When the Sky is Falling Network-Scale Mitigation of High-Volume Reflection/Amplification DDoS Attacks Mike Sabbota

Slides:



Advertisements
Similar presentations
© 2011 Infoblox Inc. All Rights Reserved. Infoblox – control, secure & automate Mike Carroll.
Advertisements

When the Sky is Falling Network-Scale Mitigation of High-Volume Reflection/Amplification DDoS Attacks.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
2011 Infrastructure Security Report 7 th Annual Edition CE Latinamerica Carlos A. Ayala
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Computer Security and Penetration Testing
Internetworking Fundamentals (Lecture #1) Andres Rengifo Copyright 2008.
Security Awareness: Applying Practical Security in Your World
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture 15 Denial of Service Attacks
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
Worldwide Infrastructure Security Report C F Chui, Arbor Networks.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Networking Components Chad Benedict – LTEC
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
– Chapter 4 – Secure Routing
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
TCOM 515 Lecture 6.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Common Devices Used In Computer Networks
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
Akamai Technologies - Overview RSA ® Conference 2013.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
--Harish Reddy Vemula Distributed Denial of Service.
BCOP on Anti-Spoofing Long known problem Deployment status Reason for this work Where more input needed.
LAN Switching and Wireless – Chapter 1
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Distributed Denial of Service Attacks
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
Overlay Networks: An Akamai Perspective Ramesh K. Sitaraman, mangesh kasbekar, Woody Lichtenstein, and Manish Jain Akamai Technologies Inc Univerisy of.
Advanced Computer Networks Lecturer: E EE Eng. Ahmed Hemaid Office: I 114.
DoS/DDoS attack and defense
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
Overlay Networks : An Akamai Perspective
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. SANS ‘98 Conference -
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
Data Centers and Cloud Computing 1. 2 Data Centers 3.
© A10 Networks, Inc. Distributed Prevention of DoS Collaboration is key.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
NT1210 Introduction to Networking
Network Layer IP Address.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Chapter 1: Explore the Network
Instructor Materials Chapter 1: LAN Design
DDoS Attacks on Financial Institutions Presentation
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Firewalls.
6. Application Software Security
Presentation transcript:

When the Sky is Falling Network-Scale Mitigation of High-Volume Reflection/Amplification DDoS Attacks Mike Sabbota Consulting Systems Engineer

What is a Distributed Denial of Service (DDoS) attack? An attempt to consume finite resources, exploit weaknesses in software design or implementation, or exploit lack of infrastructure capacity Targets the availability and utility of computing and network resources Attacks are almost always distributed for even more significant effect (i.e., DDoS) The collateral damage caused by an attack can be as bad, if not worse, than the attack itself DDoS attacks affect availability! No availability, no applications/services/ data/Internet! No revenue! DDoS attacks are attacks against capacity and/or state! DDoS Background

Availability is Hard! Maintaining availability in the face of attack requires a combination of skills, architecture, operational agility, analytical capabilities, and mitigation capabilities which most organizations simply do not possess In practice, most organizations never take availability into account when designing/speccing/building/deploying/testing online apps/services/properties In practice, most organizations never make the logical connection between maintaining availability and business continuity In practice, most organizations never stress-test their apps/services stacks in order to determine scalability/resiliency shortcomings and proceed to fix them In practice, most organizations do not have plans for DDoS mitigation - or if they have a plan, they never rehearse it!

Evolution of Reflection/Amplification DDoS Attacks Many varieties of reflection/amplification DDoS attacks have been observed ‘in the wild’ for 18 years or more. Beginning in October of 2013, high-profile NTP reflection/amplification DDoS attacks were launched against various online gaming services. With tens of millions of simultaneous users affected, these attacks were reported in the mainstream tech press. But these attacks aren’t new – the largest observed DDoS attacks are all reflection/amplification attacks, and have been for years. Reflection/amplification attacks require the ability to spoof the IP address of the intended target. In most volumetric DDoS attacks, throughput (pps) is more important that bandwidth (bps). In most reflection/amplification DDoS attacks, bps is more important than pps – it fills the pipes! 4

Components of a Reflection/Amplification DDoS Attack Amplification Attacker makes a relatively small request that generates a significantly-larger response/reply. This is true of most (not all) server responses. Reflection Attacker sends spoofed requests to a large number of Internet connected devices, which reply to the requests. Using IP address spoofing, the ‘source’ address is set to the actual target of the attack, where all replies are sent. Many services can be exploited to act as reflectors. 5

What Types of Devices Are Being Abused? Consumer broadband customer premise equipment (CPE) devices – e.g., home broadband routers/modems with insecure (and sometimes insecurable!) factor default settings Commercial-grade provider equipment (PE) devices – e.g., larger, more powerful routers and layer-3 switches used by ISPs and enterprises Servers (real or virtual) running misconfigured, abusable service daemons – home servers set up by end-users, commercial servers set up by ISPs and enterprises. Embedded devices like network-connected printers (!), DVRs, et. al. The Internet of Things is rapidly becoming the Botnet of Things! 6

Impact of Reflection/Amplification DDoS Attacks Servers, services, applications, Internet access, et. al. on the target network overwhelmed and rendered unavailable by sheer traffic volume – tens or hundreds of gb/sec frequent. Complete saturation of peering links/transit links of the target network. Total or near-total saturation of peering links/transit links/core links of intermediate networks between the reflectors/amplifiers and the target network – including the networks of direct peers/transit providers of the target network Widespread collateral damage – packet loss, delays, high latency for Internet traffic of uninvolved parties which simply happens to traverse networks saturated by these attacks. Unavailability of servers/services/applications, Internet access for bystanders topologically proximate to the target network. 7

The Two Main Factors Which Make These Attacks Possible Failure to deploy anti-spoofing mechanisms such as Unicast Reverse-Path Forwarding (uRPF), ACLs, DHCP Snooping & IP Source Guard, Cable IP Source Verify, ACLs, etc. on all edges of ISP and enterprise networks. Misconfigured, abusable services running on servers, routers, switches, home CPE devices, etc. 8

Peer B Peer A NOC IXP-W IXP-E Video, Music, Gaming etc.) Mobile Infrastructure Effects of a 300gb/sec Reflection/Amplification DDoS Attack on Network Capacity Peer A Peer B Peer C Peer D

Peer B Peer A NOC IXP-W IXP-E Video, Music, Gaming etc.) Mobile Infrastructure Effects of a 300gb/sec Reflection/Amplification DDoS Attack on Network Capacity Peer A Peer B Peer C Peer D

Peer B Peer A NOC IXP-W IXP-E Video, Music, Gaming etc.) Mobile Infrastructure Effects of a 300gb/sec Reflection/Amplification DDoS Attack on Network Capacity Peer A Peer B Peer C Peer D

Peer A Peer B Peer A Peer B NOC IXP-W IXP-E Peer C Video, Music, Gaming etc.) Mobile Infrastructure Effects of a 300gb/sec Reflection/Amplification DDoS Attack on Network Capacity Peer D

AbbreviationProtocolPortsAmplification Factor # Abusable Servers CHARGENCharacter Generation Protocol UDP / 1918x/1000xTens of thousands (90K) DNSDomain Name System UDP / 53160xMillions (27M) NTPNetwork Time Protocol UDP / xOver One Hundred Thousand (128K) SNMPSimple Network Management Protocol UDP / xMillions (5M) Amplification Factor 13

Characteristics of an NTP Reflection/Amplification Attack The attacker spoofs the IP address of the target of the attack, sends monlist, showpeers, or other NTP level-6/- 7 administrative queries to multiple abusable NTP services running on servers, routers, home CPE devices, etc. The attacker chooses the UDP port which he’d like to target – typically, UDP/80 or UDP/123, but it can be any port of the attacker’s choice – and uses that as the source port. The destination port is UDP/123. The NTP services ‘reply’ to the attack target with non-spoofed streams of ~468-byte packets sourced from UDP/123 to the target; the destination port is the source port the attacker chose when generating the NTP monlist/showpeers/etc. queries. 14

2014 ATLAS: NTP Reflection/ Amplification  Growth of NTP attacks clearly shown in ATLAS traffic data. −Average of 1.29 Gbps NTP traffic globally in November 2013 −Average of Gbps in February 2014  Cooling off through the end of March −Still significantly above 2013 levels Proportion of Events with Source Port 123

Characteristics of an NTP Reflection/Amplification Attack (cont.) As these multiple streams of non-spoofed NTP replies converge, the attack volume can be huge – the largest verified attack of this type so far is over 300gb/sec. 100gb/sec attacks are commonplace. Due to sheer attack volume, the Internet transit bandwidth of the target, along with core bandwidth of the target’s peers/upstreams, as well as the core bandwidth of intermediary networks between the various NTP services being abused and the target, is saturated with non-spoofed attack traffic. In most attacks, between ~4,000 - ~7,000 abusable NTP services are leveraged by attackers. Up to 50,000 NTP services have been observed in some attacks. 16

NTP Reflection/Amplification Attack Methodology 17 Abusable NTP Servers Internet-Accessible Servers, Routers, Home CPE devices, etc. VICTIM /32 UDP/80 – UDP/123, ~50 bytes/packet Spoofed Source: Destinations: Multiple NTP servers NTP query: monlist UDP/80 – UDP/123, ~50 bytes/packet Spoofed Source: Destinations: Multiple NTP servers NTP query: monlist UDP/123 – UDP/80, ~468 bytes/packet Non-Spoofed Sources: Multiple NTP Servers Destination: Reply: Up to 500 packets of monlist replies UDP/123 – UDP/80, ~468 bytes/packet Non-Spoofed Sources: Multiple NTP Servers Destination: Reply: Up to 500 packets of monlist replies Impact

NTP Reflection/Amplification Attack 18

NTP Reflection/Amplification Attack 19

NTP Reflection/Amplification Attack 20

Reflection/Amplification DDoS Attack Summary Abusable services are widely misimplemented/misconfigured across the Internet Large pools of abusable servers/services Gaps in anti-spoofing at network edges High amplification ratios Low difficulty of execution Readily-available attack tools Extremely high impact – ‘The sky is falling!’ Significant risk for potential targets and intermediate networks/bystanders 21

What Not to Do! Do not indiscriminately block UDP/123 on your networks! Do not indiscriminately block UDP/53 on your networks! Do not block UDP/53 packets larger than 512 bytes! Do not block TCP/53 on your networks! Do not indiscriminately block UDP/161 on your networks! Do not indiscriminately block UDP/19 on your networks! Do not indiscriminately block fragments on your networks! Do not block all ICMP on your networks! At the very least, allow ICMP Type-3/Code-4, required for PMTU-D. If you do these things, you will break the Internet for your customers/users! 22

Don’t Be Part of the Problem! Deploy antispoofing at all network edges. –uRPF Loose-Mode at the peering edge –uRPF Strict Mode at customer aggregation edge –ACLs at the customer aggregation edge –uRPF Strict-Mode and/or ACLs at the Internet Data Center (IDC) aggregation edge –DHCP Snooping (works for static addresses, too) and IP Source Verify at the IDC LAN access edge –PACLs & VACLs at the IDC LAN access edge –Cable IP Source Verify, etc. at the CMTS –Other DOCSIS & DSL mechanisms If you get a reputation as a spoofing-friendly network, you will be de- peered/de-transited and/or blocked! 23

Don’t Be Part of the Problem! (cont.) Proactively scan for and remediate abusable services on your network and on customer/user networks, including blocking traffic to/from abusable services if necessary in order to attain compliance Check to see if abusable NTP services have been identified on your networks and/or customer/user networkshttp:// Check to see if abusable open DNS recursors have been identified on your network or on customer/user networks. Collateral damage from these attacks is widespread – if there are abusable services on your networks or customer/user networks, your customers/users will experience significant outages and performance issues, and your help-desk will light up! 24

Are We Doomed? No! Deploying existing, well-known tools/techniques/BCPs results in a vastly improved security posture with measurable results. Evolution of defenses against these attacks demonstrates that positive change is possible – targeted organizations & defending ISPs/MSSPs have altered architectures, mitigation techniques, processes, and procedures to successfully mitigate these attacks. Mitigation capacities are scaling to meet and exceed attack volumes – deployment architecture, diversion/re-injection bandwidth, leveraging network infrastructure are key. Automation is a Good Thing, but it is no substitute for resilient architecture, insightful planning, and smart opsec personnel, who are more important now than ever before!