publishes torrents

- Set up a tracker to coordinate the download

1- Users download torrents

2- Users’ clients contact tracker to join swarm and get list of peers in swarm

Page 14: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How BitTorrent works?- User publishes torrents

- Set up a tracker to coordinate the download

1- Users download torrents

2- Users’ clients contact tracker to join swarm and get list of peers in swarm

3- Download different parts of file from different peers

Page 15: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 16: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Different attacks

Entity Faked BT Mode Requirements

Report Fake Peer Centralized Tracker Mode

Send a spoofed message to tracker announcing victim as peer

Report Fake Tracker Centralized Tracker Mode

Publish torrents pointing to victim as a tracker

(multi-tracker)

Report Fake Peer DHT Mode Send fake BT PING message to DHT network spoofing source address of victim

Page 17: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Different attacks

Entity Faked BT Mode Requirements

Report Fake Peer Centralized Tracker Mode

Send a spoofed message to tracker announcing victim as peer

Report Fake Tracker Centralized Tracker Mode

Publish torrents pointing to victim as a tracker

(multi-tracker)

Report Fake Peer DHT Mode Send fake BT PING message to DHT network spoofing source address of victim

Page 18: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How an attack faking tracker works?

- Attacker publishes fake torrents with multiple tracker entries (or single)

- Set up a tracker to report high number of seeders and leechers for these torrents

Page 19: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How an attack faking tracker works?

- Attacker publishes fake torrents with multiple tracker entries (or single)

- Set up a tracker to report high number of seeders and leechers for these torrents

1- Users download torrents with fake trackers pointing to victim

Page 20: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How an attack faking tracker works?

- Attacker publishes fake torrents with multiple tracker entries (or single)

- Set up a tracker to report high number of seeders and leechers for these torrents

1- Users download torrents with fake trackers pointing to victim

2- Clients contact victim in hope of starting the download

Page 21: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How an attack faking tracker works?

- Attacker publishes fake torrents with multiple tracker entries (or single)

- Set up a tracker to report high number of seeders and leechers for these torrents

1- Users download torrents with fake trackers pointing to victim

2- Clients contact victim in hope of starting the download

….

Page 22: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 23: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Experiment Setup

o Victim machine: Pentium 2, 512 Mbps RAM, Debian Linux, 100Mbps Ethernet, running a light HTTP server

o Modified tracker reports a fake (high) number of seeders and leechers to search engine

o Publish fake torrents on search engines

o Wait ….

Page 24: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Proof of concept attack results

Exp. #

# Torrents

Ports Attacked Throughput (Kbps) Total Unique #

Hosts

TCP Conn. Avg/sec

New Host Interarrival Time (sec)

Open (Freq) Closed Avga Maxa

I 10 1 (1) 6 62.77 127.2 25331 753.93 7.89

II 25 1 (10) 10 137.78 520.4 55127 1400.74 3.62

III 25 1 (1) 501 132.97 380.3 86320 1580.88 2.31

IV 25 1 (50) + 1 (1) 49+201 176.69 482.8 58046 1440.17 3.44

a Excluding the initial transient period (6 hours) of the experiment

Page 25: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Number of TCP connections per second

Page 26: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Attack throughput

Page 27: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Amount of traffic from clients

Page 28: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Distribution of sources in the IP address space

Page 29: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

o Attack sources in 2433 ASs on the Internet

o Attack sources in 12424 announced BGP

prefixes

Mapping attack sources to ASs and BGP prefixes

Page 30: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Attack ports

Page 31: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Related Work

o Attack using Overnet : poison around 7000 files to be effective (Naoumov - 2006)

o Attack faking client: poison swarms of 1119 torrents to generate several thousand TCP connections (Cheung Sia - 2006)

o Attack faking tracker is more effective: tracker is a central point in the architecture

Page 32: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 33: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

We contacted:

o BitTorrent and Bram Cohen

o Search Engines: Mininova, Pirate Bay,

BitTorrent Monster

o Clients developers: Azureus, Bitcomet

o Prolexic

o Response from Azureus developers only

Reporting the problem

Page 34: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Solutions

o Handshake between clients and trackers similar to the one between clients.

o Clients exchange view of trackers similar to exchanging view of peers.

o Mechanism to identify and trace the seeders of the fake torrents (based on hashes).

Page 35: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 36: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Summary

o Presented misusing BitTorrent to launch DDoS attacks

o Proof of concept attack implementationo Analyzed characteristics of the attacko Proposed fixes to BitTorrent to detect and

prevent such attackso Currently implementing fixes

Page 37: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Questions ?

Page 39: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

100

101

102

103

104

105

0

0.002

0.004

0.006

0.008

0.01

0.012

0.014

B G P P refix Rank

Fra

cti

on

of

IPs

th

at

we

re i

n A

tta

ck

Distribution of IPs on BGP Prefixes

Page 40: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

100

101

102

103

104

0

0.005

0.01

0.015

0.02

0.025

0.03

0.035

0.04

A S Rank

Fra

cti

on

of

IPs

in

AS

th

at

we

re i

n A

tta

ck

Distribution of IPs on ASs

Page 41: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Unique hosts per second


Related Documents