SlideShare une entreprise Scribd logo
1  sur  79
Télécharger pour lire hors ligne
Distributed Denial of Service Attacks
Detection and Mitigation
European MUM – 2016
Ljubljana / Slovenia
Wardner Maia
Introduction
Wardner Maia
Electronic and Telecommunications Engineer;
Internet Service Provider since 1995;
Training Business since 2002;
Certified Mikrotik Trainer since 2007;
MD Brasil IT & Telecom CTO;
Member of the board of directors of LACNIC.
2©Copyright md brasil - direitos reservados
Introduction
MD Brasil IT & Telecom
Internet Access Provider in São Paulo state - Brazil;
Telecom equipment manufacturer and integrator;
Mikrotik Training Center since 2007;
Consulting services worldwide.
http://mdbrasil.com.br http://mikrotikbrasil.com.br
3©Copyright md brasil - direitos reservados
Previous Participations on
European MUMs
Wireless Security (2008 – Krakow/PL)
Wireless Security for OLPC project (2009 – Prague/CZ)
Layer 2 Security (2010 – Wroclaw/PL)
Routing Security (2011 – Budapest/HU)
IPv6 Security (2012 - Warsaw/PL)
BGP Filtering (2013 – Zagreb/CR)
MPLS VPNs Security (2014 – Venice/IT)
Network Simulation (2015 – Prague/CZ)
Today: DDoS attacks – detection and mitigation
http://mikrotikbrasil.com.br/artigos
4©Copyright md brasil - direitos reservados
DDoS attacks
Last year our good friend Tom Smyth
(Wireless Connect – Ireland) did a great
presentation about DDoS.
http://mum.mikrotik.com/2015/CZ/info
©Copyright md brasil - direitos reservados 5
There is a lot of useful information on that work:
Concepts about DDoS, BCP 38, UrPF, how to reduce the
surface of attacks blackholing unused space, etc, etc,
Definitely get that presentation and do your Homework!
DDoS – Detection and
Mitigation
Why (again) this subject?
©Copyright md brasil - direitos reservados 6
DDoS – Should I care?
We have to be prepared for bigger and bigger attacks
7©Copyright md brasil - direitos reservados
https://www.linkedin.com/puls
e/2016-year-3000-gbps-ddos-
attack-tech2016-marcos-ortiz-
valmaseda?trk=pulse_spock-
articles
Is DDoS a “privilege” of Big
Operators and Data Centers?
Could my (small/medium)
company be a target?
©Copyright md brasil - direitos reservados 8
DDoS – Should I Care?
9©Copyright md brasil - direitos reservados
https://www.stateoftheinternet.com/downloads/pdfs/Q3-2015-SOTI-
Connectivity-Executive-Summary.pdf
DDoS – Should I Care?
10©Copyright md brasil - direitos reservados
http://www.pcworld.com/article/
3012963/security/ddos-attacks-
increase-in-number-endanger-
small-organizations.html
http://www.zdnet.com/article/ddos-attacks-size-doesnt-matter/
DDoS – Should I Care?
11©Copyright md brasil - direitos reservados
How about to hire
a DDoS attack,
for US$ 2.99?
DDoS – Should I Care?
12©Copyright md brasil - direitos reservados
Being a target of a DDoS attack is not a matter of
“if” but “when” it will happen.
Do you have a formal Incident Response Plan?
DDoS – Detection and
Mitigation
Whom this presentation
is intended for?
©Copyright md brasil - direitos reservados 13
Target Audience and
Presentation Goals
14©Copyright md brasil - direitos reservados
This presentation is targeted to small an medium ISPs,
mainly in the business of Last mile Internet Access;
The main goals of this presentation are: to show that it’s
important to have a plan to deal with DDoS and a
suggestion on how to implement it.
- A real case scenario implementation will be showed;
- We’ll try to fit the presentation in the 45 minutes we
have.
Agenda
15
Background on DDoS – components and
architecture and mitigation techniques;
Tools used for Detection and Mitigation in
an ISP environment;
Hands On! Seeing things working;
The Cherry of the Cake – Cool Graphics
and information about your network;
©Copyright md brasil - direitos reservados
6’
Agenda
16
Background on DDoS – components and
architecture and mitigation techniques;
Tools used for Detection and Mitigation in
an ISP environment;
Hands On! Seeing things working;
The Cherry of the Cake – Cool Graphics
and information about your network;
©Copyright md brasil - direitos reservados
6’
Background on DDoS
Basic concepts
Dos Types
DoS
Denial of Service Attack
DDoS
Distributed Denial of Service Attack
DRDoS
Distributed Reflected Denial of Service Attack
©Copyright md brasil - direitos reservados 17
Anatomy of a DRDoS attack
©Copyright md brasil - direitos reservados 18
Attacker Handlers Zombies Amplifiers
Victim
Usually the attacks are
mostly DDRoS but we’ll
call them simply DDoS
How to fight against
DDoS?
©Copyright md brasil - direitos reservados 19
Prevention
Doing our homework
 Implement BCP-38 (RFC 2827), by firewall rules and
uRPF (mostly you’ll do a good job for the rest of the
world);
 Find and fix the amplifiers (DNS, SSDP, NTP, SNMP,
NETBIOS) on your network (Extra Slides at the end of
this presentation have the commands to do it);
 Subscribe to Team Cymru Bogons Service and
automatically black-hole Bogons Prefixes
©Copyright md brasil - direitos reservados 20
Prevention
Doing our homework
 Ensure that all your space announced to eBGP have
internal routes to your network, avoiding static loops;
One single 64 bytes ping with TTL = 250, will generate 2
mbps of traffic 
©Copyright md brasil - direitos reservados 21
Upstream
Provider
ISP
Prevention
Doing our homework
 Reduce your exposition to DDoS announcing your
unused space as black-hole (See Tom’s hints for that)
NB: Depends on your Upstream Provider’s policy
©Copyright md brasil - direitos reservados 22
Upstream
Provider
ISP
Mitigation Techniques
©Copyright md brasil - direitos reservados 23
Remote Triggered Blackhole
ISP is suffering a DDoS attack
targeting IP x.x.x.x/32;
Upstream provider (e.g. AS
100) provides a policy that
black-hole any /32
announcement with a specific
community (e.g. 100:666);
©Copyright md brasil - direitos reservados 24
Internet
Upstream
Provider
ISP
Remote Triggered Blackhole
ISP announces to the Upstream
provider the /32 with the
community;
Upstream provider put the /32 in
blackhole;
Communication with /32 is lost
and channel overflow stops;
Other customer’s SLA is saved,
but unfortunately we can say that
DDoS succeeded 
©Copyright md brasil - direitos reservados 25
Internet
Upstream
Provider
ISP
x.x.x.x/32,
community 100:666
DDoS
Mitigation Techniques
Implementation on RouterOS:
Make the filter:
Don’t forget to announce
The /32 in networks
©Copyright md brasil - direitos reservados 26
Mitigation On the Cloud
Your AS is suffering a DDoS
attacks entering through its
upstreams providers.
©Copyright md brasil - direitos reservados 27
Internet
ISP1
ISP2
Scrubbing
Center
Your
AS
Mitigation On the Cloud
Your AS announces through a
tunnel to the scrubbing provider
the /24 that contains the IP(s)
attacked
©Copyright md brasil - direitos reservados 28
Internet
ISP1
ISP2
Your
AS
Scrubbing
Center
Announce your /24
Mitigation On the Cloud
Mitigation Provider announces
the /24 to the Internet, receives
the traffic destined to the victim,
filter the bad traffic and give
back “clean” traffic
©Copyright md brasil - direitos reservados 29
Internet
ISP1
ISP2
Scrubbing
Center
Your
AS
Your /24 announced
Mitigation On the Cloud
Mitigation Provider announces
the /24 to the Internet, receives
the traffic destined to the victim,
filter the bad traffic and give
back “clean” traffic
©Copyright md brasil - direitos reservados 30
Internet
ISP1
ISP2
Scrubbing
Center
Your
AS
Your /24 announced
Only “clean” traffic flows
Cymru - UTRS
BGP
©Copyright md brasil - direitos reservados 31
Internet
ISP
ISP
ISP
ISP
ISP
Access ISPs agree to
establish BGP sessions
with Cymru UTRS service
UTRS
Content
Providers
BGP
BGP
BGP
BGP
UTRS – Unwanted Traffic
Removal
http://www.team-cymru.org/UTRS/
Cymru - UTRS
Cymru - UTRS
©Copyright md brasil - direitos reservados 32
Internet
ISP
ISP
ISP
ISP
ISP X is suffering a DDoS attack
compromising legitimate traffic
Content
Providers
ISP X
Cymru - UTRS
Cymru - UTRS
©Copyright md brasil - direitos reservados 33
ISP
ISP
ISP X
ISP
ISP
ISP X announces /32 attacked to
UTRS and other ISP blackhole
the /32, stopping the attack.
Content providers traffic is not
affected.
Content
Providers
Internet
UTRS
Cymru - UTRS
Implementation on RouterOS:
In Case you want to announce /32
©Copyright md brasil - direitos reservados 34
Cymru - UTRS
Implementation on RouterOS:
To black-hole announcements sent to UTRS
©Copyright md brasil - direitos reservados 35
Ok, mitigation is
possible, but how much
time my SLA will be
compromised?
©Copyright md brasil - direitos reservados 36
From the attack to the action
All mitigation techniques will require a
specific action, like blackholing to
upstreams providers or changes in
route announcements.
©Copyright md brasil - direitos reservados 37
If the process is handled by humans, big chances are that
service will be compromised for a very, very long time.
People have to know what to do and have to do it fast.
Don’t forget that in some attacks the access to the router
can be compromised and you don’t know even which IP is
being attacked!
From the attack to the action
No chances for humans here.
Definitely, we do need an automated solution !
©Copyright md brasil - direitos reservados 38
In Peace, prepare for War…
Sun Tzu – The art of war
Agenda
39
Background on DDoS – components and
architecture and mitigation techniques;
Tools used for Detection and Mitigation in
an ISP environment;
Hands On! Seeing things working;
The Cherry of the Cake – Cool Graphics
and information about your network;
©Copyright md brasil - direitos reservados
18’
From the attack to the action
Our automatic solution for DDoS mitigation uses:
 Mikrotik Traffic Flow (Net Flow)
and a combination of 2 open source tools:
 Fastnetmon
 ExaBGP
©Copyright md brasil - direitos reservados 40
DDoS Detection with
Fastnetmon
The core of our solution is Fastnetmon
A high performance DoS/DDoS load analyzer
built on top of multiple packet capture engines.
Supports:
- NetFlow (Traffic Flow) v5, v9;
- IPFIX;
- sFLOW v5
- Port mirror/SPAN capture with PF_RING,
NETMAP and PCAP
https://github.com/pavel-odintsov/fastnetmon
©Copyright md brasil - direitos reservados 41
ExaBGP
BGP based SDN application
Known as the BGP “Swiss
Knife”, ExaBGP can do a lot of
related to the protocol usually
not possible with a real BGP
router.
With ExaBGP is possible to
interact with routers, injecting
arbitrary routes, collecting
routing data, etc.
42
https://github.com/Exa-Networks/exabgp
DDoS Detection and Mitigation
Schema
In normal conditions Mikrotik Border Routers are sending
Traffic Flow information to Fastnetmon and ExaBGP has
iBGP sessions with the Border Routers.
©Copyright md brasil - direitos reservados 43
Fastnetmon
ExaBGP
Border
Routers
Mitigation
Border
Routers
Border
Routers
IBGP
sessions
Traffic Flow
information
DDoS Detection and Mitigation
Schema
When a DDoS is detected, Fastnetmon triggers ExaBGP, that
send iBGP routes with a specific community for blackholing.
Border routers announce to mitigation solution
©Copyright md brasil - direitos reservados 44
Fastnetmon
ExaBGP
Border
Routers
Mitigation
Border
Routers
Border
Routers
IBGP
announcements
Traffic Flow
information
Traffic Flow
Configuration
©Copyright md brasil - direitos reservados 45
Traffic Flow
Traffic Flow configuration
©Copyright md brasil - direitos reservados 46
We are using 2 instances
for DDoS detection, one
only for notifications and
one for mitigation
triggering.
Fastnetmon
Installation and
Configuration
©Copyright md brasil - direitos reservados 47
Fastnetmon – Installation and
Configuration
Automatic Installer for Debian and CentOS
Wget https://raw.githubusercontent.com/FastVPSEestiOu/
fastnetmon/master/fastnetmon_install.pl
perl fastnetmon_install.pl
or
perl fastnetmon_install.pl --use git-master
©Copyright md brasil - direitos reservados 48
Fastnetmon – Installation and
Configuration
Configuration Details
The main configuration is a comprehensive text file in
/etc/fastnetmon.conf
# list of all your networks in CIDR format
networks_list_path = /etc/networks_list
# list networks in CIDR format which will be not
monitored for attacks
white_list_path = /etc/networks_whitelist
©Copyright md brasil - direitos reservados 49
Fastnetmon – Installation and
Configuration
Configuration
# Netflow configuration
# it's possible to specify multiple ports here, using
commas as delimiter
netflow_port = 1234
netflow_host = 0.0.0.0
©Copyright md brasil - direitos reservados 50
Adjust Port according to Mikrotik
configuration. IP can be leaved as
0.0.0.0 but is better to inform the
real IPs.
Fastnetmon – Installation and
Configuration
Configuration – Thresholds
# Limits for Dos/DDoS attacks
threshold_pps = 20000
threshold_mbps = 1000
threshold_flows = 3500
©Copyright md brasil - direitos reservados 51
Fastnetmon – Installation and
Configuration
52
Integration with ExaBGP
# announce blocked IPs with BGP protocol with ExaBGP
exabgp = on
exabgp_command_pipe = /var/run/exabgp.cmd
exabgp_community = 65001:666
Define an internal
community for blackholingTurn exabgp on
ExaBGP
Installation and
Configuration
©Copyright md brasil - direitos reservados 53
ExaBGP Installation and
Configuration
ExaBGP Installation (for Debian/Ubuntu)
apt-get install python-pip
pip install exabgp
Installing the bidirectional pipe handler – socat
apt-get install socat
54
ExaBGP Installation
and Configuration
Create a file /etc/exabgp_blackholing.conf
group anything {
local-as 100;
peer-as 100;
router-id 1.1.1.1;
neighbor 2.2.2.2 {
local-address 1.1.1.1;
}
# process management
process service-dynamic {
run /usr/bin/socat stdout pipe:/var/run/exabgp.cmd;
}
}
55
ExaBGP Installation
and Configuration
Run Exabgp
env exabgp.daemon.user=root exabgp.daemon.daemonize=true
exabgp.daemon.pid=/var/run/exabgp.pid
exabgp.log.destination=/var/log/exabgp.log exabgp
/etc/exabgp_blackholing.conf
Source:
https://github.com/pavel-
odintsov/fastnetmon/blob/master/docs/EXABGP_INTEGRATION.md
56
Agenda
57
Background on DDoS – components and
architecture and mitigation techniques;
Tools used for Detection and Mitigation in
an ISP environment;
Hands On! Seeing things working;
The Cherry of the Cake – Cool Graphics
and information about your network;
©Copyright md brasil - direitos reservados
25’
Fastnetmon Client
58
/opt/fastnetmon/fastnetmon_client
Fastnetmon Client
59
/opt/fastnetmon/fastnetmon_client
Pause for Hands ON
Let’s see things working
©Copyright md brasil - direitos reservados 60
Agenda
61
Background on DDoS – components and
architecture and mitigation techniques;
Tools used for Detection and Mitigation in
an ISP environment;
Hands On! Seeing things working;
The Cherry of the Cake – Cool Graphics
and information about your network;
©Copyright md brasil - direitos reservados
32’
DDoS Detection with
Fastnetmon
With the installation of Fastnetmon and
other tools we can improve our
implementation in order to have more
information and control of our network.
For that purpose, besides Fastnetmon we
will need some other tools:
InfluxDB + Grafana
https://github.com/FastVPSEestiOu/fastnetmon/blob/
master/docs/INFLUXDB_INTEGRATION.md
©Copyright md brasil - direitos reservados 62
Many thanks to my
friend Vicente de
Luca, from Zendesk
who helped us a lot with
the implementation.
DDoS Detection with
Fastnetmon
©Copyright md brasil - direitos reservados 63
InfluxDB is an open source distributed time series
database with no external dependencies. It's useful for recording
metrics, events, and performing analytics.
https://github.com/influxdata/influxdb
Installation for Debian/Ubuntu
wget https://s3.amazonaws.com/influxdb/influxdb_0.10.1-
1_amd64.deb
sudo dpkg -i influxdb_0.10.1-1_amd64.deb
DDoS Detection with
Fastnetmon
©Copyright md brasil - direitos reservados 64
Grafana is an open source, feature rich metrics dashboard
and graph editor for Graphite, Elasticsearch, OpenTSDB,
Prometheus and InfluxDB
https://github.com/grafana/grafana
Installation for Debian/Ubuntu
wget
https://grafanarel.s3.amazonaws.com/builds/grafana_2.6.0
_amd64.deb
sudo dpkg -i grafana_2.6.0_amd64.deb
DDoS Detection with
Fastnetmon
©Copyright md brasil - direitos reservados 65
This is a typical dashboard you can do
with grafana
Pause for Hands ON
Let’s see things working
©Copyright md brasil - direitos reservados 66
References
67
Defeating DDoS – Cisco White paper
Anatomy of a DDoS attack – Team Cymru
Radware's DDoS Handbook: The Ultimate Guide to Everything You
Need to Know about DDoS Attacks
An Introduction to DDoS Attacks and Defense Mechanisms: An
Analyst's Handbook by B. B. Gupta
FastNetMon – Open Source DDoS Mitigation Toolkit – Presentation
on RIPE71 meeting
Detecting and Mitigating DDoS: A FastNetMon Use Case by Vicente
de Luca – Presentation at RIPE71 meeting
©Copyright md brasil - direitos reservados
References
68
https://www.stateoftheinternet.com/downloads/pdfs/Q3-2015-
SOTI-Connectivity-Executive-Summary.pdf
http://www.pcworld.com/article/3012963/security/ddos-attacks-
increase-in-number-endanger-small-organizations.html
http://www.zdnet.com/article/ddos-attacks-size-doesnt-matter/
https://github.com/pavel-
odintsov/fastnetmon/blob/master/docs/EXABGP_INTEGRATION.md
https://github.com/Exa-Networks/exabgp
https://github.com/FastVPSEestiOu/fastnetmon/blob/master/docs/I
NFLUXDB_INTEGRATION.md
https://github.com/grafana/grafana
©Copyright md brasil - direitos reservados
Many Thanks to
69
Tom Smyth for the background in DDoS and all
cooperation and technical information exchange;
Pavel Odinstov who developed the wonderful tool
Fastnetmon and for the efforts in support;
Vicente de Luca for introduce me to Fastnetmon and the
support on activating and configuring InfluxDB and Grafana
Thomas Mangin for the work with ExaBGP (I don’t know
him personally, but watched a lot of presentations)
All people from open source community, involved in cool
projects 
Mikrotik guys, who gave us the opportunity to be in this
cool event.
©Copyright md brasil - direitos reservados
Download Page
70
Presentation and related material can be obtained in
the URL:
http://mdbrasil.com.br/downloads
or in Mikrotik Web Site
©Copyright md brasil - direitos reservados
Extra Slides
©Copyright md brasil - direitos reservados 71
Background on DDoS
How to find amplifiers
DNS:
dig @x.x.x.x +edns +ignore com ANY
NTP:
ntpdc –nc monlist x.x.x.x
SNMP:
snmpbulkget -v2c -c public x.x.x.x 1.3
NetBios
nmblookup –A x.x.x.x x.x.x.x = IP address
©Copyright md brasil - direitos reservados 72
Background on DDoS
How to find amplifiers
SSDP
send UDP packet with destination port 1900
and the following payload:
SSDP
M-SEARCH * HTTP/1.1 rn
Host: x.x.x.x:1900 rn
Man: "ssdp:discover" rn
MX: 3 rn
ST: ssdp:all rn
rn
You can also use this script below:
https://gist.github.com/provegard/1435555
©Copyright md brasil - direitos reservados 73
Installing and running
Fastnetmon
Installing 1/3
©Copyright md brasil - direitos reservados 74
Installing and running
Fastnetmon
Installing 2/3
©Copyright md brasil - direitos reservados 75
Installing and running
Fastnetmon
Installing 3/3
©Copyright md brasil - direitos reservados 76
Background on DDoS
Categories
Volumetric - Flood-based attacks that can be at layer 3,
4, or 7.
Asymmetric - Attacks designed to invoke timeouts or
session-state changes.
Computational - Attacks designed to consume CPU and
memory.
Vulnerability-based - Attacks that exploit software
vulnerabilities.
https://f5.com/solutions/enterprise/reference-architectures/ddos-
protection
©Copyright md brasil - direitos reservados 77
Hvala!
©Copyright md brasil - direitos reservados 78
Copyright Notice
(Aviso sobre direitos autorais)
English:
This material is an effort intended to improve the level of knowledge of professionals
that work with Mikrotik RouterOS and should be used solely for self-study purposes.
Digital copies and/or any printed material contained in this presentation or derived
from it are property of MD Brasil TI & Telecom and cannot be used for any kind of
training, presentation or workshop, even non-commercial ones.
Reproduction of any part or picture requires previous written authorization of MD
Brasil. For information about how to obtain such authorization, please contact
mdbrasil@mdbrasil.com.br.
©Copyright md brasil - direitos reservados 79
Portuguese:
Este material é um esforço que visa aprimorar o grau de conhecimento de
profissionais que trabalham com Mikrotik RouterOS e deve ser usado apenas com
objetivos de auto estudo.
Cópias digitais e/ou materiais impressos com conteúdo desta apresentação ou dela
derivados são de propriedade a MD Brasil TI & Telecom a não podem ser usados para
qualquer tipo de treinamento, apresentação ou seminário, mesmo os de finalidades
não comerciais.
A reprodução de qualquer parte ou figura requer prévia autorização por escrito da
MD Brasil. Para informações sobre como obter esta autorização, por favor contate
mdbrasil@mdbrasil.com.br.

Contenu connexe

Tendances

Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)Pavel Odintsov
 
DDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP InfrastructuresDDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP InfrastructuresPavel Odintsov
 
DDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and TechniquesDDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and TechniquesBabak Farrokhi
 
BGP FlowSpec experience and future developments
BGP FlowSpec experience and future developmentsBGP FlowSpec experience and future developments
BGP FlowSpec experience and future developmentsPavel Odintsov
 
Protect your edge BGP security made simple
Protect your edge BGP security made simpleProtect your edge BGP security made simple
Protect your edge BGP security made simplePavel Odintsov
 
FastNetMonを試してみた
FastNetMonを試してみたFastNetMonを試してみた
FastNetMonを試してみたYutaka Ishizaki
 
Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points  Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points Pavel Odintsov
 
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolFastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolPavel Odintsov
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdPavel Odintsov
 
Implementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkImplementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkPavel Odintsov
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationWilson Rogerio Lopes
 
DDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentDDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentPavel Odintsov
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionRedge Technologies
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKMarian Marinov
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecShortestPathFirst
 
Introduction to OverTheBox
Introduction to OverTheBoxIntroduction to OverTheBox
Introduction to OverTheBoxOVHcloud
 

Tendances (20)

Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)Ultra	fast	DDoS Detection	with	FastNetMon at	 Coloclue	(AS	8283)
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
 
DDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP InfrastructuresDDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP Infrastructures
 
DDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and TechniquesDDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and Techniques
 
BGP FlowSpec experience and future developments
BGP FlowSpec experience and future developmentsBGP FlowSpec experience and future developments
BGP FlowSpec experience and future developments
 
Protect your edge BGP security made simple
Protect your edge BGP security made simpleProtect your edge BGP security made simple
Protect your edge BGP security made simple
 
FastNetMonを試してみた
FastNetMonを試してみたFastNetMonを試してみた
FastNetMonを試してみた
 
Jon Nield FastNetMon
Jon Nield FastNetMonJon Nield FastNetMon
Jon Nield FastNetMon
 
Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points  Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points
 
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolFastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection tool
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPd
 
Implementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkImplementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit network
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and Mitigation
 
DDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentDDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environment
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solution
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDK
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow Spec
 
Preventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP addressPreventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP address
 
Make the internet safe with DNS Firewall
Make the internet safe with DNS FirewallMake the internet safe with DNS Firewall
Make the internet safe with DNS Firewall
 
Introduction to OverTheBox
Introduction to OverTheBoxIntroduction to OverTheBox
Introduction to OverTheBox
 
RedHat - Centos Firewalld
RedHat - Centos FirewalldRedHat - Centos Firewalld
RedHat - Centos Firewalld
 

En vedette

DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaPavel Odintsov
 
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiJanog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiPavel Odintsov
 
Борьба с DDoS в хостинге - по обе стороны баррикад / Константин Новаковский (...
Борьба с DDoS в хостинге - по обе стороны баррикад / Константин Новаковский (...Борьба с DDoS в хостинге - по обе стороны баррикад / Константин Новаковский (...
Борьба с DDoS в хостинге - по обе стороны баррикад / Константин Новаковский (...Ontico
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacksRollingsherman
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackAhmed Ghazey
 
IPTV Set-top box monitoring
IPTV Set-top box monitoringIPTV Set-top box monitoring
IPTV Set-top box monitoringDávid Károly
 
ANÁLISE E MELHORIAS EM REDE WIRELESS
ANÁLISE E MELHORIAS EM REDE WIRELESS ANÁLISE E MELHORIAS EM REDE WIRELESS
ANÁLISE E MELHORIAS EM REDE WIRELESS Ricardo Ferreira
 
2016 NCTU P4 Workshop
2016 NCTU P4 Workshop2016 NCTU P4 Workshop
2016 NCTU P4 WorkshopYi Tseng
 
LINX 83 ExaBGP as a route server ?
LINX 83  ExaBGP as a route server ?LINX 83  ExaBGP as a route server ?
LINX 83 ExaBGP as a route server ?Thomas Mangin
 
AÇÃO INTEGRADORA ASSISTENTE DE OPERAÇOES LOGISTICAS modulo 4 SENAC 2015
AÇÃO INTEGRADORA ASSISTENTE DE OPERAÇOES LOGISTICAS   modulo 4 SENAC 2015AÇÃO INTEGRADORA ASSISTENTE DE OPERAÇOES LOGISTICAS   modulo 4 SENAC 2015
AÇÃO INTEGRADORA ASSISTENTE DE OPERAÇOES LOGISTICAS modulo 4 SENAC 2015Flávia Maria
 

En vedette (18)

03 estrategia-ddos
03 estrategia-ddos03 estrategia-ddos
03 estrategia-ddos
 
DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner Maia
 
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiJanog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka Ishizaki
 
Борьба с DDoS в хостинге - по обе стороны баррикад / Константин Новаковский (...
Борьба с DDoS в хостинге - по обе стороны баррикад / Константин Новаковский (...Борьба с DDoS в хостинге - по обе стороны баррикад / Константин Новаковский (...
Борьба с DDoS в хостинге - по обе стороны баррикад / Константин Новаковский (...
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
IPTV Set-top box monitoring
IPTV Set-top box monitoringIPTV Set-top box monitoring
IPTV Set-top box monitoring
 
Set top box
Set top boxSet top box
Set top box
 
ANÁLISE E MELHORIAS EM REDE WIRELESS
ANÁLISE E MELHORIAS EM REDE WIRELESS ANÁLISE E MELHORIAS EM REDE WIRELESS
ANÁLISE E MELHORIAS EM REDE WIRELESS
 
SDN-IP Peering using BGP
SDN-IP Peering using BGPSDN-IP Peering using BGP
SDN-IP Peering using BGP
 
2016 NCTU P4 Workshop
2016 NCTU P4 Workshop2016 NCTU P4 Workshop
2016 NCTU P4 Workshop
 
LINX 83 ExaBGP as a route server ?
LINX 83  ExaBGP as a route server ?LINX 83  ExaBGP as a route server ?
LINX 83 ExaBGP as a route server ?
 
AÇÃO INTEGRADORA ASSISTENTE DE OPERAÇOES LOGISTICAS modulo 4 SENAC 2015
AÇÃO INTEGRADORA ASSISTENTE DE OPERAÇOES LOGISTICAS   modulo 4 SENAC 2015AÇÃO INTEGRADORA ASSISTENTE DE OPERAÇOES LOGISTICAS   modulo 4 SENAC 2015
AÇÃO INTEGRADORA ASSISTENTE DE OPERAÇOES LOGISTICAS modulo 4 SENAC 2015
 

Similaire à Distributed Denial of Service Attack - Detection And Mitigation

DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...MazeBolt Technologies
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseNETSCOUT
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaCloudflare
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPROIDEA
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosHaltdos
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks PROIDEA
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsA Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsIRJET Journal
 

Similaire à Distributed Denial of Service Attack - Detection And Mitigation (20)

Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsA Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
 
AlexsanderLima
AlexsanderLimaAlexsanderLima
AlexsanderLima
 

Plus de Pavel Odintsov

Network telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationNetwork telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationPavel Odintsov
 
VietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedVietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedPavel Odintsov
 
Flowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoiseFlowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoisePavel Odintsov
 
Detectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSDetectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSPavel Odintsov
 
Lekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flLekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flPavel Odintsov
 
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersLekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersPavel Odintsov
 
Containers in real world презентация
Containers in real world презентацияContainers in real world презентация
Containers in real world презентацияPavel Odintsov
 
Containers are the future of the Cloud
Containers are the future of the CloudContainers are the future of the Cloud
Containers are the future of the CloudPavel Odintsov
 

Plus de Pavel Odintsov (9)

Network telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationNetwork telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentation
 
VietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedVietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume Based
 
Flowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoiseFlowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoise
 
Detectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSDetectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOS
 
Lekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flLekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_fl
 
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersLekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
 
SIG-NOC Tools Survey
SIG-NOC Tools SurveySIG-NOC Tools Survey
SIG-NOC Tools Survey
 
Containers in real world презентация
Containers in real world презентацияContainers in real world презентация
Containers in real world презентация
 
Containers are the future of the Cloud
Containers are the future of the CloudContainers are the future of the Cloud
Containers are the future of the Cloud
 

Dernier

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 

Dernier (20)

Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 

Distributed Denial of Service Attack - Detection And Mitigation

  • 1. Distributed Denial of Service Attacks Detection and Mitigation European MUM – 2016 Ljubljana / Slovenia Wardner Maia
  • 2. Introduction Wardner Maia Electronic and Telecommunications Engineer; Internet Service Provider since 1995; Training Business since 2002; Certified Mikrotik Trainer since 2007; MD Brasil IT & Telecom CTO; Member of the board of directors of LACNIC. 2©Copyright md brasil - direitos reservados
  • 3. Introduction MD Brasil IT & Telecom Internet Access Provider in São Paulo state - Brazil; Telecom equipment manufacturer and integrator; Mikrotik Training Center since 2007; Consulting services worldwide. http://mdbrasil.com.br http://mikrotikbrasil.com.br 3©Copyright md brasil - direitos reservados
  • 4. Previous Participations on European MUMs Wireless Security (2008 – Krakow/PL) Wireless Security for OLPC project (2009 – Prague/CZ) Layer 2 Security (2010 – Wroclaw/PL) Routing Security (2011 – Budapest/HU) IPv6 Security (2012 - Warsaw/PL) BGP Filtering (2013 – Zagreb/CR) MPLS VPNs Security (2014 – Venice/IT) Network Simulation (2015 – Prague/CZ) Today: DDoS attacks – detection and mitigation http://mikrotikbrasil.com.br/artigos 4©Copyright md brasil - direitos reservados
  • 5. DDoS attacks Last year our good friend Tom Smyth (Wireless Connect – Ireland) did a great presentation about DDoS. http://mum.mikrotik.com/2015/CZ/info ©Copyright md brasil - direitos reservados 5 There is a lot of useful information on that work: Concepts about DDoS, BCP 38, UrPF, how to reduce the surface of attacks blackholing unused space, etc, etc, Definitely get that presentation and do your Homework!
  • 6. DDoS – Detection and Mitigation Why (again) this subject? ©Copyright md brasil - direitos reservados 6
  • 7. DDoS – Should I care? We have to be prepared for bigger and bigger attacks 7©Copyright md brasil - direitos reservados https://www.linkedin.com/puls e/2016-year-3000-gbps-ddos- attack-tech2016-marcos-ortiz- valmaseda?trk=pulse_spock- articles
  • 8. Is DDoS a “privilege” of Big Operators and Data Centers? Could my (small/medium) company be a target? ©Copyright md brasil - direitos reservados 8
  • 9. DDoS – Should I Care? 9©Copyright md brasil - direitos reservados https://www.stateoftheinternet.com/downloads/pdfs/Q3-2015-SOTI- Connectivity-Executive-Summary.pdf
  • 10. DDoS – Should I Care? 10©Copyright md brasil - direitos reservados http://www.pcworld.com/article/ 3012963/security/ddos-attacks- increase-in-number-endanger- small-organizations.html http://www.zdnet.com/article/ddos-attacks-size-doesnt-matter/
  • 11. DDoS – Should I Care? 11©Copyright md brasil - direitos reservados How about to hire a DDoS attack, for US$ 2.99?
  • 12. DDoS – Should I Care? 12©Copyright md brasil - direitos reservados Being a target of a DDoS attack is not a matter of “if” but “when” it will happen. Do you have a formal Incident Response Plan?
  • 13. DDoS – Detection and Mitigation Whom this presentation is intended for? ©Copyright md brasil - direitos reservados 13
  • 14. Target Audience and Presentation Goals 14©Copyright md brasil - direitos reservados This presentation is targeted to small an medium ISPs, mainly in the business of Last mile Internet Access; The main goals of this presentation are: to show that it’s important to have a plan to deal with DDoS and a suggestion on how to implement it. - A real case scenario implementation will be showed; - We’ll try to fit the presentation in the 45 minutes we have.
  • 15. Agenda 15 Background on DDoS – components and architecture and mitigation techniques; Tools used for Detection and Mitigation in an ISP environment; Hands On! Seeing things working; The Cherry of the Cake – Cool Graphics and information about your network; ©Copyright md brasil - direitos reservados 6’
  • 16. Agenda 16 Background on DDoS – components and architecture and mitigation techniques; Tools used for Detection and Mitigation in an ISP environment; Hands On! Seeing things working; The Cherry of the Cake – Cool Graphics and information about your network; ©Copyright md brasil - direitos reservados 6’
  • 17. Background on DDoS Basic concepts Dos Types DoS Denial of Service Attack DDoS Distributed Denial of Service Attack DRDoS Distributed Reflected Denial of Service Attack ©Copyright md brasil - direitos reservados 17
  • 18. Anatomy of a DRDoS attack ©Copyright md brasil - direitos reservados 18 Attacker Handlers Zombies Amplifiers Victim Usually the attacks are mostly DDRoS but we’ll call them simply DDoS
  • 19. How to fight against DDoS? ©Copyright md brasil - direitos reservados 19
  • 20. Prevention Doing our homework  Implement BCP-38 (RFC 2827), by firewall rules and uRPF (mostly you’ll do a good job for the rest of the world);  Find and fix the amplifiers (DNS, SSDP, NTP, SNMP, NETBIOS) on your network (Extra Slides at the end of this presentation have the commands to do it);  Subscribe to Team Cymru Bogons Service and automatically black-hole Bogons Prefixes ©Copyright md brasil - direitos reservados 20
  • 21. Prevention Doing our homework  Ensure that all your space announced to eBGP have internal routes to your network, avoiding static loops; One single 64 bytes ping with TTL = 250, will generate 2 mbps of traffic  ©Copyright md brasil - direitos reservados 21 Upstream Provider ISP
  • 22. Prevention Doing our homework  Reduce your exposition to DDoS announcing your unused space as black-hole (See Tom’s hints for that) NB: Depends on your Upstream Provider’s policy ©Copyright md brasil - direitos reservados 22 Upstream Provider ISP
  • 23. Mitigation Techniques ©Copyright md brasil - direitos reservados 23
  • 24. Remote Triggered Blackhole ISP is suffering a DDoS attack targeting IP x.x.x.x/32; Upstream provider (e.g. AS 100) provides a policy that black-hole any /32 announcement with a specific community (e.g. 100:666); ©Copyright md brasil - direitos reservados 24 Internet Upstream Provider ISP
  • 25. Remote Triggered Blackhole ISP announces to the Upstream provider the /32 with the community; Upstream provider put the /32 in blackhole; Communication with /32 is lost and channel overflow stops; Other customer’s SLA is saved, but unfortunately we can say that DDoS succeeded  ©Copyright md brasil - direitos reservados 25 Internet Upstream Provider ISP x.x.x.x/32, community 100:666
  • 26. DDoS Mitigation Techniques Implementation on RouterOS: Make the filter: Don’t forget to announce The /32 in networks ©Copyright md brasil - direitos reservados 26
  • 27. Mitigation On the Cloud Your AS is suffering a DDoS attacks entering through its upstreams providers. ©Copyright md brasil - direitos reservados 27 Internet ISP1 ISP2 Scrubbing Center Your AS
  • 28. Mitigation On the Cloud Your AS announces through a tunnel to the scrubbing provider the /24 that contains the IP(s) attacked ©Copyright md brasil - direitos reservados 28 Internet ISP1 ISP2 Your AS Scrubbing Center Announce your /24
  • 29. Mitigation On the Cloud Mitigation Provider announces the /24 to the Internet, receives the traffic destined to the victim, filter the bad traffic and give back “clean” traffic ©Copyright md brasil - direitos reservados 29 Internet ISP1 ISP2 Scrubbing Center Your AS Your /24 announced
  • 30. Mitigation On the Cloud Mitigation Provider announces the /24 to the Internet, receives the traffic destined to the victim, filter the bad traffic and give back “clean” traffic ©Copyright md brasil - direitos reservados 30 Internet ISP1 ISP2 Scrubbing Center Your AS Your /24 announced Only “clean” traffic flows
  • 31. Cymru - UTRS BGP ©Copyright md brasil - direitos reservados 31 Internet ISP ISP ISP ISP ISP Access ISPs agree to establish BGP sessions with Cymru UTRS service UTRS Content Providers BGP BGP BGP BGP UTRS – Unwanted Traffic Removal http://www.team-cymru.org/UTRS/
  • 32. Cymru - UTRS Cymru - UTRS ©Copyright md brasil - direitos reservados 32 Internet ISP ISP ISP ISP ISP X is suffering a DDoS attack compromising legitimate traffic Content Providers ISP X
  • 33. Cymru - UTRS Cymru - UTRS ©Copyright md brasil - direitos reservados 33 ISP ISP ISP X ISP ISP ISP X announces /32 attacked to UTRS and other ISP blackhole the /32, stopping the attack. Content providers traffic is not affected. Content Providers Internet UTRS
  • 34. Cymru - UTRS Implementation on RouterOS: In Case you want to announce /32 ©Copyright md brasil - direitos reservados 34
  • 35. Cymru - UTRS Implementation on RouterOS: To black-hole announcements sent to UTRS ©Copyright md brasil - direitos reservados 35
  • 36. Ok, mitigation is possible, but how much time my SLA will be compromised? ©Copyright md brasil - direitos reservados 36
  • 37. From the attack to the action All mitigation techniques will require a specific action, like blackholing to upstreams providers or changes in route announcements. ©Copyright md brasil - direitos reservados 37 If the process is handled by humans, big chances are that service will be compromised for a very, very long time. People have to know what to do and have to do it fast. Don’t forget that in some attacks the access to the router can be compromised and you don’t know even which IP is being attacked!
  • 38. From the attack to the action No chances for humans here. Definitely, we do need an automated solution ! ©Copyright md brasil - direitos reservados 38 In Peace, prepare for War… Sun Tzu – The art of war
  • 39. Agenda 39 Background on DDoS – components and architecture and mitigation techniques; Tools used for Detection and Mitigation in an ISP environment; Hands On! Seeing things working; The Cherry of the Cake – Cool Graphics and information about your network; ©Copyright md brasil - direitos reservados 18’
  • 40. From the attack to the action Our automatic solution for DDoS mitigation uses:  Mikrotik Traffic Flow (Net Flow) and a combination of 2 open source tools:  Fastnetmon  ExaBGP ©Copyright md brasil - direitos reservados 40
  • 41. DDoS Detection with Fastnetmon The core of our solution is Fastnetmon A high performance DoS/DDoS load analyzer built on top of multiple packet capture engines. Supports: - NetFlow (Traffic Flow) v5, v9; - IPFIX; - sFLOW v5 - Port mirror/SPAN capture with PF_RING, NETMAP and PCAP https://github.com/pavel-odintsov/fastnetmon ©Copyright md brasil - direitos reservados 41
  • 42. ExaBGP BGP based SDN application Known as the BGP “Swiss Knife”, ExaBGP can do a lot of related to the protocol usually not possible with a real BGP router. With ExaBGP is possible to interact with routers, injecting arbitrary routes, collecting routing data, etc. 42 https://github.com/Exa-Networks/exabgp
  • 43. DDoS Detection and Mitigation Schema In normal conditions Mikrotik Border Routers are sending Traffic Flow information to Fastnetmon and ExaBGP has iBGP sessions with the Border Routers. ©Copyright md brasil - direitos reservados 43 Fastnetmon ExaBGP Border Routers Mitigation Border Routers Border Routers IBGP sessions Traffic Flow information
  • 44. DDoS Detection and Mitigation Schema When a DDoS is detected, Fastnetmon triggers ExaBGP, that send iBGP routes with a specific community for blackholing. Border routers announce to mitigation solution ©Copyright md brasil - direitos reservados 44 Fastnetmon ExaBGP Border Routers Mitigation Border Routers Border Routers IBGP announcements Traffic Flow information
  • 45. Traffic Flow Configuration ©Copyright md brasil - direitos reservados 45
  • 46. Traffic Flow Traffic Flow configuration ©Copyright md brasil - direitos reservados 46 We are using 2 instances for DDoS detection, one only for notifications and one for mitigation triggering.
  • 48. Fastnetmon – Installation and Configuration Automatic Installer for Debian and CentOS Wget https://raw.githubusercontent.com/FastVPSEestiOu/ fastnetmon/master/fastnetmon_install.pl perl fastnetmon_install.pl or perl fastnetmon_install.pl --use git-master ©Copyright md brasil - direitos reservados 48
  • 49. Fastnetmon – Installation and Configuration Configuration Details The main configuration is a comprehensive text file in /etc/fastnetmon.conf # list of all your networks in CIDR format networks_list_path = /etc/networks_list # list networks in CIDR format which will be not monitored for attacks white_list_path = /etc/networks_whitelist ©Copyright md brasil - direitos reservados 49
  • 50. Fastnetmon – Installation and Configuration Configuration # Netflow configuration # it's possible to specify multiple ports here, using commas as delimiter netflow_port = 1234 netflow_host = 0.0.0.0 ©Copyright md brasil - direitos reservados 50 Adjust Port according to Mikrotik configuration. IP can be leaved as 0.0.0.0 but is better to inform the real IPs.
  • 51. Fastnetmon – Installation and Configuration Configuration – Thresholds # Limits for Dos/DDoS attacks threshold_pps = 20000 threshold_mbps = 1000 threshold_flows = 3500 ©Copyright md brasil - direitos reservados 51
  • 52. Fastnetmon – Installation and Configuration 52 Integration with ExaBGP # announce blocked IPs with BGP protocol with ExaBGP exabgp = on exabgp_command_pipe = /var/run/exabgp.cmd exabgp_community = 65001:666 Define an internal community for blackholingTurn exabgp on
  • 53. ExaBGP Installation and Configuration ©Copyright md brasil - direitos reservados 53
  • 54. ExaBGP Installation and Configuration ExaBGP Installation (for Debian/Ubuntu) apt-get install python-pip pip install exabgp Installing the bidirectional pipe handler – socat apt-get install socat 54
  • 55. ExaBGP Installation and Configuration Create a file /etc/exabgp_blackholing.conf group anything { local-as 100; peer-as 100; router-id 1.1.1.1; neighbor 2.2.2.2 { local-address 1.1.1.1; } # process management process service-dynamic { run /usr/bin/socat stdout pipe:/var/run/exabgp.cmd; } } 55
  • 56. ExaBGP Installation and Configuration Run Exabgp env exabgp.daemon.user=root exabgp.daemon.daemonize=true exabgp.daemon.pid=/var/run/exabgp.pid exabgp.log.destination=/var/log/exabgp.log exabgp /etc/exabgp_blackholing.conf Source: https://github.com/pavel- odintsov/fastnetmon/blob/master/docs/EXABGP_INTEGRATION.md 56
  • 57. Agenda 57 Background on DDoS – components and architecture and mitigation techniques; Tools used for Detection and Mitigation in an ISP environment; Hands On! Seeing things working; The Cherry of the Cake – Cool Graphics and information about your network; ©Copyright md brasil - direitos reservados 25’
  • 60. Pause for Hands ON Let’s see things working ©Copyright md brasil - direitos reservados 60
  • 61. Agenda 61 Background on DDoS – components and architecture and mitigation techniques; Tools used for Detection and Mitigation in an ISP environment; Hands On! Seeing things working; The Cherry of the Cake – Cool Graphics and information about your network; ©Copyright md brasil - direitos reservados 32’
  • 62. DDoS Detection with Fastnetmon With the installation of Fastnetmon and other tools we can improve our implementation in order to have more information and control of our network. For that purpose, besides Fastnetmon we will need some other tools: InfluxDB + Grafana https://github.com/FastVPSEestiOu/fastnetmon/blob/ master/docs/INFLUXDB_INTEGRATION.md ©Copyright md brasil - direitos reservados 62 Many thanks to my friend Vicente de Luca, from Zendesk who helped us a lot with the implementation.
  • 63. DDoS Detection with Fastnetmon ©Copyright md brasil - direitos reservados 63 InfluxDB is an open source distributed time series database with no external dependencies. It's useful for recording metrics, events, and performing analytics. https://github.com/influxdata/influxdb Installation for Debian/Ubuntu wget https://s3.amazonaws.com/influxdb/influxdb_0.10.1- 1_amd64.deb sudo dpkg -i influxdb_0.10.1-1_amd64.deb
  • 64. DDoS Detection with Fastnetmon ©Copyright md brasil - direitos reservados 64 Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, Elasticsearch, OpenTSDB, Prometheus and InfluxDB https://github.com/grafana/grafana Installation for Debian/Ubuntu wget https://grafanarel.s3.amazonaws.com/builds/grafana_2.6.0 _amd64.deb sudo dpkg -i grafana_2.6.0_amd64.deb
  • 65. DDoS Detection with Fastnetmon ©Copyright md brasil - direitos reservados 65 This is a typical dashboard you can do with grafana
  • 66. Pause for Hands ON Let’s see things working ©Copyright md brasil - direitos reservados 66
  • 67. References 67 Defeating DDoS – Cisco White paper Anatomy of a DDoS attack – Team Cymru Radware's DDoS Handbook: The Ultimate Guide to Everything You Need to Know about DDoS Attacks An Introduction to DDoS Attacks and Defense Mechanisms: An Analyst's Handbook by B. B. Gupta FastNetMon – Open Source DDoS Mitigation Toolkit – Presentation on RIPE71 meeting Detecting and Mitigating DDoS: A FastNetMon Use Case by Vicente de Luca – Presentation at RIPE71 meeting ©Copyright md brasil - direitos reservados
  • 69. Many Thanks to 69 Tom Smyth for the background in DDoS and all cooperation and technical information exchange; Pavel Odinstov who developed the wonderful tool Fastnetmon and for the efforts in support; Vicente de Luca for introduce me to Fastnetmon and the support on activating and configuring InfluxDB and Grafana Thomas Mangin for the work with ExaBGP (I don’t know him personally, but watched a lot of presentations) All people from open source community, involved in cool projects  Mikrotik guys, who gave us the opportunity to be in this cool event. ©Copyright md brasil - direitos reservados
  • 70. Download Page 70 Presentation and related material can be obtained in the URL: http://mdbrasil.com.br/downloads or in Mikrotik Web Site ©Copyright md brasil - direitos reservados
  • 71. Extra Slides ©Copyright md brasil - direitos reservados 71
  • 72. Background on DDoS How to find amplifiers DNS: dig @x.x.x.x +edns +ignore com ANY NTP: ntpdc –nc monlist x.x.x.x SNMP: snmpbulkget -v2c -c public x.x.x.x 1.3 NetBios nmblookup –A x.x.x.x x.x.x.x = IP address ©Copyright md brasil - direitos reservados 72
  • 73. Background on DDoS How to find amplifiers SSDP send UDP packet with destination port 1900 and the following payload: SSDP M-SEARCH * HTTP/1.1 rn Host: x.x.x.x:1900 rn Man: "ssdp:discover" rn MX: 3 rn ST: ssdp:all rn rn You can also use this script below: https://gist.github.com/provegard/1435555 ©Copyright md brasil - direitos reservados 73
  • 74. Installing and running Fastnetmon Installing 1/3 ©Copyright md brasil - direitos reservados 74
  • 75. Installing and running Fastnetmon Installing 2/3 ©Copyright md brasil - direitos reservados 75
  • 76. Installing and running Fastnetmon Installing 3/3 ©Copyright md brasil - direitos reservados 76
  • 77. Background on DDoS Categories Volumetric - Flood-based attacks that can be at layer 3, 4, or 7. Asymmetric - Attacks designed to invoke timeouts or session-state changes. Computational - Attacks designed to consume CPU and memory. Vulnerability-based - Attacks that exploit software vulnerabilities. https://f5.com/solutions/enterprise/reference-architectures/ddos- protection ©Copyright md brasil - direitos reservados 77
  • 78. Hvala! ©Copyright md brasil - direitos reservados 78
  • 79. Copyright Notice (Aviso sobre direitos autorais) English: This material is an effort intended to improve the level of knowledge of professionals that work with Mikrotik RouterOS and should be used solely for self-study purposes. Digital copies and/or any printed material contained in this presentation or derived from it are property of MD Brasil TI & Telecom and cannot be used for any kind of training, presentation or workshop, even non-commercial ones. Reproduction of any part or picture requires previous written authorization of MD Brasil. For information about how to obtain such authorization, please contact mdbrasil@mdbrasil.com.br. ©Copyright md brasil - direitos reservados 79 Portuguese: Este material é um esforço que visa aprimorar o grau de conhecimento de profissionais que trabalham com Mikrotik RouterOS e deve ser usado apenas com objetivos de auto estudo. Cópias digitais e/ou materiais impressos com conteúdo desta apresentação ou dela derivados são de propriedade a MD Brasil TI & Telecom a não podem ser usados para qualquer tipo de treinamento, apresentação ou seminário, mesmo os de finalidades não comerciais. A reprodução de qualquer parte ou figura requer prévia autorização por escrito da MD Brasil. Para informações sobre como obter esta autorização, por favor contate mdbrasil@mdbrasil.com.br.