Download presentation
Presentation is loading. Please wait.
1
Version 3.0 DEFCON 10 August 2002 Anatomy of Denial of Service Mitigation Testing
2
Version 3.0Agenda Why Test? Methodology Challenges and Lessons Learned Findings
3
Version 3.0 DOS-3 Denial of Service Mitigation Testing
4
Version 3.0WHY? Desire to Protect Infrastructure Data Business Continuity Evaluate Emerging Technologies Problem is just getting worse Many nasty DOS and DDOS tools in the wild
5
Version 3.0 2001 Survey Results Results of the 2001 Information Security Magazine Industry Survey shows increase in Denial of Service attacks experienced by the survey participants. Source: Information Security Magazine, 2001 Industry Survey, October 2001, pg 34-47.
6
Version 3.0 DOS-6 2001 Survey Results System unavailability is 4 th highest INFOSEC concern Source: Information Security Magazine, 2001 Industry Survey, October 2001, pg 34-47.
7
Version 3.0 DOS-7 2001 Survey Results Security and Availability of Websites 2 nd most important project listed Source: Information Security Magazine, 2001 Industry Survey, October 2001, pg 34-47.
8
Version 3.0 DOS-8 What We Were Looking For Infrastructure Protection Minimum Gigabit Solutions (GigE and Fiber) OC48 and OC192 capability desired Customer Protection Gigabit MM Fiber GigE 10/100 Ethernet Eventually OC48 and OC192
9
Version 3.0 DOS-9 Products Tested Passive “tapped” Solutions Arbor Networks Reactive Networks Mazu Networks Asta Networks In-line Solutions Captus Networks Mazu Networks Basis of selection due to September 2001 Information Security Magazine Article, Denying Denial-of-Service.
10
Version 3.0 DOS-10 Methodology
11
Version 3.0 DOS-11 Today’s DOS Prevention Reverse Path Filtering (deny invalid IPs) Allow only good traffic into your network (ingress filtering) Allow only good traffic out of your network (egress filtering) Stop directed broadcast traffic (to avoid being an amplifier)
12
Version 3.0Methodology Imitate a customer hosting center Run real tests across the infrastructure Test both network functionality and the management interfaces Find solutions that will work upstream instead of downstream
13
Version 3.0 DOS-13 Test Environment Architecture
14
Version 3.0 DOS-14 Passive “Tapped” Testing No network side IP address Data mirroring Not a single point of failure on the network Products recommend ACLs for the routers Automatic Semi-Automatic Report only
15
Version 3.0 DOS-15 Reactive Network Solutions FloodGuard
16
Version 3.0 DOS-16 MAZU Networks TrafficMaster
17
Version 3.0 DOS-17 Asta Networks Vantage
18
Version 3.0 DOS-18 Arbor Networks PeakFlow
19
Version 3.0 DOS-19 In-Line Testing Boxes placed in the data stream Quicker response to attacks based on implemented rules Interfaces visible on the network
20
Version 3.0 DOS-20 Mazu Networks (inline)
21
Version 3.0 DOS-21 Captus Networks
22
Version 3.0 DOS-22 Types of Tests Baseline traffic generation to emulate a web hosting center ldgen with replayed traffic Attack Traffic (DOS and DDOS) TCP SYN TCP ACK UDP, ICMP, TCP floods Fragmented Packets IGMP flood Spoofed and un-spoofed
23
Version 3.0 DOS-23 Lesson Learned
24
Version 3.0 DOS-24Network Baseline Traffic must be stateful (TCP 3-way handshake must be complete)
25
Version 3.0 DOS-25Routes Bad Routes will kill your network and make you unemployed Thank God we were in the lab Be sure to isolate your management network from the attack network ON EVERY BOX
26
Version 3.0 DOS-26 Attack Network Different tools on different systems Linux 6.2 and Linux 7.2 Open BSD Solaris Mix of 10/100 and Gig Interfaces needed to push the traffic levels
27
Version 3.0 DOS-27 Tools Utilized DOS/DDOS Tools Vendor provided Arbor TrafGen Open source stream litestorm rc8.o f__kscript slice3
28
Version 3.0 DOS-28 Victim Network Monitoring Tools Lebrea Snort Manual Checks Simple Pings CPU usage monitoring
29
Version 3.0 DOS-29 Flow Sampling Netflow/Cflowd from Cisco and Juniper Sampling rates must match in both the router and the DDOS mitigation device Juniper had more consistent flow characteristics and reported faster Flow sampling has many value adds Traffic characterization Customer billing And DOS/DDOS detection
30
Version 3.0 DOS-30 SNMP Communications SNMP is used to monitor the status of the routers and providing alerts when an attack is underway. Connectivity is necessary for proper operation. SNMP community stream required for proper communications (NOT PUBLIC)
31
Version 3.0 DOS-31 FINDINGS
32
Version 3.0 DOS-32 What Vendors Did Well! Monitor baseline traffic Detect changes in traffic patterns away from baseline Alerting and Alarming when thresholds or statistics were exceeded
33
Version 3.0 DOS-33 What wasn’t so Good Protection of the management interfaces Implementing warning banners and account lockouts Port lockdown on the management interfaces
34
Version 3.0 DOS-34 Solutions
35
Version 3.0 DOS-35 Large Enterprise Passive Solutions best Mix of flow collectors and packet collectors that can visualize your entire network Centralize the management consoles into a security operations center of NOC Products: Arbor Asta Reactive
36
Version 3.0 DOS-36 Smaller Enterprise In-Line Solutions worth considering Combination firewall/DOS solutions Combination IDS/DOS solutions Captus Mazu Recourse (not tested)
37
Version 3.0 DOS-37 Resources www.sans.org/ddos_roadmap.htm www.sans.org/dosstep/index.htm www.nipc.gov staff.washington.edu/dittrich/misc/ddos www.cert.org
38
Version 3.0 DOS-38Conclusions Technology still evolving Integrated products likely the future (DOS combined with IDS or Firewall) Positive strides toward solutions
39
Version 3.0 DOS-39 Questions ?
40
Version 3.0 Greg Miles, Ph.D., CISSP CIO – Security Horizon Inc. Information Technology – 15 Years Information Security – 11 Years e-mail: gmiles@securityhorizon.com Web: www.securityhorizon.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.