SlideShare une entreprise Scribd logo
1  sur  47
DDOS Attacks
and Mitigation Methods
Özkan Erdoğan
ozkan.erdogan@btpsec.com
Ms.C, CISA, CEH, ISO 27001 LA
BTPSec Corp
info@btpsec.com
Office:+90 216 4647475
+44 203 6084760
Address:Turaboğlu Sk. Hamdiye Yazgan İş Merkezi,
Kozyatağı Kadıköy İSTANBUL
What is DOS & DDOS?
D = Distributed
DOS : focused on vulnerabilities, using single source
DDOS : overflow focused, using multiple sources
Target of attacks is to eliminate availability of the resource
What is DDOS
Is it possible to mitigate Ddos attacks?
Our experience shows that its quite possible to mitigate ddos attacks. However, there are caveats such
that:
Most ddos attacks come big in volume where it saturates your bandwidth . Attack volume > Target
network bandwidth (mbps).
These attacks can be handled by obtaining service from global anti ddos providers: e.g. Cloudflare,
Incapsula, Akamai etc.
Other kinds of attacks are usually ineffective if we configure our network with correct measures.
Botnet
Lethic , Cutwail, Grum (spam), Flashback (Mac), Zeus (bank), Spyeye
(banka) etc..
Botnet Builder (10$)
Ddos Survey Results
61% loss of access to information
38% business stop
33% loss of job opportunities
29% reputation loss
26% insurance premium increases
65% Received security consultancy
49% More investments on IT
46% Started legal processes
43% Informed customers
36% Applied legal ways
26% Informed the media
● Spamhaus
● Chinese domain authority (.cn)
● Pohjola -Finland bank
● Nasdaq
● Bitcoin
● Bank of America
Ddos Costs
BOTNETs
Controlled by Botnet herders
Commanded via : Mirc, http(s), Tor (popular now)
Injection methods: Wordpress, Joomla etc. old Windows systems are easiest
targets.
Botnet members are targeted to be amongst data center systems.
DDOS events
1. Spamhaus (DNS Amplification) 300gbps.
a. 11 Feb 2015: New NTP attack: 400gbps
2. Brobot (American Financial companies)
3. Chinese attacks
4. Russia: DDOS gangs
5. Syn reflection attacks are gaining a rise.
DDOS Detection Methods
Honeypot
Flow
DPI
DDOS Mitigation Methods (General)
ACL
BGP Routing (Cloud service)
Blackhole
Mitigation devices (Inline, Offline)
Basic DDOS Attacks
Signature based attacks (Teardrop, Land, Smurf, Nuke,Fraggle vb)
Volumetric attacks (legal and illegal attacks)
Reflection (dns, syn)
Application based attacks: e.g. Slow attacks
Connection attacks
Protocols used in DDOS
TCP/IP
Tcp,udp, icmp,
Other (GRE, ESP etc)
IPv4
IPv6
Application layer
Http, dns, VOIP etc.
IP Spoofing (&How to detect it)
uRPF- Unicast reverse path forwarding.
Source IP of packet is compared to the FIB table in router and dropped if
routes are not the same.
Authentication
First packet drop, and let following packets go.
Attack Tools
Hping, nping, mz, isic
Slowloris, httpflooder, Torshammer, jmeter, ab, httpDOS, R-U-D-Y, pyloris
etc.
Scripts (socket programming: Python, Perl etc)
Volumetric Attacks
Band filling attacks
Network attacks (syn, syn-ack, ack, udp flood etc)
Application Attacks (http, https, dns, voip etc)
Botnet, HOIC, LOIC
Application Layer DDOS
Slow attack (Apache)- slowloris, pyloris etc
Slow Read- tcp window size
RUDY- HTTP post
XML dos
SIP invite- multiple udp calls to overwhelm server..
How to mitigate DDOS attacks?
WL/BL (ALL protocols)
ACL (All protocols)
Fingerprint (udp, dns)
Authentication (tcp, http, dns)
Session management (dns, tcp)
Statistical Methods
Rate Limit
Syn Flood and Prevention
Attacker
ServerSyn
Syn
Syn
Syn
• Most popular ddos attack is syn flood.
• Protection method: Authentication and WL. (Whitelisting) (Syn
cookie vs. syn proxy)
• Syn reflection factor
• Syn flood from real IP addresses: TCP ratio mechanism
Syn-Ack Flood and Mitigation
Attacker
ServerSyn-Ack
Syn-Ack
Syn-Ack
Syn-Ack
• Protection: Check session table if syn-ack’s are real.
Ack Flood ve Mitigation
Attacker
ServerAck
Ack
Ack
Ack
• Protection: Check session table if ack’s are real.
FIN/RST Flood and Mitigation
Attacker
ServerFin/Rst
Fin/Rst
Fin/Rst
Fin/Rst
• Protection: Check session table if packets are real.
Udp Flood and Mitigation
Attacker
ServerUdp
Udp
Udp
Udp
• Udp is the most effective for ddos
• Protect method: Payload and Header.
(Fingerprint)
• Dest.port, source port, ttl, source/dest IP also
checked
• ACL
Icmp Flood and Mitigation
Attacker
ServerIcmp
Icmp
Icmp
Icmp
• Protect method: Payload and Header.
(Fingerprint)
• Session check (query, response)
• Rate limit
• ACL
TCP Connection Flood & Mitigation
Low rate attack (Protection: Number of connections are analyzed- Bot detection methods are used)
TCP Null connection attack (No packets after handshake)
Also check for rates of:
New connections
Total connections per
second
TCP Retransmission Attack
SIP Flood
SIP Invite Flood
SIP Flood Prevention Methods
Traffic limiting
Source IP limiting
Fingerprint
Http(s) Get/Post Flood
Attacker
ServerSyn
HTTP get
Ack
HTTP get
HTTP get
HTTP get
Http Ddos Detection & Mitigation
Methods
Authentication (Http redirection)
SSL Ddos (Crypto handshake messages increase abnormally)
Captcha usage
Fingerprint
Example: Http Get Attack
DNS Flood
Is the target DNS: Authoritative DNS or cache DNS?
DNS Attacks- Continued
Dns Cache poisoning attack
Dns reflection attack
Dns query/repsonse attacks
DNS Query/Response Attacks
SP DNS
1. What is the IP for abc.google.com?
2. What is the IP for abc.google.com?
Attacker
3. IP= XXX.XXX.XXX =news.google.com
DNS Reply Flood
Attacker
DNS Cache Poisoning
SP DNS
1. What is the IP for abc.google.com?
2. What is the IP for abc.google.com?
Attacker
3. abc.google.com= x.x.x.x
DNS Reply
Attacker
• Domain info on Cache DNS servers are attempted
to be changed with the fake one.
• Attacker should guess the query id correctly.
(which is so easy if query id’s are not random)
DNS Reply
DNS Reflection
Open DNS
resolvers
1. What is the IP for abc.google.com?
2. What is the IP for abc.google.com?
Attacker
DNS Reply
• Attacker uses victim’s IP address as his source,
and sends a dns query to all known dns servers.
• Thousands of resolvers return the answer to the
victim and victim is Ddos’ed
DNS Reply
DNS authority
Victim
DNS Attacks
Conclusion:
DNS attacks are very dangerous and can be performed with the least effort
and cost .
Ddos attacks are on the rise every year and quite possible to be so in the
future.
Udp and Dns based ddos attacks are the most effective protocols for ddos.
Methods To Protect Against DNS Ddos
Attacks
Session control (Two way traffic)
DNS proxy, caching
DNS-Tcp Authentication
First packet drop
Domain name limiting
Traffic limiting
An Effective Mitigation Technique:
Fingerprinting
Packet header and payload is analyzed to determine a fingerprint of attack.
Syn Reflection
DNS Reflection (Attack multiplier 10x)
NTP Amplification ( Attack multiplier 300x)
Can also use snmp for upto 600x , however snmp seldom allows
nonauthenticated clients
11 February 2015: New NTP
attack: 400gbps
Ddos Summary
Extremely easy to attack ( Many free and user friendly tools)
Impossible to be detected (If correctly hides)
Big effects on the victim
Attack types and methods are broad.
Every application or service has its own ddos vulnerabilities
...Spoofing is possible and mostly costless
...AGAIN.. attack tools are free
THANKS
QUESTIONS???

Contenu connexe

Tendances

Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceEr. Shiva K. Shrestha
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
DNS Security
DNS SecurityDNS Security
DNS Securityinbroker
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniquesinbroker
 
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolFastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolPavel Odintsov
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInformation Technology
 
Advanced SQL injection to operating system full control (slides)
Advanced SQL injection to operating system full control (slides)Advanced SQL injection to operating system full control (slides)
Advanced SQL injection to operating system full control (slides)Bernardo Damele A. G.
 
Temel Kavramlar, DoS/DDoS Saldırıları ve Çeşitleri
Temel Kavramlar, DoS/DDoS Saldırıları ve ÇeşitleriTemel Kavramlar, DoS/DDoS Saldırıları ve Çeşitleri
Temel Kavramlar, DoS/DDoS Saldırıları ve ÇeşitleriBGA Cyber Security
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices Lior Rotkovitch
 
DoS ve DDoS Saldırıları ve Korunma Yöntemleri
DoS ve DDoS Saldırıları ve Korunma YöntemleriDoS ve DDoS Saldırıları ve Korunma Yöntemleri
DoS ve DDoS Saldırıları ve Korunma YöntemleriBGA Cyber Security
 
The Rise of Secrets Management
The Rise of Secrets ManagementThe Rise of Secrets Management
The Rise of Secrets ManagementAkeyless
 
Ağ tabanlı Saldırı Tespit Sistemleri
Ağ tabanlı Saldırı Tespit SistemleriAğ tabanlı Saldırı Tespit Sistemleri
Ağ tabanlı Saldırı Tespit Sistemleriosmncht
 
Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Bernardo Damele A. G.
 

Tendances (20)

Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
DNS Security
DNS SecurityDNS Security
DNS Security
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Http request smuggling
Http request smugglingHttp request smuggling
Http request smuggling
 
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolFastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection tool
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
OSI Layer Security
OSI Layer SecurityOSI Layer Security
OSI Layer Security
 
Security of DNS
Security of DNSSecurity of DNS
Security of DNS
 
Dns security
Dns securityDns security
Dns security
 
Advanced SQL injection to operating system full control (slides)
Advanced SQL injection to operating system full control (slides)Advanced SQL injection to operating system full control (slides)
Advanced SQL injection to operating system full control (slides)
 
Temel Kavramlar, DoS/DDoS Saldırıları ve Çeşitleri
Temel Kavramlar, DoS/DDoS Saldırıları ve ÇeşitleriTemel Kavramlar, DoS/DDoS Saldırıları ve Çeşitleri
Temel Kavramlar, DoS/DDoS Saldırıları ve Çeşitleri
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices
 
DoS ve DDoS Saldırıları ve Korunma Yöntemleri
DoS ve DDoS Saldırıları ve Korunma YöntemleriDoS ve DDoS Saldırıları ve Korunma Yöntemleri
DoS ve DDoS Saldırıları ve Korunma Yöntemleri
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
The Rise of Secrets Management
The Rise of Secrets ManagementThe Rise of Secrets Management
The Rise of Secrets Management
 
Ağ tabanlı Saldırı Tespit Sistemleri
Ağ tabanlı Saldırı Tespit SistemleriAğ tabanlı Saldırı Tespit Sistemleri
Ağ tabanlı Saldırı Tespit Sistemleri
 
Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)
 

En vedette

How to launch and defend against a DDoS
How to launch and defend against a DDoSHow to launch and defend against a DDoS
How to launch and defend against a DDoSjgrahamc
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Reportbtpsec
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS AttacksAmazon Web Services
 
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...ShortestPathFirst
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Rishabh Upadhyay
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksSecurity Session
 
Announcing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS AttacksAnnouncing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS AttacksAmazon Web Services
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation TechniquesIntruGuard
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecShortestPathFirst
 
Misused top ASNs
Misused top ASNsMisused top ASNs
Misused top ASNsAPNIC
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overviewBAKOTECH
 

En vedette (13)

How to launch and defend against a DDoS
How to launch and defend against a DDoSHow to launch and defend against a DDoS
How to launch and defend against a DDoS
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Report
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
Announcing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS AttacksAnnouncing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS Attacks
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow Spec
 
Misused top ASNs
Misused top ASNsMisused top ASNs
Misused top ASNs
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overview
 

Similaire à DDOS Attacks and Mitigation Methods Explained

Ddos and mitigation methods.pptx
Ddos and mitigation methods.pptxDdos and mitigation methods.pptx
Ddos and mitigation methods.pptxOzkan E
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and RiskSukbum Hong
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16Radware
 
Ntp in Amplification Inferno
Ntp in Amplification InfernoNtp in Amplification Inferno
Ntp in Amplification InfernoSriram Krishnan
 
DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)Fatima Qayyum
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threatSensePost
 
Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...
Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...
Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...FrancisJeremiah1
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptxdawitTerefe5
 
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7allanjude
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewMarketingArrowECS_CZ
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer AttacksArun Modi
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSSuzanne Aldrich
 
DNS Advanced Attacks and Analysis
DNS Advanced Attacks and AnalysisDNS Advanced Attacks and Analysis
DNS Advanced Attacks and AnalysisCSCJournals
 

Similaire à DDOS Attacks and Mitigation Methods Explained (20)

Ddos and mitigation methods.pptx
Ddos and mitigation methods.pptxDdos and mitigation methods.pptx
Ddos and mitigation methods.pptx
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
 
Ntp in Amplification Inferno
Ntp in Amplification InfernoNtp in Amplification Inferno
Ntp in Amplification Inferno
 
9534715
95347159534715
9534715
 
DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
 
DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threat
 
Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...
Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...
Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptx
 
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider Overview
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
 
DDoS.ppt
DDoS.pptDDoS.ppt
DDoS.ppt
 
Ddos
DdosDdos
Ddos
 
DNS Advanced Attacks and Analysis
DNS Advanced Attacks and AnalysisDNS Advanced Attacks and Analysis
DNS Advanced Attacks and Analysis
 

Dernier

Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 

Dernier (20)

Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 

DDOS Attacks and Mitigation Methods Explained

  • 1. DDOS Attacks and Mitigation Methods Özkan Erdoğan ozkan.erdogan@btpsec.com Ms.C, CISA, CEH, ISO 27001 LA BTPSec Corp info@btpsec.com Office:+90 216 4647475 +44 203 6084760 Address:Turaboğlu Sk. Hamdiye Yazgan İş Merkezi, Kozyatağı Kadıköy İSTANBUL
  • 2. What is DOS & DDOS? D = Distributed DOS : focused on vulnerabilities, using single source DDOS : overflow focused, using multiple sources Target of attacks is to eliminate availability of the resource
  • 4. Is it possible to mitigate Ddos attacks? Our experience shows that its quite possible to mitigate ddos attacks. However, there are caveats such that: Most ddos attacks come big in volume where it saturates your bandwidth . Attack volume > Target network bandwidth (mbps). These attacks can be handled by obtaining service from global anti ddos providers: e.g. Cloudflare, Incapsula, Akamai etc. Other kinds of attacks are usually ineffective if we configure our network with correct measures.
  • 5. Botnet Lethic , Cutwail, Grum (spam), Flashback (Mac), Zeus (bank), Spyeye (banka) etc..
  • 7. Ddos Survey Results 61% loss of access to information 38% business stop 33% loss of job opportunities 29% reputation loss 26% insurance premium increases 65% Received security consultancy 49% More investments on IT 46% Started legal processes 43% Informed customers 36% Applied legal ways 26% Informed the media ● Spamhaus ● Chinese domain authority (.cn) ● Pohjola -Finland bank ● Nasdaq ● Bitcoin ● Bank of America
  • 9. BOTNETs Controlled by Botnet herders Commanded via : Mirc, http(s), Tor (popular now) Injection methods: Wordpress, Joomla etc. old Windows systems are easiest targets. Botnet members are targeted to be amongst data center systems.
  • 10.
  • 11. DDOS events 1. Spamhaus (DNS Amplification) 300gbps. a. 11 Feb 2015: New NTP attack: 400gbps 2. Brobot (American Financial companies) 3. Chinese attacks 4. Russia: DDOS gangs 5. Syn reflection attacks are gaining a rise.
  • 13. DDOS Mitigation Methods (General) ACL BGP Routing (Cloud service) Blackhole Mitigation devices (Inline, Offline)
  • 14. Basic DDOS Attacks Signature based attacks (Teardrop, Land, Smurf, Nuke,Fraggle vb) Volumetric attacks (legal and illegal attacks) Reflection (dns, syn) Application based attacks: e.g. Slow attacks Connection attacks
  • 15. Protocols used in DDOS TCP/IP Tcp,udp, icmp, Other (GRE, ESP etc) IPv4 IPv6 Application layer Http, dns, VOIP etc.
  • 16. IP Spoofing (&How to detect it) uRPF- Unicast reverse path forwarding. Source IP of packet is compared to the FIB table in router and dropped if routes are not the same. Authentication First packet drop, and let following packets go.
  • 17. Attack Tools Hping, nping, mz, isic Slowloris, httpflooder, Torshammer, jmeter, ab, httpDOS, R-U-D-Y, pyloris etc. Scripts (socket programming: Python, Perl etc)
  • 18. Volumetric Attacks Band filling attacks Network attacks (syn, syn-ack, ack, udp flood etc) Application Attacks (http, https, dns, voip etc) Botnet, HOIC, LOIC
  • 19. Application Layer DDOS Slow attack (Apache)- slowloris, pyloris etc Slow Read- tcp window size RUDY- HTTP post XML dos SIP invite- multiple udp calls to overwhelm server..
  • 20. How to mitigate DDOS attacks? WL/BL (ALL protocols) ACL (All protocols) Fingerprint (udp, dns) Authentication (tcp, http, dns) Session management (dns, tcp) Statistical Methods Rate Limit
  • 21. Syn Flood and Prevention Attacker ServerSyn Syn Syn Syn • Most popular ddos attack is syn flood. • Protection method: Authentication and WL. (Whitelisting) (Syn cookie vs. syn proxy) • Syn reflection factor • Syn flood from real IP addresses: TCP ratio mechanism
  • 22. Syn-Ack Flood and Mitigation Attacker ServerSyn-Ack Syn-Ack Syn-Ack Syn-Ack • Protection: Check session table if syn-ack’s are real.
  • 23. Ack Flood ve Mitigation Attacker ServerAck Ack Ack Ack • Protection: Check session table if ack’s are real.
  • 24. FIN/RST Flood and Mitigation Attacker ServerFin/Rst Fin/Rst Fin/Rst Fin/Rst • Protection: Check session table if packets are real.
  • 25. Udp Flood and Mitigation Attacker ServerUdp Udp Udp Udp • Udp is the most effective for ddos • Protect method: Payload and Header. (Fingerprint) • Dest.port, source port, ttl, source/dest IP also checked • ACL
  • 26. Icmp Flood and Mitigation Attacker ServerIcmp Icmp Icmp Icmp • Protect method: Payload and Header. (Fingerprint) • Session check (query, response) • Rate limit • ACL
  • 27. TCP Connection Flood & Mitigation Low rate attack (Protection: Number of connections are analyzed- Bot detection methods are used) TCP Null connection attack (No packets after handshake) Also check for rates of: New connections Total connections per second
  • 31. SIP Flood Prevention Methods Traffic limiting Source IP limiting Fingerprint
  • 32. Http(s) Get/Post Flood Attacker ServerSyn HTTP get Ack HTTP get HTTP get HTTP get
  • 33. Http Ddos Detection & Mitigation Methods Authentication (Http redirection) SSL Ddos (Crypto handshake messages increase abnormally) Captcha usage Fingerprint
  • 35. DNS Flood Is the target DNS: Authoritative DNS or cache DNS?
  • 36. DNS Attacks- Continued Dns Cache poisoning attack Dns reflection attack Dns query/repsonse attacks
  • 37. DNS Query/Response Attacks SP DNS 1. What is the IP for abc.google.com? 2. What is the IP for abc.google.com? Attacker 3. IP= XXX.XXX.XXX =news.google.com DNS Reply Flood Attacker
  • 38. DNS Cache Poisoning SP DNS 1. What is the IP for abc.google.com? 2. What is the IP for abc.google.com? Attacker 3. abc.google.com= x.x.x.x DNS Reply Attacker • Domain info on Cache DNS servers are attempted to be changed with the fake one. • Attacker should guess the query id correctly. (which is so easy if query id’s are not random) DNS Reply
  • 39. DNS Reflection Open DNS resolvers 1. What is the IP for abc.google.com? 2. What is the IP for abc.google.com? Attacker DNS Reply • Attacker uses victim’s IP address as his source, and sends a dns query to all known dns servers. • Thousands of resolvers return the answer to the victim and victim is Ddos’ed DNS Reply DNS authority Victim
  • 40. DNS Attacks Conclusion: DNS attacks are very dangerous and can be performed with the least effort and cost . Ddos attacks are on the rise every year and quite possible to be so in the future. Udp and Dns based ddos attacks are the most effective protocols for ddos.
  • 41. Methods To Protect Against DNS Ddos Attacks Session control (Two way traffic) DNS proxy, caching DNS-Tcp Authentication First packet drop Domain name limiting Traffic limiting
  • 42. An Effective Mitigation Technique: Fingerprinting Packet header and payload is analyzed to determine a fingerprint of attack.
  • 44. DNS Reflection (Attack multiplier 10x)
  • 45. NTP Amplification ( Attack multiplier 300x) Can also use snmp for upto 600x , however snmp seldom allows nonauthenticated clients 11 February 2015: New NTP attack: 400gbps
  • 46. Ddos Summary Extremely easy to attack ( Many free and user friendly tools) Impossible to be detected (If correctly hides) Big effects on the victim Attack types and methods are broad. Every application or service has its own ddos vulnerabilities ...Spoofing is possible and mostly costless ...AGAIN.. attack tools are free