+ All Categories
Home > Documents > DDoSand Mitigation Solutions...30,2004 [email protected], Khirman & Son 11 DDoSExamples : SQL Slammer...

DDoSand Mitigation Solutions...30,2004 [email protected], Khirman & Son 11 DDoSExamples : SQL Slammer...

Date post: 18-Mar-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
25
DDoS and Mitigation Solutions Stas Khirman CTO KHIRMAN & SON [email protected] CoolTech Club Meeting, June 30,2004
Transcript
Page 1: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

DDoS and

Mitigation Solutions

Stas Khirman

CTO

KHIRMAN & SON

[email protected]

CoolTech Club Meeting, June 30,2004

Page 2: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 2

Agenda

� Intrduction

� DDoS definition

� DDoS classification

� DDoS Examples

� SMURF

� SYN Flood

� SQL Slammer

� Mitigation

Page 3: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

Introduction

Page 4: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 4

DDoS Definition

Denial of Service (DoS) attack is a

malicious use of the Internet/Intranet

connectivity to cripple the online

service offered by victim site, network

or institution.

Page 5: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 5

DDoS Definition

� Denial of Service attacks attempt to

negate service by � exhausting the resources at the victim side (such as

network bandwidth, CPU, memory, etc.) ,

� forcing victim equipment into non operational state

� hijacking victim equipment/resources for malicious

goals.

� Distributed Denial of Service (DDoS)

attack is a special case of the DoS

when multiple distributed network

nodes (zombies) are used to multiply

DoS effect.

Page 6: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

DDoS classification

Page 7: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 7

DDoS Classification

1. Resource exhausting (Flooding)

1. Bandwidth flooding

2. TCP Resources exhausting ( example: SYN

Flood)

3. Application Flood –malicious overuse of the

application services (example:web “spider” script)

4. System/Business Resources exhausting -

overuse of the system back-end resources such

as transaction server, data based, fileserver

(example:high-number of malicious login

requests, incomplete purchase transactions)

5. Algorithmic Complexity Attacks

Classification by exploited vulnerability

Page 8: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 8

DDoS Classification

2. Software Exploits

1. Crash activation - sending specially crafted

packet(s) to trigger of the OS kernel/software bug

(“Ping of death”)

2. Stack overflow – injected code execution

3. (intrusion) SQL Poisoning

4. (intrusion) Cross-Site Scripting (XSS)

3. “Social Engineering”

1. Server [miss-]configuration

2. E-Mail Viruses ( “Click to See a Nice Picture”)

3. Moderator/operator impersonation

4. Identity theft

Classification by exploited vulnerability

Page 9: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

DDoS examples

Page 10: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 10

DDoS Examples : SMURF

Reflector

Victim

Perpetrator

Reflector

Reflector

SMURF – sending a broadcast PING with a spoofed source IP

PING: VictimeIP->x.y.z.255

Page 11: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 11

DDoS Examples : SQL Slammer

Victim

Perpetrator

Victim

Victim Victim

Send a specially crafted packet to the port UDP/1434 , set off a stack overflow, run worm propagation code.

udp/1434

Page 12: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 12

SQL Slammer : Postmortem analysis

A single machine with the right Internet connection can scan the entire

Internet in 12 hours for SQL Slammer vulnerabilities.

From www.robertgraham.com

Page 13: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 13

SQL Slammer : Postmortem analysis

� For individuals, it was binary, a square-wave

� This graphs shows a single machine behind a 100-

mbps Ethernet link.

From www.robertgraham.com

Page 14: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 14

DDoS Examples : SYN Flood

Normal TCP connection establishment

Client A

Server B

A->B:SYN

B->A: SYN & ACK

A->B:ACK

Creates a connection object

Connection established

Page 15: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 15

DDoS Examples

SYN Flood

PerpetratorServer B

A->B:SYN

B->A: SYN & ACK

Creates a connection object

A->B:SYN

B->A: SYN & ACK

Creates a connection object

Unused address A

Send large number of SYN packets with a spoofed source address. Initiate creation of the large number connection objects.

Page 16: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 16

More DoS attacks

Source and destination IP

addresses are the same

causing the response to

loop.

TCP SYNLand

Continuous requests for a

heavy computational

dynamic page

HTTPSQL/applicatio

n server

attack

Local IP address highjack ,

middleman attack

ARPARP redirect

ICMP packet with a size

over 65536

ICMPPing of death

Page 17: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

Mitigation Techniques

Page 18: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 18

ACL – Access Control List

Layer 4 filtration rules:

<protocol,srcIP,dstIP,srcPort,dstPort>

SQL Slammer prevention ACL:

access-list 101 deny udp any any eq

1434

access-list 101 permit ip any any

Page 19: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 19

Rate Limitation

� Traffic Shaping :

� X B/sec for udp: 1434

� Y packets/sec fro ICMP PING

� Layer 4 rules

� Cisco CAR (Committed Access Rate)

Page 20: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 20

TCP Intercept

� Cisco specific

� Intercept Mode

� Monitor Mode

Page 21: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 21

Cisco TCP Intercept – Intercept mode

Client A

A->B:SYN

B->A: SYN & ACK

A->B:ACK

B->A: SYN & ACK

Server B

A->B:SYN

A->B:ACKdata

Cisco Router

Page 22: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 22

Price of Mitigation

� Excessive ACL – self inflicted DoS

� Excessive Rate Limitation:

� Self inflicted DoS

� CPU utilization

� TCP Intercept

� Memory utilization

� CPU utilization

Page 23: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

Dynamic Mitigation

Page 24: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 24

Solution ??

Detect

Decide

Enforce

Page 25: DDoSand Mitigation Solutions...30,2004 stas@khirman.com, Khirman & Son 11 DDoSExamples : SQL Slammer Victim Perpetrator Victim Victim Victim Send a specially crafted packet to the

CoolTech Club Meeting, June

30,2004 [email protected], Khirman & Son 25

Conclusions

�Q & A


Recommended