2010. 5. Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.

Slides:



Advertisements
Similar presentations
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Advertisements

Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Lecture 15 Denial of Service Attacks
Design and Implementation of SIP-aware DDoS Attack Detection System.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Norman SecureSurf Protect your users when surfing the Internet.
Capacity Development Workshop on Public Information Management System and Policy in Korea on cyber attacks Jeong Min, Lee KISA.
Sravanthi Vattikuti Sri Harsha Devabhaktuni
APA of Isfahan University of Technology In the name of God.
Botnets An Introduction Into the World of Botnets Tyler Hudak
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
BotNet Detection Techniques By Shreyas Sali
Hacker Zombie Computer Reflectors Target.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
TTA activity for countering BOTNET attack and tracing cyber attacks 14 July, 2008 Heung-youl Youm TTA, Korea DOCUMENT #:GSC13-GTSC6-07 FOR:Presentation.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
7.7 DDoS Attack Timeline 1 st Attack Date : ’ :00 ~ ’ :00, ’ :00 ~ ’ :00 Target : (US) White House + 4 web sites (US)
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
--Harish Reddy Vemula Distributed Denial of Service.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
7.7 DDoS Attack Timeline 1 st Attack Date : ’ :00 ~ ’ :00, ’ :00 ~ ’ :00 Target : (US) White House + 4 web sites (US)
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Advanced Anti-Virus Techniques
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Security Log Visualization with a Correlation Engine: Chris Kubecka Security-evangelist.eu All are welcome in the House of Bytes English Language Presentation.
Denial-of-Service Attacks
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
A lustrum of malware network communication: Evolution & insights
Internet Worm propagation
Home Internet Vulnerabilities
Chapter 4: Protecting the Organization
Introduction to Internet Worm
Presentation transcript:

Jeong, Hyun-Cheol

2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in Korea 2 2 Conclusion 3 3

3 DDoS Attack Trends 7.7 DDoS Attack and Lessons DDoS Attacks in Korea 1 1

4 Status of the IP Network in Korea 1 st domain : 1.8 M -.kr : 1M - GTLD(.com,.net, …) : 0.8 M Host : 8.7 M Mobile Phone User : 46 M Internet User : 36 M High-speed Internet User : 15.7 M IP TV User : 1 M VoIP User : 7.1 M IDC : 60 ISP : 154 Population of S.Korea: 49 M 1 M : 1,000,000

DDoS Attacks in Korea Status & Trends DDoS Attack In Korea First DDoS attack is occurred in 2006 Increase of target systems - Small Websites  Major Websites(Bank, Portal, …) Increase of a ransom DDoS Increase of Application-layer DDos attack (Above 50%) - HTTP Get flooding, Slowloris, SIP flooding - Network Bandwidth Consumption  System Resource Consumption Hard to detect and block App.-layer DDos attack - Because Each Zombie PC generates small traffic, Hard to detect by legacy security solution.Risk Bank, Shopping, Game Site Portal, Public Site Chat, Gamble Site Web Server targeted DDoS DNS, Private IP targeted DDoS On-line Game Site 5

7.7 DDoS Attack (1/3) Attack Time : Every 6 p.m. July ~ July Attack Targets : 22 Korean sites, 14 U.S sites - Korean sites : the Blue House, National Assembly, major portal & banking sites, … Estimated Damage : 3,300 ~ 4,950 million dollars (Src. : Hyundai Research Institute) 1 st Day Attack 2 nd Day Attack3 rd Day Attack After DDoS Destruct Hard disk 6 6 PM, July 7 6 PM, July 8 6 PM, July 9 0 AM, July 10

7 7.7 DDoS Attack (2/3) - Characteristics Very Large scale and Organized Attack - Zombies were infected from the famous Korean Web hard site which had been exploited - Lots of Zombie PCs (about 115,000) were used in attack - Lots of Servers(about 400) were used in control the zombies Premeditated and Intelligent Attack - Attack started 6 PM that was coded in Malware(Logic Bomb) - Zombie’s Hard disk were destructed after DDoS  erase the attack evidence We could not know who the attacker were and why their intention were

8 7.7 DDoS Attack (3/3) - Lessons More attention to Endpoint Security In Korea, DDoS Defense was primarily focused on network security such as blocking C&C Channel, filtering traffics. - But, 7.7 DDoS Attack was rarely used C&C Server We should more attention to endpoint security! - But, It is not easy. Expand Information Sharing Information Sharing of Government and Private Sector - Cooperation between Government, ISP, Anti-Virus vendor, and DDoS vitim - Sharing of Malicious Code Samples, Attack Logs, and the result of analysis Cross-border Information Sharing - US was also attacked 2 days before 7.7 DDoS (2009/7/5) - Zombies and Servers used in 7.7 DDoS were distributed in about 60 contries C&C Zombie PC End point Defense Ex) Detection/Removal of Malicious code from zombie PCs Network Defense Ex) Blocking of C&C Channel, Filtering the DDoS Traffic Need of Control Tower Control Tower is need for the effective national response to large-scale attack 8

9 Operation of DNS Sinkhole Server Improvement of Legal Framework Development of Technologies Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in Korea 2 2

10 Before DNS sinkhole operationAfter DNS sinkhole operation Bot infected PCs Bot C&C ③ Connect C&C ④ Sending command Bot infected PCs Bot C&C KISA Sinkhole server ISP DNS server ② Return C&C IP address ① C&C DNS query ② Return Sinkhole IP address ① C&C DNS query ③ Connect Sinkhole Bot infected PCs out of control from botmaster Bot infected PC’s information Operation of DNS Sinkhole Server Target Sites ⑤ DDoS Attack

Request Improvement of SW Vulnerabilities to SW developer Order to remove malware from web sites Limit Zombie PCs internet connection in an emergency Able to Access to zombie PCs for Incident Analysis 11 Zombie PC Prevention Law (Draft) Prevent spread of Zombie PCs - strengthen the online security requirements for both individuals and companies Rapid response by information sharing Objective Major Contents Excessive and may compromise liberty in Internet usage Issues

12 Objective Detection and Blocking the botnet abused in various cyber crime Identifying Bot C&C and zombie PC lists and monitoring their behaviors 명령 / 제어 서버 Distributed botnet (B) Botnet Monitoring / Response System (A) Network Behavior based Botnet Detection System Botnet Monitoring system Detection event Botnet information ISP Network based Botnet Detection & Response Technology Web Firewall DNS Server Router Security Appliance Response Policy/Rule (DNS Sinkhole, BGP Feeding, Web firewall rule,,, Botnet traffic Collecting Sensor Centralized botnet (1) Spybot based real time botnet monitoring system User PC (3) Host based Botnet Traffic Filtering Agent Host based Bot Detection & Response Technology Spam trap system Web server Real-time botnet behavior data (2) Bot Collecting, Detecting, Analyzing Server R&D - Botnet Detection and Response

13 Objective Automation of the Life Cycle of an Incident Response - Collection Malware  Analysis  Blocking traffic  Removal Malware from Zombies Malware spreading Prevention and malware management system Malware Infected PC Auto-Analysis system Confick er Palevo Malware Auto Collection System System vulnerability, Web, Spam, IM Malware Collection Malware Auto Analysis System Malware Information Executable binary code.DLL.EXE.xls.pdf Flash.doc.ppt.EXE [Malware] [Malware propagation method] Malware Distribution site Detection System [Malware distributing site] Detecting malicious site Malware DNA & response Signature Management Zombie PC Internet Access Blocking Malware distribution site Management Malware classification & history Management [Prevent malware spread/response] [Malware Infected PC] R&D – Automatic Malware Collection/Analysis/Response

R&D - DDoS Attack Detection and Defense 40 Gbit DDoS Attack Defense System and Secure NIC Development Advanced Application-Layer DDoS Attack Defense System targeted on Web Services Internet Web Servers Normal Users 40G DDoS Attack Defense System Application-Layer DDoS Attack Defense System Server Farm Secure NIC Development Attackers - 40G DDoS Attack Defense System - Behavior based Attack Detection - Malicious Code Detection and Management - Infected System Management - Complex, Advanced DDoS Attack Defense Technology target on Web Service - Challenge/Behavior based Defense - Policy based Management - Server/Host based 2G Security Offload Engine Technology - Malicious Code Detection Objective 14

R&D - Cooperative Security Control Automatic Information Exchange & Cooperative Response Framework Cyber-Attack Forecast & Alarm Technology Auto-Response & Traceback against Cyber-Attack Information exchange Entiry Antivirus software companies National CSIRT/CERT/KISC Internet Service Provider Information exchange Entiry Information exchange & cooperative response Single packet attaack DDos attack Objective 15

16 Conclusion Information Sharing is the most important factor for success of effective prevention and response the incident. - For this purpose, We are improving the legal system and developing technology in Korea Information Sharing Cyber attacks occur in cross-border It is need that the consensus for - monitoring, keeping logs, information sharing, and cooperation against cross-border incidents International Cooperation It is the most difficult thing, but it is the most important for end-point security. We should improve not only the legal framework but also awareness. Awareness

Thank you