SlideShare a Scribd company logo
1 of 44
Universal DDoS Mitigation Bypass
DDoS Mitigation Lab
About Us
DDoS Mitigation Lab
Independent academic R&D division of Nexusguard
building next generation DDoS mitigation knowledge
and collaborate with the defense community.
Industry body formed to foster synergy among
stakeholders to promote advancement in DDoS
defense knowledge.
• DDoS Attack Categories
• DDoS Detection and Mitigation Techniques
– How they work?
– How to bypass / take advantage?
• DDoS Mitigation Bypass
– How to use our PoC tool?
– PoC tool capability
• Next-Generation Mitigation
Outline
Financial Impact
Source: NTT Communications,
“Successfully Combating DDoS Attacks”, Aug 2012
Volumetric Attacks
• Packet-Rate-Based
• Bit-Rate-Based
Semantic Attacks
API attacks
Hash DoS
Apache Killer
Teardrop
(old textbook example)
Slowloris / RUDY
SYN Flood
(old textbook example)
Smurf
(old textbook example)
Blended Attacks
Attack Quadrant
Complexity
Simple Sophisticated
Volume
xxx Gbps+
xxx Mbps+
DDoS Mitigations
Traffic
Policing
Proactive Resource
Release
Black- /
Whitelisting
xxx Gbps+
xxx Mbps+
Complexity
Simple Sophisticated
Volume
DDoS Mitigation:
Traffic Policing
Source: Cisco
DDoS Mitigation:
Proactive Resource Release
RST
1. Open lots of TCP connections
2. TCP connection pool starved3. Detect idle / slow TCP connections
4. Close idle / slow TCP connections
With RST
Example:
Slowloris Attack
B
Backend
(dropped)
DDoS Mitigation:
Black- / Whitelisting
Black List
White List
1.2.3.4
5.6.7.8
5.6.7.8
3.4.5.6
6.7.8.9
= free pass
(for awhile / for x amount of volume)
Src: 1.2.3.4
Src: 3.4.5.6
DDoS Mitigation:
Source Isolation
Source: http://www.cs.duke.edu/nds/ddos/
AS
AS
AS
DDoS Solution: Secure CDN
Backend
End User
3: return
1: request
2: redirect
to nearest
server
4: bypass distribution,
attack backend!
DDoS Detection
Rate Measurement
(SNMP)
Baselining
(Netflow)
Protocol Sanity
(PCAP)
Application
(SYSLOG)
Protocol Behavior
(PCAP)
Big Data Analysis
Complexity
Simple Sophisticated
Volume
xxx Gbps+
xxx Mbps+
Rate- / Flow-Based Countermeasures
Detection
Mitigation
Protocol-Based Countermeasures
Detection
Mitigation
Blanket Countermeasures
Traffic Statistics and Behavior
Big Data Analysis
Detection
Mitigation
Source Host Verification
Source Host Verification
• TCP SYN Auth
• HTTP Redirect Auth
• HTTP Cookie Auth
• JavaScript Auth
• CAPTCHA Auth
PoC Tool
• True TCP/IP behavior (RST, resend, etc.)
• Believable HTTP headers (User-Agent strings, etc.)
• Embedded JavaScript engine
• CAPTCHA solving capability
• Randomized payload
• Tunable post-authentication traffic model
PoC Tool Strengths
PoC Tool: Authentication Bypass
TCP SYN Auth (TCP Reset)
SYN ACK
SYN
ACK
RST
SYN
SYN ACK
ACK

TCP SYN Auth (TCP Out-of-Sequence)
RST
SYN
SYN
SYN ACK
ACK

SYN ACK
HTTP Redirect Auth
GET /index.html
HTTP 302 redir to /foo/index.html
GET /foo/index.html
HTTP 302 redir to /index.html
GET /index.html

HTTP Cookie Auth
GET /index.html
HTTP 302 redir to /index.html
HTTP 302 redir to /index.html
GET /index.html
GET /index.html

HTTP Cookie Auth (Header Token)
GET /index.html
HTTP 302 redir to /index.html
[X-Header: foo=bar]
GET /index.html
[X-Header: foo=bar]
GET /index.html
[X-Header: foo=bar]
HTTP 302 redir to /index.html
[X-Header: foo=bar]
GET /index.html
[X-Header: foo=bar]
JavaScript Auth
GET /index.html
HTTP 302 redir to /index.html
GET /index.html
POST /auth.phpans=16
JS 7+nine=?

CAPTCHA Auth
GET /index.html
HTTP 302 redir to /index.html
GET /index.html
POST /auth.php

CAPTCHA Pwnage
PoC Tool: TCP Traffic Model
TCP Traffic Model
NumberofConnections
Connection Hold Time
Before 1st Request
Connection Idle Timeout
After Last Request
Connections
Interval
Connections
Interval
TCP Connection
TCP Connection
TCP Connection
PoC Tool: HTTP Traffic Model
HTTP Traffic ModelNumberofRequests
perConnection
Requests
Interval
Requests
Interval
Requests
Interval
TCP Connection
HTTP Connection
HTTP Connection
HTTP Connection
HTTP Connection
• 3 tries per authentication attempt (in practice more
likely to success)
• True TCP/IP behavior thru use of OS TCP/IP stack
• Auth cookies persist during subsequent dialogues
• JavaScript execution using embedded JS engine (lack
of complete DOM an obstacle to full emulation)
PoC Tool Design
1. Converted to black-and-white for max contrast
2. 3x3 median filter applied for denoising
3. Word segmentation
4. Boundary recognition
5. Pixel difference computed against character map
CAPTCHA Bypass Design
PoC Tool in Action
Testing Environment
Against Devices Against Services
Measure
Attack
Traffic
Measure
Attack
Traffic
Mitigation Bypass
(Protection Products)
Auth Bypass Post-Auth
Testing results under specific conditions,
valid as of Jul 13, 2013
Proactive
Resource Release
Mitigation Bypass
(Protection Services)
Auth Bypass Post-Auth
Testing results under specific conditions,
valid as of Jul 13, 2013
Proactive
Resource Release
• Client Puzzle – add cost to individual zombies.
Next-Generation Mitigation
• DDoS is expensive to business
• Existing DDoS protection insufficient
• Next-Generation solution should make attack
expensive
Conclusion
tony.miu@nexusguard.com
albert.hui@ntisac.org
waileng.lee@ntisac.org
Thank You!
http://www.ntisac.org
Universal DDoS Mitigation Bypass

More Related Content

Similar to Universal DDoS Mitigation Bypass

GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
Jan Löffler
 
The hypermedia api
The hypermedia apiThe hypermedia api
The hypermedia api
Inviqa
 
Introduction to Stream Processing
Introduction to Stream ProcessingIntroduction to Stream Processing
Introduction to Stream Processing
Guido Schmutz
 
Web Services Discovery for Devices
Web Services Discovery for DevicesWeb Services Discovery for Devices
Web Services Discovery for Devices
Jorgen Thelin
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
Sergiy Pitel
 

Similar to Universal DDoS Mitigation Bypass (20)

DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasures
 
The end of polling : why and how to transform a REST API into a Data Streamin...
The end of polling : why and how to transform a REST API into a Data Streamin...The end of polling : why and how to transform a REST API into a Data Streamin...
The end of polling : why and how to transform a REST API into a Data Streamin...
 
Pro Magento MeetUp #2 - Varnish cache, Andrey Zabara
Pro Magento MeetUp #2 - Varnish cache, Andrey ZabaraPro Magento MeetUp #2 - Varnish cache, Andrey Zabara
Pro Magento MeetUp #2 - Varnish cache, Andrey Zabara
 
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
Linux Native, HTTP Aware Network Security
Linux Native, HTTP Aware Network SecurityLinux Native, HTTP Aware Network Security
Linux Native, HTTP Aware Network Security
 
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
20140313_tu_delft
20140313_tu_delft20140313_tu_delft
20140313_tu_delft
 
The hypermedia api
The hypermedia apiThe hypermedia api
The hypermedia api
 
Scaling Push Messaging for Millions of Devices @Netflix
Scaling Push Messaging for Millions of Devices @NetflixScaling Push Messaging for Millions of Devices @Netflix
Scaling Push Messaging for Millions of Devices @Netflix
 
Monitoring as an entry point for collaboration
Monitoring as an entry point for collaborationMonitoring as an entry point for collaboration
Monitoring as an entry point for collaboration
 
Approaches for application request throttling - Cloud Developer Days Poland
Approaches for application request throttling - Cloud Developer Days PolandApproaches for application request throttling - Cloud Developer Days Poland
Approaches for application request throttling - Cloud Developer Days Poland
 
Introduction to Stream Processing
Introduction to Stream ProcessingIntroduction to Stream Processing
Introduction to Stream Processing
 
WebRTC Videobroadcasting
WebRTC VideobroadcastingWebRTC Videobroadcasting
WebRTC Videobroadcasting
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
 
20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna
 
Web Services Discovery for Devices
Web Services Discovery for DevicesWeb Services Discovery for Devices
Web Services Discovery for Devices
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
 
Delphix
DelphixDelphix
Delphix
 

More from Albert Hui

Laying the Corporate Groundwork for Effective Incident Investigation
Laying the Corporate Groundwork for Effective Incident InvestigationLaying the Corporate Groundwork for Effective Incident Investigation
Laying the Corporate Groundwork for Effective Incident Investigation
Albert Hui
 
Cyber Fraud - The New Frontiers
Cyber Fraud - The New FrontiersCyber Fraud - The New Frontiers
Cyber Fraud - The New Frontiers
Albert Hui
 
(Mis)trust in the cyber era
(Mis)trust in the cyber era(Mis)trust in the cyber era
(Mis)trust in the cyber era
Albert Hui
 
The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?
Albert Hui
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response Triage
Albert Hui
 
Insights into the Cybercrime Ecosystem
Insights into the Cybercrime EcosystemInsights into the Cybercrime Ecosystem
Insights into the Cybercrime Ecosystem
Albert Hui
 

More from Albert Hui (14)

Information Security from Risk Management and Design
Information Security from Risk Management and DesignInformation Security from Risk Management and Design
Information Security from Risk Management and Design
 
The Practice of Cyber Crime Investigations
The Practice of Cyber Crime InvestigationsThe Practice of Cyber Crime Investigations
The Practice of Cyber Crime Investigations
 
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
 
Practical Defences Against A New Type of Professional Bank Fraudsters
Practical Defences Against A New Type of Professional Bank FraudstersPractical Defences Against A New Type of Professional Bank Fraudsters
Practical Defences Against A New Type of Professional Bank Fraudsters
 
New Frontiers in Cyber Forensics
New Frontiers in Cyber ForensicsNew Frontiers in Cyber Forensics
New Frontiers in Cyber Forensics
 
Laying the Corporate Groundwork for Effective Incident Investigation
Laying the Corporate Groundwork for Effective Incident InvestigationLaying the Corporate Groundwork for Effective Incident Investigation
Laying the Corporate Groundwork for Effective Incident Investigation
 
Cyber Fraud - The New Frontiers
Cyber Fraud - The New FrontiersCyber Fraud - The New Frontiers
Cyber Fraud - The New Frontiers
 
Detecting Threats - How to Think Like an Attacker
Detecting Threats - How to Think Like an AttackerDetecting Threats - How to Think Like an Attacker
Detecting Threats - How to Think Like an Attacker
 
(Mis)trust in the cyber era
(Mis)trust in the cyber era(Mis)trust in the cyber era
(Mis)trust in the cyber era
 
Cyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the CorporateCyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the Corporate
 
The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response Triage
 
Insights into the Cybercrime Ecosystem
Insights into the Cybercrime EcosystemInsights into the Cybercrime Ecosystem
Insights into the Cybercrime Ecosystem
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware Analysis
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Universal DDoS Mitigation Bypass