+ All Categories
Home > Documents > Spotting a Denial of Service (DoS) Attack · DoS (DDoS) occurs when such attacks come from a...

Spotting a Denial of Service (DoS) Attack · DoS (DDoS) occurs when such attacks come from a...

Date post: 20-Jul-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
1
Spotting a Denial of Service (DoS) Attack (DoS) Attack Distributed Reflective DNS A Denial of Service (DoS) attack prevents legitimate users from connecting to systems and devices that rely on DNS to route the traffic. This is done by bombarding the targeted system or device with a constant stream DNS-based inquiries which makes it impossible for that system to respond. A Distributed DoS (DDoS) occurs when such attacks come from a multitude of sources simultaneously. There are many types of DoS and DDoS attacks. DoS attacks can last for hours, days, or even longer and cost organizations significant time, money, and resources. While there are many different types of DoS attacks, one of the simplest is a packet-flooding volumetric attack, where the attacker sends far more traffic at the target than the target's network connection can carry. DoS attacks are an increasingly serious threat to today’s businesses, capable of rendering entire organizations virtually invisible online and cutting off interaction with customers. oOne specific type of packet flood- ing attack is known as a Distribut- ed Reflective DNS Amplification attack. In these scenarios, attack- ers overwhelm a victim’s system with DNS response traffic. A typical distributed reflective DNS amplifica- tion attack involves three categories of entities: This is the very definition of "amplifi- cation." The net result of many open recursive resolvers all answering spoofed questions can be a crushing amount of network traffic, hitting the targeted site from name servers all around the Internet. These attacks sadly happen all too often. oDistributed Reflective DNS Amplification attacks rely on open recursive resolvers. Amplification Attacks A recursive resolver is a type of domain name server that helps applications resolve domain names to IP addresses. Recursive resolvers should be, and normally are, config- ured by their administrators to only answer queries for their intended local users. Open recursive resolvers, which answer queries for anyone, anywhere, are misconfigured, and this can lead to them being misused to attack innocent third parties. RECURSIVE RESOLVERS A V ORR1 ORR2 ORR3 ORR4 There's a bad guy, attacker A There's a good guy, victim V There are open recursive resolver(s), such as ORR1, ORR2, ORR3 1 Attacker A generates a series of "spoofed" DNS queries, either from a single source or a large botnet. These spoofed queries look as if they're sent from victim V, even though they're actually being sent by attacker A. 2 These queries get directed by the attacker to ORR1, ORR2, ORR3, etc. Each of the open recursive resolvers dutifully answers the queries it receives. 3 Because DNS queries are often small while DNS responses can be quite large, the open recursive resolver acts as a "traffic amplifier," taking a small input and returning a large output. THE ATTACK Seeing Distributed Reflective DNS Amplification Attacks As They Happen Because there are so many open recursive resolvers on the Internet, some attackers simply spray spoofed traffic against any/all IPv4 addresses. These may inadvertently hit a "darknet," or "darkspace telescope", a block of network address space announced to the Internet but isn't used by any end users or computers. As there are no end users and no computers on those network addresses, there shouldn't be any traffic coming into that network from the Internet. Anything that does hit that dark network address block is unsolicited by definition. There's a lot more information available in darknet packet captures. Contact us to discuss how you can use SIE Channel 14 to see what else is happening! farsightsecurity.com +1-650-489-7919 Copyright ©2019 Farsight Security, Inc. All rights reserved. Observe Darknet Traffic with Farsight Security’s SIE Channel 14 Fortunately, you don't need a block of unused network address space to set up a darknet – you can simply arrange to get access to Farsight's Darknet Channel at the Security Information Exchange (SIE) Farsight SIE data ena- bles security professionals to accurately identify, map, and protect their networks from cybercrime activity by providing access to worldwide real-time data - without the need to develop or deploy your own data collection infrastructure. The data is organized into a series of real-time streaming channels. SIE also includes darknet data on Channel 14, as well as other types of data (such as spam samples and much more). Upon receiving access to Channel 14, you can immedi- ately watch darknet traffic on Channel 14 just as if you'd set up your own private darknet. 14 CHANNEL Conclusion ®
Transcript
Page 1: Spotting a Denial of Service (DoS) Attack · DoS (DDoS) occurs when such attacks come from a multitude of sources simultaneously. There are many types of DoS and DDoS attacks. DoS

Spotting a Denial of Service

(DoS) Attack(DoS) Attack

DistributedReflective DNS

A Denial of Service (DoS) attack prevents legitimate users from connecting to systems and devices that rely on DNS to route the tra�c. This is done by

bombarding the targeted system or device with a constant stream DNS-based inquiries which makes it impossible for that system to respond. A Distributed

DoS (DDoS) occurs when such attacks come from a multitude of sources simultaneously. There are many types of DoS and DDoS attacks.

DoS attacks can last for hours, days, or even longer

and cost organizations significant time, money,

and resources.

While there are many different types of DoS attacks, one of the

simplest is a packet-flooding volumetric attack, where the

attacker sends far moretra�c at the target than

the target's networkconnectioncan carry.

DoS attacks arean increasingly serious

threat to today’s businesses,capable of rendering entireorganizations virtually invisible

online and cutting offinteraction with

customers.

oOne specific type of packet flood-ing attack is known as a Distribut-

ed Reflective DNS Amplification attack. In these scenarios, attack-ers overwhelm a victim’s system

with DNS response tra�c.

A typical distributed reflective DNS amplifica-tion attack involves three

categories of entities:

This is the very definition of "amplifi-cation." The net result of many open

recursive resolvers all answering spoofed questions can be a crushing

amount of network tra�c, hitting the targeted site from name servers allaround the Internet. These attacks

sadly happen all too often.

oDistributed Reflective DNS Amplification attacks rely on open recursive

resolvers.

AmplificationAttacks

A recursive resolver is a type of domain name server that helps applications resolve domain names to IP addresses. Recursive resolvers should be, and normally are, config-

ured by their administrators to only answer queries for their intended local users.

Open recursive resolvers, which answer queries for anyone, anywhere, are misconfigured, and this can lead to them being misused to attack innocent third parties.

RECURSIVE RESOLVERS

A

V

ORR1

ORR2 ORR3

ORR4

There's a bad guy, attacker AThere's a good guy, victim V

There are open recursive resolver(s), such as ORR1, ORR2, ORR3

1

Attacker A generates a series of "spoofed" DNS queries, either froma single source or a large botnet. These spoofed queries look as if they're sent from victim V, even though they're actually being

sent by attacker A.

2

These queries get directed bythe attacker to ORR1, ORR2,ORR3, etc. Each of the openrecursive resolvers dutifully

answers the queriesit receives.

3

Because DNS queriesare often small while DNS

responses can be quite large, the open recursive resolver acts as a "tra�c amplifier," taking a

small input and returning a large output.

THE ATTACK

Seeing DistributedReflective DNS Amplification AttacksAs They Happen

Because there are so many open recursive resolvers on the Internet, some attackers simply spray spoofed tra�c against any/all IPv4 addresses. These may inadvertently hit a "darknet," or "darkspace telescope", a block of network address space announced to the Internet but isn't used by any end users or computers.

As there are no end users and no computers on those network addresses, there shouldn't be any tra�c coming into that network from the Internet. Anything that does hit that dark network address block is unsolicited by definition.

There's a lot more information available in darknet packet captures.Contact us to discuss how you can use SIE Channel 14 to see what else is happening!

farsightsecurity.com +1-650-489-7919

Copyright ©2019 Farsight Security, Inc. All rights reserved.

Observe Darknet Tra�c with Farsight Security’s

SIE Channel 14Fortunately, you don't need a block of unused network address space to set up a darknet –

you can simply arrange to get access to Farsight's Darknet Channel at the Security Information Exchange (SIE)

Farsight SIE data ena-bles security professionals

to accurately identify, map, and protect their networks from cybercrime activity by providing

access to worldwide real-time data - without the need to develop or deploy your own data collection infrastructure. The data

is organized into a series of real-time streaming channels. SIE also includes

darknet data on Channel 14, as well as other types of data

(such as spam samples and much more).

Upon receiving access to Channel 14, you can immedi-

ately watch darknet tra�con Channel 14 just as

if you'd set up yourown private

darknet.

14CHANNEL

Conclusion

®

Recommended