Upgrade to Pro — share decks privately, control downloads, hide ads and more …

DDoS Attacks in 2017: Beyond Packet Filtering

DDoS Attacks in 2017: Beyond Packet Filtering

Artyom "Töma" Gavrichenkov

October 04, 2016
Tweet

More Decks by Artyom "Töma" Gavrichenkov

Other Decks in Technology

Transcript

  1. qrator.net 2016 3 786 1038 1993 477 370 845 _2012_

    _2013_ _2014_ _2015_ Volumetric TCP-based HERE BE DRAGONS
  2. qrator.net 2016 4 786 1038 1993 477 370 845 _2012_

    _2013_ _2014_ _2015_ Volumetric TCP-based HERE BE DRAGONS
  3. qrator.net 2016 5 786 1038 1993 477 370 845 _2012_

    _2013_ _2014_ _2015_ Volumetric TCP-based HERE BE DRAGONS
  4. qrator.net 2016 Distributed Denial-of-Service attack • An attempt to make

    a network resource unavailable by exhausting its resources
  5. qrator.net 2016 Distributed Denial-of-Service attack • An attempt to make

    a network resource unavailable by exhausting its resources: • Bandwidth
  6. qrator.net 2016 Distributed Denial-of-Service attack • An attempt to make

    a network resource unavailable by exhausting its resources: • Bandwidth: ICMP flood, UDP flood, SYN flood…
  7. qrator.net 2016 Distributed Denial-of-Service attack • An attempt to make

    a network resource unavailable by exhausting its resources: • Bandwidth: ICMP flood, UDP flood, SYN flood… Amplification: NTP, DNS, SNMP, SSDP, ICMP, NetBIOS, RIPv1, PORTMAP, CHARGEN, QOTD...
  8. qrator.net 2016 Distributed Denial-of-Service attack • An attempt to make

    a network resource unavailable by exhausting its resources: • Bandwidth: ICMP flood, UDP flood, SYN flood… Amplification: NTP, DNS, SNMP, SSDP, ICMP, NetBIOS, RIPv1, PORTMAP, CHARGEN, QOTD... • TCP finite state machine implementation attacks
  9. qrator.net 2016 Distributed Denial-of-Service attack • An attempt to make

    a network resource unavailable by exhausting its resources: • Bandwidth: ICMP flood, UDP flood, SYN flood… Amplification: NTP, DNS, SNMP, SSDP, ICMP, NetBIOS, RIPv1, PORTMAP, CHARGEN, QOTD... • TCP finite state machine implementation attacks: SYN flood, ACK flood, TCP connection flood…
  10. qrator.net 2016 Distributed Denial-of-Service attack • An attempt to make

    a network resource unavailable by exhausting its resources: • Bandwidth: ICMP flood, UDP flood, SYN flood… Amplification: NTP, DNS, SNMP, SSDP, ICMP, NetBIOS, RIPv1, PORTMAP, CHARGEN, QOTD... • TCP finite state machine implementation attacks: SYN flood, ACK flood, TCP connection flood…
  11. qrator.net 2016 Distributed Denial-of-Service attack • An attempt to make

    a network resource unavailable by exhausting its resources: • Bandwidth: ICMP flood, UDP flood, SYN flood… Amplification: NTP, DNS, SNMP, SSDP, ICMP, NetBIOS, RIPv1, PORTMAP, CHARGEN, QOTD... • TCP finite state machine implementation attacks: SYN flood, ACK flood, TCP connection flood… • Application-specific bottlenecks (HTTP server, DBMS, caches, etc)
  12. qrator.net 2016 Packet vs Request • 3-way handshake => SYN

    cookies => IP Authentication • IP Authentication not available in most* UDP-based protocols => Spoofing => UDP Amplification!
  13. qrator.net 2016 Packet vs Request • 3-way handshake => SYN

    cookies => IP Authentication • IP Authentication not available in most* UDP-based protocols => Spoofing => UDP Amplification! • Amp-vulnerable server may be identified by source port => Flow Spec solves problems!
  14. qrator.net 2016 Packet vs Request • 3-way handshake => SYN

    cookies => IP Authentication • IP Authentication not available in most* UDP-based protocols => Spoofing => UDP Amplification! • Amp-vulnerable server may be identified by source port => Flow Spec solves problems!
  15. qrator.net 2016 Packet vs Request • 3-way handshake => SYN

    cookies => IP Authentication • IP Authentication not available in most* UDP-based protocols => Spoofing => UDP Amplification! • Amp-vulnerable server may be identified by source port => Flow Spec solves problems!
  16. qrator.net 2016 Packet vs Request • 3-way handshake => SYN

    cookies => IP Authentication • IP Authentication not available in most* UDP-based protocols => Spoofing => UDP Amplification! • Amp-vulnerable server may be identified by source port => Flow Spec solves problems!
  17. qrator.net 2016 Wordpress Pingback GET /whatever User-Agent: WordPress/3.9.2; http://example.com/; verifying

    pingback from 192.0.2.150 • 150-170 vulnerable servers at once • SSL/TLS-enabled
  18. qrator.net 2016 Packet vs Request • 3-way handshake => SYN

    cookies => IP Authentication • IP Authentication not available in most* UDP-based protocols => Spoofing => UDP Amplification! • Amp-vulnerable server may be identified by source port => Flow Spec solves problems!
  19. qrator.net 2016 Packet vs Request • 3-way handshake => SYN

    cookies => IP Authentication • IP Authentication not available in most* UDP-based protocols => Spoofing => UDP Amplification! • Amp-vulnerable server may be identified by source port => Flow Spec solves problems!
  20. qrator.net 2016 The Void • To survive TCP- and HTTPS-based

    attacks, one needs a session-capable and TLS-capable DPI • To survive large botnets, one needs a behavioral analysis and correlation analysis built into that DPI • That’s extremely expensive for a large network
  21. qrator.net 2016 The Void • Any service offering SLA must

    do all of this • A service lacking any of those features is best effort • No one likes best effort services
  22. qrator.net 2016 The Cure • BCP 38 is no cure*

    • IPv6 is no cure • Time to fight for yourselves • Care about other customers • It’s every man for himself now