Ddos Attacks: A Growing Threat
Ddos Attacks: A Growing Threat
Today, malevolent actors are enlisting the help of compromised computers to form
“botnets” capable of launching major attacks against unsuspecting victims.
Estimates suggest that anywhere between 4 and 6 million computers are actively
used in botnets at any time. These botnets harness the processing power and
bandwidth of thousands of compromised computers to bring down the largest and
most sophisticated networks. Some reports estimate that more than 10,000 attacks
occur each day with many ISPs reporting attacks in excess of 10Gbps.
A zombie is a computer that has been silently infected with a virus, giving
unauthorized or remote users the ability to control it. Once a computer has been
turned into a zombie, hackers use it to commit a wide range of crimes by linking
with a network of thousands of other infected computers. Networks of zombie
computers are used by hackers to send spam, viruses, phishing emails and
pornography from within unwitting organizations. Sophos estimates that over 60%
of all spam originates from hijacked computers. Zombies have been found in
organizations of all kinds, from financial planning companies to universities and
nursing homes. They cause business disruption, network damage, information theft
and harm to an organization’s reputation.
Can I setup my inline IPS or my IDS to thwart a DDoS attack?
Yes, but IPSs and IDSs require extensive manual tuning that takes time and can
leave you vulnerable. An IDS traditionally sits behind the firewall with an uplink
to a router or switch that sits in front of the firewall. An IDS issues an alert when it
detects an anomaly. At that point, the attack traffic is already consuming your
internet bandwidth with the potential of saturating the link, which can cause the
CPU to spike and deplete memory resources. An IPS has the capability to work as
an anomaly detector; however, it requires several weeks for an IPS to understand
“normal” traffic patterns and frequent manual tuning to specify which traffic is
allowed and which should be alerted or blocked.
Individually, each compromised device, or “bot,” can send small volumes of traffi
c that may do little harm. Collectively though, the network of compromised
devices are capable of launching devastating DDoS attacks. Malicious actors have
automated the “harvesting” process in order to compromise vast numbers of
systems in a relatively short period of time. The largest botnets are amassed via
Internet worms which compromise the victim computer and then use it as a
launching pad to immediately compromise other computers. The ‘Kraken’ botnet,
which reportedly overtook ‘Storm’ as the largest botnet on the Internet, is
suspected to have 400,000 active bots, according to researchers at security fi rm
Damballa (Higgins, 2008). Botnets and DDoS The connection between botnets and
DDoS attacks is so intertwined it is diffi cult to separate the two. According to a
recent Yankee Group study of Tier 1 ISPs (Partridge, 2007), DDoS attacks ranked
fi rst on a list of security threats, with botnets a close second. Malicious actors
continue to leverage botnet technology to enhance the effectiveness of DDoS
attacks. Over time, attack profi les have changed enabling the mastermind to
distance himself or herself from the actual attack. The fi rst phase of this evolution
was the shift from standard DoS to DDoS attacks. Attackers soon realized that they
could further separate themselves from the attack by introducing server bots for
command and control purposes. By communicating with a few command and
control server bots, attackers could manage hundreds and even thousands of client
bots. Recently, malicious actors complicated the attack by introducing new layers
to the architecture. Distributed Reflector Denial-of-Service Attacks (DRDoS) take
advantage of uncompromised devices that unwittingly participate in the attack.
Typically seen through use of DNS servers that act as the refl ector, the design of
the attack sends several times more traffi c to the victim than what was sent to it. A
case study in section 2.4 discusses the DRDoS attack in more detail.
Glossary
Bot/Zombie: a computer compromised with the intention of using it to
commit cyber-crimes.
Botnet: a collection of compromised, networked computers used to commit
cyber-crime.
Botmaster: A cyber-criminal that uses botnets to commit his crimes.
DoS Attack: Denial of Service Attack – a criminal attack where the goal is to
prevent a computing resource from being used.
DDoS Attack: Distributed Denial of Service Attack – A DoS attack where the
source attacker is not one computer or device, but several of them, typically
located in disparate locations.
DRDoS Attack: Distributed Refl ector Denial of Service Attack – A DDoS attack
that is “amplifi ed” by a refl ector. A refl ector is typically an uncompromised
device that unwittingly participates in a DDoS attack. Due to the design of the
attack, it sends several times more traffi c to the victim than what was sent to it.
INTRODUCTION
IP Spoofing has often been exploited by DDoS attacks to conceal flooding sources
and dilute localities in flooding traffic and coax legitimate hosts into reflectors,
redirecting and amplifying flooding traffic (Wang et al., 2007). IP Spoofing is also
known as IP address forgery and is a hijacking technique in which the hacker
masquerades as a trusted one to get the access to a network. Spoofing is a process
whereby one entity masquerades as another.
IP Networks are vulnerable to source address into packet headers. DDoS block
legitimate access by either exhausting victim server’s resources or saturating stub
networks access links to the Internet. By masquerading as a different host an
attacker can hide its actual identity and location, rendering source-based packet
filtering less effective. Many popular attacks use IP Spoofing and require the
ability to forge source addresses. DDoS attacking tools spoof IP addresses by
randomizing the 32-bit source address field in the IP header Dietrich (2000) which
conceals attacking sources and dilutes localities in attaching traffic. IP Spoofing
remain popular for number of reasons like as it makes isolating attack traffic from
legitimate traffic header: packets with spoofed source address may appear to be
from all around the Internet and also it presents the attacker with an easy way to
insert a level of indirection (Duan et al., 2008).
While DdoS attack the attacker increases the amount of illegitimate traffic
originating from the systems under the users control (Snyder et al., 2007). This
results in a positive increase by some ratioα where 0≤α≤1 relative to the traffic that
was present in the system to begin with The attacker is analyzed into four kinds as
follows:
Random: Ratio of attack traffic for each division of the attack dimension is a
randomly chosen normalized distribution.
Base: Attack traffic is spread so that it matches the distribution for divisions in the
base traffic distribution for the attack dimension.
Uniform: Attack traffic is spread evently amongst the divisions in the attack
dimensions.
Loaded: Attacker directs all of the attack traffic at initial division of the attack
dimension.
In order to analyze all possible moves for attacker and defender a sensitivity matrix
was generated in all the four kinds of attacker.
DDoS attack presents a very serious threat to the stability on the Internet. In this, a
large number of hosts are amassed to send useless packets to jam a victim or its
Internet connections (Song and Manjkopoulos, 2006). There are two reasons that
are why defending against DDoS attacks is challenging. First, very large number of
attackers is involved in DdoS attack. Even if the volume of traffic sent by a single
attacker might be small, the volume of aggregated traffic arriving at the victim host
is overwhelming. Secondly, it is very difficult to trace the attack traffic back to its
sources, since attackers usually spoof their IP address (Chen et al., 2007).
DDoS attacks can be considered into two distinct approaches named router-based
approach and host-based approach. In case of router-based approach the required
defense mechanisms are installed inside the IP routers. This is used to trace the
source of attack or to detect and block the attacking traffic.
Rather than router support but also coordinates different routers and networks
which results in wide spread deployment. In host-based approach an Internet server
is used as resource management schemes or by significantly reducing the resource
consumption to withstand the flooding traffic.
DDoS attack can be categorized into four classes named prevention, detection,
mitigation and response. Among this mitigation techniques can be categorized into
two. First is a resource allocation problem which employ techniques such as client
puzzles, max-min server centric router throttles or differentiated service to allocate
network or server resources to clients in a fair fashion thus preventing attackers
from consuming an excessive amount of network resources. Secondly attacks by
filtering or rate-limiting attack packets that consist of two modules named an
attack detection module and a packet filtering module.
The attack detection module is used to extract the characteristics of attack packets
or attack signatures such as source IP address or marked IP header values. After
that this information is used by the packet filtering module to filter malicious
packets. The attack detection module is placed near the victim and packet filtering
module is placed as close to the attack as possible (Chang, 2002).
Instead of subverting services, DDoS attacks limits and block legitimate user’s
access by exhausting victim server’s resources or saturating stub networks access
links to the Internet (Venkatesu et al., 2008) Attackers often spoof IP addresses by
randomizing the 32 bit source address field in the IP header to conceal flooding
sources and localities in flooding traffic.
Each spoofed packet with the victims IP address is masquerade with the source IP
address to network attacks. Because of the stateless and destination based routing
of the Internet, it is difficult to counter IP Spoofing. The IP Protocol lacks the
control to prevent a sender from hiding the origin of its packets and destination
based routing does not maintain state information on senders and forwards each IP
packet toward its destination without validating the origin of the packet.
CONTROL MECHANISM
The off-line IP trace back attempts to establish procedures to track down flooding
sources but help pinpoint locations of flooding sources. It also does not keep
sustain service availability during an attack (Savage et al., 2000). To detect
abnormal traffic patterns and foil DDoS attacks on-line filtering mechanisms rely
on IP router enhancements. For efficient prevention coordination among different
routers network and its wide spread deployment other than router support is
needed.
So victim-based filtering that detects and discards spoofed traffic without any
router support is essential to protecting against DDoS attacks. Due to resource
depletion caused by spoofed IP packets the victim-based approach is unlikely to be
able to sustain service availability under intense attacks. Moreover this mechanism
cannot prevent the victim server from consuming CPU resource in servicing
interrupts from spoofed IP traffic as this mechanism work at the transport-layer.
CONCLUSION
Despite the fact that Spoofing based attacks have severe consequences and are
wide-spread much of the present day Internet. To trace back the origin of an
Internet attack, strategic importance is given to cyber space security.
From the survey it is analyzed that each method has certain features that make it
more suitable to implement in one situation than another. The routing instability in
the Internet due to the IP Spoofing is depicted in this study and a survey of
possible attacks and controlling mechanism available are made.
RECOMMENDATION
By introducing a filter function on the forwarding path of the packets, the cost can
be analyzed. Also research can be done on the AS relationship and routing
information which improves the performance of the IP Spoofing. For Internet
security it is essential to trace back to the original source of the attacks. IP
Spoofing makes it difficult for the victim to determine the IP packets origin. As a
result, there is a need for a mechanism that could rapidly trace back to the origin of
attacks for the victim. Trace back can be performed by Intelligent Techniques to
get better performance.
The primary function of a EBGP is to exchange network reachability information between autonomous
systems, including information about the list of autonomous system routes. The autonomous systems
use EGBP border edge routers to distribute the routes, which include label switching information. Each
border edge router rewrites the next-hop and MPLS labels.
IP traceback is a name given to any method for reliably determining the origin of a packet on
the Internet. Due to the trusting nature of the IPprotocol, the source IP address of a packet is
not authenticated. As a result, the source address in an IP packet can be falsified (IP address
spoofing) allowing for Denial Of Service attacks (DoS) or one-way attacks (where the response
from the victim host is so well known that return packets need not be received to continue the
attack[clarification needed]). The problem of finding the source of a packet is called the IP traceback
problem. IP Traceback is a critical ability for identifying sources of attacks and instituting
protection measures for the Internet. Most existing approaches to this problem have been
tailored toward DoS attack detection. Such solutions require high numbers of packets to
converge on the attack path(s).
In this type of solution, an observer tracks an existing attack flow by examining incoming
and outgoing ports on routers starting from the host under attack. Thus, such a solution
requires having privileged access to routers along the attack path.
To bypass this restriction and automate this process, Stone proposes routing suspicious
packets on an overlay network using ISP edge routers. By simplifying the topology,
suspicious packets can easily be re-routed to a specialized network for further analysis.
This is an interesting approach. By nature of DoS, any such attack will be sufficiently
long lived for tracking in such a fashion to be possible. Layer-three topology changes,
while hard to mask to a determined attacker, have the possibility of alleviating the DoS
until the routing change is discovered and subsequently adapted to. Once the attacker
has adapted, the re-routing scheme can once again adapt and re-route; causing an
oscillation in the DoS attack; granting some ability to absorb the impact of such an
attack.
Router based approach
With router based approaches, the router is charged with maintaining information
regarding packets that pass through it. For example, Sager proposes to log packets and
then data mine them later. This has the benefit of being out of band and thus not
hindering the fast path.[citation needed]
Snoeren et al. propose marking within the router. The idea proposed in their paper is to
generate a fingerprint of the packet, based upon the invariant portions of the packet
(source, destination, etc.) and the first 8 bytes of payload (which is unique enough to
have a low probability of collision). More specifically, m independent simple hash
functions each generate an output in the range of 2n-1. A bit is then set at the index
generated to create a fingerprint when combined with the output of all other hash
functions. All fingerprints are stored in a 2n bit table for later retrieval. The paper shows
a simple family of hash functions suitable for this purpose and present a hardware
implementation of it.[7]
The space needed at each router is limited and controllable (2n bits). A small n makes
the probability of collision of packet hashes (and false identification) higher. When a
packet is to be traced back, it is forwarded to originating routers where fingerprint
matches are checked. As time passes, the fingerprint information is “clobbered” by
hashes generated by other packets. Thus, the selectivity of this approach degrades with
the time that has passed between the passage of the packet and the traceback
interrogation.[7]
Another known take on the router-based schemes comes from Hazeyama et al. In their
approach, they wish to integrate the SPIE approach as outlined by Snoeren[7], with their
approach of recording the layer 2 link-id along with the network ID (VLAN or true ID),
the MAC address of the layer 2 switch that received the packet and the link id it came in
on. This information is then put into two look-up tables – both containing the switch
(layer 2 router) MAC id for look-up. They rely on the MAC:port tuple as a method of
tracing a packet back (even if the MAC address has been spoofed).[8]
To help mitigate the problem of storage limitations they use Snoeren’s hashing
approach and implementation (SPIE) – modifying it to accept their information for
hashing. They admit their algorithm is slow (O(N2)) and with only 3.3 million packet
hashes being stored the approximate time before the digest tables are invalid is 1
minute. This dictates that any attack response must be real-time – a possibility only on
single-administrative LAN domains.[8]
Other approaches
Burch and Cheswick propose a controlled flooding of links to determine how this
flooding affects the attack stream. Flooding a link will cause all packets, including
packets from the attacker, to be dropped with the same probability. We can conclude
from this that if a given link were flooded, and packets from the attacker slowed, then
this link must be part of the attack path. Then recursively upstream routers are
“coerced” into performing this test until the attack path is discovered.[9]
Park and Lee present an extension of Ingress Filtering at layer 3. They present a means
of detecting false packets, at least to the subnet, by essentially making use of existing
OSPF routing state to have routers make intelligent decisions about whether or not a
packet should be routed.[citation needed]
Applications of IP Spoofing
IP spoofing can also be a method of attack used by network intruders to defeat network
security measures, such as authentication based on IP addresses. This method of
attack on a remote system can be extremely difficult, as it involves modifying thousands
of packets at a time. This type of attack is most effective where trust relationships exist
between machines. For example, it is common on some corporate networks to have
internal systems trust each other, so that users can log in without a username or
password provided they are connecting from another machine on the internal network
(and so must already be logged in). By spoofing a connection from a trusted machine,
an attacker may be able to access the target machine without an authentication.
RIP cannot handle more than 15 hops. Anything more than 15 hops away is considered
unreachable by RIP. This fact is used by RIP to prevent routing loops.
IP Address
zeroes
zeroes
Metric
Payload...
Hold-
90 sec. Period a route is withdrawn from the table to prevent a routing loop.
Down
Interval a route should stay 'live' in the routing table. This counter is reset every
Timeout 180 sec.
time the router hears an update for this route.
Flush 120 sec. How long to wait to delete a route after it has timed out.
Password:
router# conf t
router(config)#interface ethernet 0
router(config-if)# exit
router(config-router)# exit
router(config-router)# ^z
router#
The example above assumes that the interfaces that will be running RIP
have IP addresses on them that fall within the 204.191.42.0, and 204.191.43.0 class C
ranges.
How switches and routers interconnect using equipment from multiple vendors
IP addressing and how to create subnets
How TCP/IP works and how to configure it on various devices
Capture and view network traffic using a protocol analyzer
Wireless network options available
Basic security and firewall issues
How Ethernet works and how all of the various forms can be connected
Basics of layered network protocols
Difference between logical and physical network segments
Install Cat 5e UTP and fiber optic cables
How VLANs function
When and how to use NAT
Function of various routing protocols such as RIP, IGRP, and OSPF
An overview of WAN technologies
Functions of NetBIOS and NetBEUI
Benefits and issues of Instant Messaging
How switches and routers interconnect using equipment from multiple vendors
IP addressing and how to create subnets
How TCP/IP works and how to configure it on various devices
Capture and view network traffic using a protocol analyzer
Wireless network options available
Basic security and firewall issues
How Ethernet works and how all of the various forms can be connected
Basics of layered network protocols
Difference between logical and physical network segments
Install Cat 5e UTP and fiber optic cables
How VLANs function
When and how to use NAT
Function of various routing protocols such as RIP, IGRP, and OSPF
An overview of WAN technologies
Functions of NetBIOS and NetBEUI
Benefits and issues of Instant Messaging
Basic components and characteristics of a network
Host-to-network and network-to-network connections
LAN wiring components and conventions
Differentiate between wired networking devices
How to configure your workstation, switch, and router
TCP/IP communications protocols basics
Practical overview of IP subnetting and how it works
Wireless networking components
Common security threats and mitigation techniques
Securing systems and network devices
Controlling access to the network
Monitoring network resources
Troubleshooting the network
Operations Security
Access Control
Cryptography
Security Architecture and Design
Telecommunications and Network Security
Disaster Recovery and Business Continuity Planning
Legal, Regulations, Compliance, and Investigations
Application Security
Information Security and Risk Management
Physical (Environmental) Security
Develop a comprehensive network security policy to counter threats against
information security
Configure routers with Cisco IOS Software security features
Configure a Cisco IOS zone-based firewall to perform basic security operations on
a network
Configure site-to-site VPNs using Cisco IOS features
Configure IPS on Cisco network routers
Configure security features on IOS switches to mitigate various Layer 2 attacks
Review how to configure and troubleshoot a switch and router in a small network
environment
Expand the switched network from a small to medium network environment
Dangers of redundant switching
Spanning Tree
Concepts of VLANs and trunking
Implementing VLSM
Configure, verify, and troubleshoot OSPF and EIGRP
When to use access control lists (ACLs)
Configure, verify, and troubleshoot ACLs
Configure NAT and PAT
IPv6 addressing
Configure PPP, CHAP, and PAP
Frame Relay operation
VPN solutions
How networks function
Network components and their functions
Open Systems Interconnection (OSI) reference model
Binary, decimal, and hexadecimal numbering
Switching operations and theory
Host-to-Host packet delivery process
TCP/IP network addressing and routing
IP subnetting
Providing Local Area Network (LAN), Wide Area Network (WAN), and remote
access services
Advanced network theory, including Virtual Private Networks (VPN), Content
Delivery Networks (CDN), Intranets and extranets, and wireless networking
Introduction to Cisco Internet Operating System (IOS)
Initial configuration of Cisco Catalyst Switches and Routers
Network discovery and management using Cisco Discovery Protocol (CDP),
telnet, and Trivial FTP (TFTP)
http://ibmtvdemo.edgesuite.net/software/rational/demos/hacking101/webcast.wmv