31
Bruce Van Nice Vulnerable Internet “Things” Fuel DNS-based DDoS HKNOG Sept 2015

Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

Bruce Van Nice

Vulnerable Internet “Things” Fuel

DNS-based DDoS

HKNOG Sept 2015

Page 2: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

• Introducing Nominum

• Why DNS Security Matters

• DNS Data Science

• Better DNS Security

2

Agenda

Page 3: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

Company Confidential

Trusted Partner to the Globe’s Leading Service Providers

3

Over 1.5 trillion DNS transactions daily

Global footprint

spans 40 countries

Page 4: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

Why DNS Security Matters

4

Page 5: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

• DNS-based DDoS attacks increasing

– DNS Amplification

– Random subdomain attacks – focus of this presentation

• Attack vectors

– Open home gateways

– NEW - Bot malware

• Stress on DNS worldwide

• Other DNS and network exposure

– Bots

– Cache poisoning

5

DNS Security Exposure

Page 6: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

6

Why DNS Security Matters

• Customer satisfaction– DNS availability and a safe experience promote customer satisfaction

• Operational efficiency– Clean networks perform reliably and predictably – no fire drills

• Economics– Incremental savings - infrastructure, bandwidth, support

• Network Integrity– Confidence infrastructure isn't, or can’t easily be compromised

• Peer reputation– Contractual obligations, negotiating leverage, industry stature

Page 7: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

7

DNS DDoS: Two Kinds of Attacks

1

Internet

ISP

Resolver

Query with

randomized

subdomains

2

3

Authoritative

Server

Compromised

hosting

Recursive

queries

Open DNS

Proxy

Home Gateway

OR

bot

4 NXD

responses

ISP

DNS Amplification Attacks

1

Internet

Small

Queries 3

Target

Web Site

Compromised

hosting

Large

Answers

Open DNS

Proxy

Home Gateway

OR

bot

ISP

Random Subdomain Attacks

2

Target

Web Site

ISP

Resolver

Two vectors: open home gateways or bots

Page 8: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

8

Open Resolvers WorldWide

Page 9: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

9

Typical “Day in the Life” DNS Queries Seen at Resolvers

89%

11%DDoS

Other

Page 10: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

10

Typical “Day in The Life”DDoS Queries Seen at a Resolver

15%

85%

Amplification

Random

Subdomain

Page 11: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

11

Random Subdomain Attack Trends

2014 Data

Page 12: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

12

2015 – Quieter in Some Ways

0

1000

2000

3000

4000

5000

6000

Millions of Unique Names

JAN FEB MAR APR

2015 Data

All quiet???

Page 13: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

• Every query requires recursion

– Far more work for resolvers – estimate 5x or more

– More work for authorities responding with NXD

• Attacks on popular domains complicate filtering

• Home Gateways mask spoofed source IP

• Bots operate wholly within provider networks

– Filtering DNS at borders won’t work

• Observed tendency for cascading failures

– Authorities and resolvers

13

Attacks Cause Many Problems

Page 14: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

14

Categorizing Attacks

• Attacks distinguished by:

– Randomization algorithms

– Use of open DNS proxies or bots

– Traffic patterns – intensity, duration, ToD

– Domains attacked

• LOTS of other attack activity out in the long tail

Page 15: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

• Use of open resolvers/proxies still predominates

– Installed base around 17 M mostly home gateways

– Trend toward more stealthy attacks - Send enough traffic

to bring down authorities

– Highly distributed attacks – 1,000s of open resolvers per

attack

– Often low intensity per IP

– Example: www.appledaily.com commonly attacked

15

Observations

Page 16: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

• Bot based attacks

– Tend to be few IPs - tens to hundreds

– High to very high intensity per IP

- Up to 1000s of QPS/IP

- Long tail with lower QPS

– Example: rutgers.edu

16

Observations

Page 17: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

nbpdestuvjklz.pay.shop6996.com.

1lHecqrP.xboot.net.

hxdfmo.iyisa.com.

a6ca.cubecraft.net.

17

Different Kinds of “Random”

Different Random Label Patterns = Different Attacks

Page 18: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

Alexa 1000 Names Rank

baidu.com. 5

blog.sina.com.cn. 13

xlscq.blog.163.com. 56

amazon.co.uk. 65

www.bet365.com. 265

www.lady8844.com. 389

d3n9cbih5qfgv5.cloudfront.net. 458

www.appledaily.com.tw. 565

asus.com. 702

18

Popular Names are Attacked

Attacks on popular names

must be handled carefully:

Fine Grained Policy, Whitelists

About 9% of names attacked are popular

Page 19: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

19

Summary Data 2015Random Subdomain Attacks

mean 24.6 names attacked/day

median 20 names attacked/day

mode 11 names attacked/day

range 3-105 (min-max) names attacked/day

stdev 16.8

Page 20: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

• Home gateways

• Surveillance cameras

• Set top boxes

• Bots scan networks for home gateways or other vulnerable devices

• Attempt to login with default passwords

• Load malware on gateway

• Malware sends huge volumes of specially crafted DNS queries

• Other vectors are possible:

– Bots with loaders

– Rompager

– Others

20

Known Compromised Devices

Page 21: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

21

Great Post: “The Internet of Stupid Things”

Page 22: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

22

Another Great Post: “Smartness is a Zero Sum Game”

Credit:

Nicolas Carr

Rough Type Blog

Sept 8, 2015

Page 23: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

23

What’s In Store

Page 24: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

24

Lots of Consumer “Things” on the Way!

http://openhouse.target.com/#/

Page 25: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

• Cost pressure

• Time to market pressure

• Vendors with little or no security knowledge

• Homogenous SW ecosystem - monoculture

• Can’t count on consumers to be vigilant

– Changing defaults

– Patching

• Etc

25

The Problem With “Things”

Page 26: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

26

“Things” Generate Intense Attack Traffic

0

2

4

6

8

10

百萬

Query Counts from Attacking IPsOne hours data – APAC provider network

# IPs involved in attack1 206

200 IPs sourced ~83M queries

15 IPs sourced ~61M queries

1 IP sourced ~ 9M queries

Page 27: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

27

Typical Attacks: 2 Days Data

0

75

150

225

300

Number of IPs used in attack per hour

Nov 16

19:00

Nov 18

8:00

Page 28: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

28

Example Attack Data

0%

20%

40%

60%

80%

Attack Queries as a Percentage of Total Traffic

Nov 16

19:00

Nov 18

8:00

70% of queries

from attack

Page 29: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

29

Existing Defenses Don’t Cover Today’s Exploits

InternetISP Network

Stealthy new DNS DDoS attacks

Growth and sophistication of botnets

DNS tunnels stealing service

Attacks originate inside networks &

target outside resources - “inside-out”

Page 30: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

• Ingress filtering

– PROTECT “GOOD” TRAFFIC

– Block “BAD” traffic

• Dynamic threat lists

– Track target domains by the minute

– Adapt as attacks evolve

For Details of Effectiveness of Ingress Filtering See:

DNS-OARC May 2015 Ralf Weber

“Digging Down Into DNS DDoS Data”

https://indico.dns-oarc.net/event/21/timetable/#20150509

30

Way Forward: Protecting the DNS

Page 31: Vulnerable Internet “Things” Fuel · 2016-03-04 · 12 2015 –Quieter in Some Ways 0 1000 2000 3000 4000 5000 6000 Millions of Unique Names JAN FEB MAR APR ... 10 百萬 Query

31

Summary

• Constant DNS-based DDoS evolution

• Open Home Gateways remain a problem

• Malware-based exploits have occurred

• “Things” may create new exposure

• Attackers refining techniques

• Remediation needs to be undertaken with care

– Clients want answers!!

– Critical to protect good traffic