25
1 Distributed Denial of Service Attacks Steve Crocker Chair, SSAC June 25, 2007 San Juan, Puerto Rico

Ssac La Estonia Ddos Attacks 25jun07

Embed Size (px)

Citation preview

Page 1: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 1/25

1

Distributed Denial of Service Attacks

Steve Crocker Chair, SSAC

June 25, 2007

San Juan, Puerto Rico

Page 2: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 2/25

2

Agenda

• Types of Attacks

• DDoS attacks

• Amplified DDoS attacks - 2006• Estonia - May 2007

• What do Do

Page 3: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 3/25

3

Types of Attacks

• Penetration

• Eavesdropping

• Man-in-the-Middle• Flooding

Page 4: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 4/25

4

Penetration

• Attacker gets inside your machine

• Can take over machine and do whatever 

he wants• Achieves entry via software flaw(s), stolen

passwords or insider access

Page 5: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 5/25

5

Eavesdropping

• Attacker gains access to same network

• Listens to traffic going in and out of your 

machine

Page 6: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 6/25

6

Man-in-the-Middle (‘MITM”)

• Attacker listens to output and controls

output

• Can substitute messages in bothdirections

Page 7: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 7/25

7

Flooding Attack

• Attacker sends an overwhelming number of messages at your machine; great congestion

• The congestion may occur in the path before

your machine• Messages from legitimate users are crowded out

• Usually called a Denial of Service (DoS) attack,because that’s the effect.

• Usually involves a large number of machines,hence Distributed Denial of Service (DDoS)attack

Page 8: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 8/25

8

Effects of Attacks

• Modification of internal data, change of 

programs

 – Includes defacement of web sites• Destruction of data

• Unauthorized Disclosure

• Denial of Service (DoS)

Page 9: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 9/25

9

Attacks and Effects

XFlooding

XEavesdropping

XXMITM

XXXXPenetration

DoSDiscDesMod

Page 10: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 10/25

10

Denial of Service Attacks

• A Denial of Service (DoS) attack is anorchestrated traffic jam

• Purpose is to shut down a site, not penetrate it.

• Purpose may be vandalism, extortion or socialaction (including terrorism) – Sports betting sites often extorted

• Large numbers of attacks -- few visible

 – Estonia – Root servers, TLD operations

Page 11: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 11/25

11

Distributed DoS (DDoS)

• Most common DoS attacks use thousandsof computers

 – Sometimes hundreds of thousands

• Individual computers (“zombies”) arepenetrated and marshaled into commonforce (“bot armies”)

• Tools easily available• Bot armies available for rent

Page 12: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 12/25

12

Amplified DDoS Attacks

• New wrinkle observed last year 

• Bots send DNS queries with false return

addresses• Responses are aimed at target

• Responses are much larger than queries

Page 13: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 13/25

13

January - February, 2006

• Authoritative TLD DNS servers attacked

• Variant of a well-known DDoS attack

• Attacks generated from 2 - 8 Gbps

• Failures occurred at multiple points

• Resulted in disruption of DNS services

• Included many TLDs without any apparent motive in

most cases

Page 14: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 14/25

14

...Attacker 

Target name

server at

IP = 10.10.1.1

...

Open

recursive

servers

Name server bar.<tld>

(3) Open resolvers

ask bar.<tld> for record “foo”

(4) bar.<tld> responds

with record “foo”(4000 byte DNS TXT RR)

(5) Open resolvers send

DNS response with(4000 byte DNS TXT RR)

to target name server 

(1) Attacker directszombies to

begin attack

(2) All zombies send

DNS query for record “foo”

in domain “bar.<tld>”

 to open recursive serversand set source IP=10.10.1.1

Zombies

Anatomy of the Amplification Attack

Page 15: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 15/25

15

One AttackGraph of responses to

monitoring probes by the

authoritative nameservers

for a TLD before, during, and

after an attack in February

2006.

Vertical Axis shows the six

TLD Server IP addresses.

Red shows complete failure

to answer, yellow indicates

slow answers. For reference,

Servers 1 and 4 show lesser 

impact than Servers 2, 3, 5,and 6. The horizontal axis

shows actual time. This

attack lasted 14 minutes.

Graphs courtesy of RIPE NCC. 

Page 16: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 16/25

16

Attack Metrics (1)

• 51,000 open recursive servers were involved

• 55 byte query resulted in a 4,200 byte response, for a1:76 amplification

• 8 gbps attack requires a total of 108 mbps of queries.

• Each recursive server saw 2,100 bytes of queries, or 38qps, and responded with 160 kbps in answers

• Assuming compromised hosts have minimum 512kbDSL modem, only 200 compromised hosts were required

Page 17: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 17/25

17

Attack Metrics (2)

• Source networks would see no effect

• Recursive servers saw minimal traffic or query increase

• Victim network providers had catastrophic experience

• Victim DNS provider was sent the equivalent of 150million qps

• At best, 1 in 100 real queries were answered

Page 18: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 18/25

18

Estonia Attack

• Estonia

• Protests & Cyber Attacks

• Response

Page 19: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 19/25

19

Estonia

• 1.4 million people

• Substantial ethnic Russian minority

• Extensive Internet use – Banking, voting, petrol purchase, etc.

 – 60% use Internet daily

 – “Real life” and Internet intermingled

• Only a few connections to other countries

Page 20: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 20/25

20

Protests & Cyber Attacks

• Relocation of Russian statue triggered

protests

 – Outside Estonia as well as inside• Defacement and DDoS

• Attacks were dominated by bot armies

• Almost all traffic came from outside

Page 21: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 21/25

21

Response

• Excellent coordination inside Estonia

 – CERT, ISPs

• Technical people and governmentinstitutions communicated, cooperated

• Help from outside

• External traffic to government stopped

Page 22: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 22/25

22

References

• mp3 talk from Hillar Aarelaidhttp://www.ripe.net/ripe/meetings/ripe-

54/presentations/friday.html.mp3:http://www.ripe.net/ripe/meetings/ripe-54/podcasts/plenary-

10.mp3• (talk is at 38 minutes)

Page 23: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 23/25

23

Comments & Possible Policy Options

• DDoS attacks are a serious problem

 – Good hygiene protects against penetration

 – No good protection against DDoS• Coordinated community action required

• CERTs, etc. good for response

• Need better design and operation

Page 24: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 24/25

24

Two Specific Actions

• Require address validation

 – All packets coming into a network must have

a valid return address

 – Won’t solve the full problem but will reduce a

large range of attacks

• Label and prioritize traffic coming from

protected sources – Reward non-zombie sites

Page 25: Ssac La Estonia Ddos Attacks 25jun07

8/6/2019 Ssac La Estonia Ddos Attacks 25jun07

http://slidepdf.com/reader/full/ssac-la-estonia-ddos-attacks-25jun07 25/25

25

References

SAC004 Securing The Edge (17 October 

2002)

SAC008 DNS Distributed Denial of Service(DDoS) Attacks (31 March 2006)

http://www.icann.org/committees/

security/ssac-documents.htm