Presentation is loading. Please wait.

Presentation is loading. Please wait.

Harness Your Internet Activity. DNS-Based DDoS Evolving Threat RIPE May 2015 Amsterdam Ralf Weber Bruce Van Nice.

Similar presentations


Presentation on theme: "Harness Your Internet Activity. DNS-Based DDoS Evolving Threat RIPE May 2015 Amsterdam Ralf Weber Bruce Van Nice."— Presentation transcript:

1 Harness Your Internet Activity

2 DNS-Based DDoS Evolving Threat RIPE May 2015 Amsterdam Ralf Weber Bruce Van Nice

3 3 2014 Random Subdomain Attacks 2014 Data

4 4 2015 – Quieter in Some Ways JANFEBMARAPR 2015 Data All quiet???

5 5 Typical “Day in the Life” DNS Queries Seen at Resolvers DDoS Other

6 6 Typical Day in The Life DDoS Queries Seen at a Resolver Amplification Random Subdomain

7 Use of open resolvers/proxies still predominates –Installed base around 17 M –Trend toward more stealthy attacks - Send enough traffic to bring down authorities –Highly distributed attacks – 1,000s of open resolvers per attack –Often low intensity per IP –Interesting recent example: www.appledaily.com 7 Observations

8 Bot based attacks –Tend to be few IPs - tens to hundreds –High to very high intensity per IP - Up to 1000s of QPS/IP - Long tail with lower QPS –Recent interesting example: rutgers.edu 8 Observations

9 Attacks Using Bots Internet 2 Authoritative Server Recursive queries Bot infected devices 3 NXD responses ISP Target Web Site ISP Resolver Queries with randomized subdomains 1 Home Gateways

10 Network scans for vulnerable devices: Home gateways or other “Things” Attempts login with default passwords Many utilities at the attackers disposal Load and run malware 10 What’s Happening? Other vectors possible: Bots with loaders, Rompager

11 Considerable stress on DNS infrastructure: Resolvers Queries require recursion (computationally expensive) Working around failed or slow authorities Stress concentrates as authorities fail Authorities Unexpected query spikes exceed provisioned limits 11 The Problem

12 Minimize work for resolvers Eliminate bad traffic to authoritative servers Answer legitimate queries Answer legitimate queries for attacked domains –don’t drop, don’t SERVFAIL Two approaches being used: –Rate limit traffic to authorities –Ingress filtering How do they behave in practice? 12 Goals for Remediation

13 Testing Efficiency of Rate Limiting Authoritative Server Attack Traffic Internet ISP Resolver User traffic Authoritative Outbund rate limiting Inggess policy based filtering

14 14 Test Diagram 100qps 1qps Redwood City, CA Authoritative Servers dnsperf tcpreplay Regensberg, Germany good traffic 10kqps background 100qps for test domains attack traffic 2 * 5000 qps for two domains Resolver 2 domains being attacked other resolutions Rate limits should not be hit for normal traffic Resolver and authoritative servers record traffic

15 15 Run good traffic: User results

16 16 Run good traffic: Test domains results

17 17 Run good traffic: Authoritative Server Results

18 18 System Stats Vantio Power DNS Bind Unbound

19 19 Run attack traffic – Compare with normal

20 20 Run protected attack traffic: User results

21 21 Run good traffic: User results

22 22 Run protected attack traffic: Test domains results

23 23 Run good traffic: Test domains results

24 24 Run protected attack traffic: Authoritiative Server Results

25 25 Run good traffic: Authoritative Server Results

26 26 System Stats Vantio Power DNS Bind Unbound

27 27 Results: Resolver Traffic 9,000,000 queries Resolver Test runTypeNo ErrorNXDomainLostServfail Vantio3Good898762212248 74 56 5Attack 898829111576 100 33 ingress filter7Attack897804920668 1142 141 PDNS3Good 8989007 9477 941422 5Attack 8986967876728681398 Bind3Good 8986205 11537 2312027 5Attack8985913115713712145 unprotect7Attack 749715019291 54361478123 Unbound8Good898225417309 287 150 9Attack 8975942171149016043

28 28 Results: Attack domains SoftwareTest RunType No Error Lost Servfail Auth Noerror Auth NXDomain Auth Dropped CS73Good 89970030899700 5Attack 14500885501459368480790 ingress filter7Attack 899950050899800 PDNS3Good 89929 071899500 5Attack 807139587798991631762131 Bind3Good 9000000900000 5Attack 560289438 5676836670 unprotect7Attack 331016086530 332943152538256 Unbound8Good90000001640100 9Attack 431168558491048110417843

29 29 Test Results Summary Ingress Filtering Rate Limit Authorities Eliminate bad traffic to authoritative servers YESSOME Correctly answer legitimate queries (don’t drop, don’t SERVFAIL) YES Correctly answer legitimate queries for attacked domains YESNO

30 Constant DNS Based DDoS evolution Open Home Gateways remain a problem Malware-based exploits create broad exposure Not clear where attacks are headed Evidence attackers refining techniques Remediation needs to be undertaken with care 30 Summary


Download ppt "Harness Your Internet Activity. DNS-Based DDoS Evolving Threat RIPE May 2015 Amsterdam Ralf Weber Bruce Van Nice."

Similar presentations


Ads by Google