0% found this document useful (0 votes)
69 views10 pages

Botnet-Based Distributed Denial of Service (DDoS) Attacks On Web Servers Classification and Arts

This document discusses botnet-based distributed denial of service (DDoS) attacks on web servers. It notes that DDoS attacks have increased in recent years, with HTTP-based attacks being the most common type. Botnets are networks of compromised computers that are controlled remotely and used to launch powerful DDoS attacks. These attacks overwhelm servers with traffic to degrade or interrupt service. The document provides background on botnets and how they are used to carry out DDoS attacks, as well as classification of different attack types and examples of attacks on major companies and government websites.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views10 pages

Botnet-Based Distributed Denial of Service (DDoS) Attacks On Web Servers Classification and Arts

This document discusses botnet-based distributed denial of service (DDoS) attacks on web servers. It notes that DDoS attacks have increased in recent years, with HTTP-based attacks being the most common type. Botnets are networks of compromised computers that are controlled remotely and used to launch powerful DDoS attacks. These attacks overwhelm servers with traffic to degrade or interrupt service. The document provides background on botnets and how they are used to carry out DDoS attacks, as well as classification of different attack types and examples of attacks on major companies and government websites.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/230610009

Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers:


Classification and Art

Article in International Journal of Computer Applications · August 2012


DOI: 10.5120/7640-0724 · Source: arXiv

CITATIONS READS

177 5,314

5 authors, including:

Esraa Alomari Selvakumar Manickam


Wasit University Universiti Sains Malaysia
21 PUBLICATIONS 433 CITATIONS 311 PUBLICATIONS 2,436 CITATIONS

SEE PROFILE SEE PROFILE

Shankar Karuppayah
Universiti Sains Malaysia
68 PUBLICATIONS 972 CITATIONS

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Cybersecurity and Botnets View project

EAI FABULOUS 2022 - 6th EAI International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures View project

All content following this page was uploaded by Esraa Alomari on 01 June 2014.

The user has requested enhancement of the downloaded file.


International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012

Botnet-based Distributed Denial of Service (DDoS)


Attacks on Web Servers: Classification and Art
1 3,4 5
Esraa Alomari, B. B. Gupta Shankar Karuppayah,
2 6
Selvakumar Manickam 3
University of New Brunswick, Rafeef Alfaris
1,2 Canada 5,6
National Advanced IPv6 National Advanced IPv6
Centre (NAV6), Universiti Sains 4 Centre (NAV6), Universiti Sains
RSCOE, University of Pune,
Malaysia, Malaysia India Malaysia, Malaysia

ABSTRACT A DDoS attack is exemplified by the direct attempt of


Botnets are prevailing mechanisms for the facilitation of the attackers to prevent legitimate users from using a specific
distributed denial of service (DDoS) attacks on computer service [4]. A recent, sophisticated, and popular method of
networks or applications. Currently, Botnet-based DDoS DDoS attack involves application level flooding, especially in
attacks on the application layer are latest and most the Web server. Such attacks employ various flooding
problematic trends in network security threats. Botnet-based methodologies (e.g., HTTP-GET flood, etc). Figure 1 shows
DDoS attacks on the application layer limits resources, the types of DDoS attacks on the application layer in 2010
curtails revenue, and yields customer dissatisfaction, among and 2011, as reported by the Arbor Inc. [5]. From the figure,
others. DDoS attacks are among the most difficult problems to we can see that HTTP attacks rank first in terms of number of
resolve online, especially, when the target is the Web server. incidents. HTTPs registered the highest incidence of DDoS
In this paper, we present a comprehensive study to show the attacks in 2010, reaching up to 100 Gbps in 2011. This
danger of Botnet-based DDoS attacks on application layer, increase accounts for a 700% rise in incidents, as reported by
especially on the Web server and the increased incidents of the Cloud Flare Company [6], where the HTTP attacks
such attacks that has evidently increased recently. Botnet- comprise approximately 80% in 2010, a value that
based DDoS attacks incidents and revenue losses of famous significantly increased to approximately 88% in 2011. The
companies and government websites are also described. This number of daily target Web sites evidently increased, with
provides better understanding of the problem, current solution government websites becoming a common target [5].
space, and future research scope to defend against such The remainder of the paper is organized as follows. Section 2
attacks efficiently. contains overview of the Botnet based DDoS attacks. Section
3 presents Botnet based DDoS Attack Architecture. Botnet
General Terms based DDoS attack tools are described in section 4. Section 5
Information security, Computer network. describes classification of Botnet based DDoS attacks in
details. Section 6 contains various Botnet based DDoS attack
Keywords incidents. Finally, Section 7 concludes the paper and presents
Information security, Botnet, DDoS attacks, IRC, Web server. further research scope.
1. INTRODUCTION 2. BOTNETS BASED DDOS ATTACKS
The rapid development of the Internet over the past decade This section provides a background on Botnets and how they
appeared to have facilitated an increase in the incidents of facilitate DDoS attacks that hamper the Web server. Botnets
online attacks [1]. One such powerful and harmful attack is compromise a network of machines with programs (usually
the denial of service (DoS) attack. A DoS attack significantly referred to as a bot, zombie, or drone) and implement under a
threatens the network, especially if such an attack is command and control (C&C) management infrastructure. The
distributed. A distributed DoS (DDoS) attack is launched by a management of Botnets typically affects a series of systems
mechanism called Botnet through a network of controlled through numerous tools and through the installation of a bot
computers. A software program controls the computers and that can remotely control the victim using Internet relay chat
for specific purposes, known as ―bots.‖ Bots are small scripts (IRC) [7]. Present Botnets are most frequently used to spread
that have been designed to perform specific, automated DDoS attacks on the Web. Moreover, the attackers can
functions. Bots are utilized by agents for Web indexing or change their communication approach during the creation of
―spidering,‖ as well as to collect online product prices or to the bots. Majority of bots varied its potentials to participate in
performing such duties as chatting. However, bots are such attacks. The most typical and commonly implemented
negatively associated with ―remote access Trojan Horses‖ Botnet attack on application layer is the HTTP/S flooding
(e.g., Zeus bot) and zombie computers that are created for less attack, which launches bots created by the HTTP server. Such
favorable purposes [2]. Bots in large quantities provide the bots are thus called ―Web-based‖ bots [8].
power of a computer to create prime tools for such activities
as the widespread delivery of SPAM email, click-fraud, The goal of a Botnet based DDoS attack is to entail damage at
spyware installation, virus and worm dissemination, and the victim side. In general, the ulterior motive behind this
DDoS attacks (e.g., black energy bot) [3]. DDoS attacks attack is personal which means block the available resources
usually take advantage of the weaknesses of a network layer, or degrade the performance of the service which is required
particularly, SYN, UDP, and Internet control message by the target machine. Therefore, DDoS attack is committed
protocol (ICMP) flooding. Such attacks encroach the network for the revenge purpose. Another aim to perform these attacks
bandwidth and resources of the victim, thus facilitating the can be to gain popularity in the hacker community. In addition
denial of legitimate access. to this, these attacks can also perform for the material gain,
which means to break the confidentiality and use data for their
use.

24
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012

hinders the tracking DDoS command packets. Additionally,


IRC servers tend to have large volumes of traffic, enabling an
attacker to conceal its presence easily. The attacker does not
necessarily maintain a list of the agents because it can
immediately enter the IRC server and view all available
agents [10]. The agent software in the IRC network sends and
receives messages through the IRC channel and informs the
attacker when an agent becomes operational.

Fig. 1: Types of DDoS attacks on the application layer

3. BOTNET BASWD DDOS ATTACK


ARCHITECTURE
Botnet based DDoS attack networks fall under three
categories, namely, the agent-handler, IRC-based, and Web-
based models.

Fig. 3: Internet Relay Chat (IRC) Model

3.3 Web-based Model


Although the most preferred method for Botnet command and
control (C&C) is the IRC-based model, Web-based reporting
and command has emerged over the past few years. A number
of bots in the Web-based model simply report statistics to a
Web site, whereas others are intended to be fully configured
Fig. 2: Agent–Handler Model and controlled through complex PHP scripts and encrypted
communications over the 80/443 port and the HTTP/HTTPS
3.1 Agent-Handler Model protocol. The following are the advantages of Web-based
The agent-handler model of a DDoS attack comprises clients, controls over IRC [11]:
handlers, and agents as shown in Figure 2. The client is one
with whom the attacker communicates in the DDoS attack  Ease of set-up and website configuration;
system. The handlers are software packages located
throughout the Internet. The client uses these packages to  Improved reporting and command functions;
communicate with the agents. The agent software thrives in  Less bandwidth requirement and the acceptance of large
compromised systems, eventually conducting the attack at the Botnets for the distributed load;
appropriate time.
 Concealment of traffic and hindrance of filtering through
The attacker communicates with any of the handlers to the use of port 80/443;
identify operational agents and to determine when to attack or
to upgrade agents. Owners and users of agent systems are  Resistance to Botnet hijacking via chat-room hijacking;
typically unaware that their system has been compromised and
and is under a DDoS attack. Depending on the configuration
 Ease of use and of acquisition.
of the DDoS attack network, agents can be instructed to
communicate with one handler or with multiple handlers.
Attackers often attempt to install the handler software on a
compromised router or network server. The target typically
handles large volumes of traffic, making message
identification difficult between the client and the handler and
between the handler and the agents. The terms ―handler‖ and
―agents‖ are sometimes replaced with ―master‖ and
―demons,‖ respectively, in descriptions of DDoS tools [9].

3.2 Internet Relay Chat (IRC) Model


The architectures of the IRC-based DDoS attack as shown in
Figure 3 and of the agent–handler model are almost similar.
However, instead of employing a handler program that is
installed on a network server, the client is connected to the
agents through an IRC communication channel. An IRC
channel benefits an attacker with the use of ―legitimate‖ IRC
ports to send commands to agents. The use of legitimate ports

25
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012

4. BOTNETS BASED DDOS ATTACK Unlike currently popular attack tools that can launch DDoS
attacks, most organizations are unaware of the broad
TOOLS development over the last few years and are vulnerable to
Various DDoS attack tools are known and architectures are attackers, according to the Arbor Networks. Commercial
very similar that some tools actually originate from minor services, along with downloadable tools, can launch attacks
modifications of other tools [12]. In this section, the for a fee [5]. Therefore, we discuss the bot tools that launch
functionality of a number of these tools is discussed. The DDoS attacks on the application layer. Approximately 20,000
Botnet based DDoS attack tools are classified as agent-based, infected computers with multiple targets can destroy over
IRC-based, or Web-based DDoS attack tools. 90% of Internet sites [21]. A DDoS attack on the application
layer is highly comparable to calling someone in the world
4.1 Agent-based DDoS Attack Tools from one Website, while the Web site indicates being out of
Agent-based DDoS attack tools are based on the agent– service or displays ―the page cannot found.‖ Therefore, the
handler DDoS attack model comprising handlers, agents, and server hosting the site cannot process all requests on the same
victims, as described in Section 3.1. Examples of agent-based site, in contrast to the compromising handler that injects the
DDoS tools are Trinoo, Tribe Flood Network (TFN), TFN2K, site with bots controlled by attackers. The attacker
Stacheldraht, Mstream, and Shaft [13]. Among the consequently demonstrates the use of different tools to
abovementioned agent-based DDoS tools, Trinoo [14] is the execute a successful attack. In the following sections, three
most popular and the most widely used for its capability for Web-based DDoS attack tools are described.
bandwidth depletion and for launching UDP flood attacks
against one or numerous Internet protocol (IP) addresses.
Shaft [15], on the other hand, is similar to Trinoo in that it can
4.3.1 BlackEnergy
launch packet flooding attacks. Shaft can also control the BlackEnergy [60] is a Web-based DDoS bot used by
duration of the attack, as well as the size of the flooding unidentified Russian hackers. BlackEnergy easily controls
packets. Web-based bots through minimal syntax and structure,
resulting in the launch of various attacks. One or more
TFN [16] is another DDoS attack tool that can conduct Russian hackers had apparently developed this tool.
bandwidth and resource depletion attacks. TFN can perform Meanwhile, most BlackEnergy C&C systems are seen in
Smurf, UDP flooding, TCP SYN flooding, ICMP echo Malaysia and in Russia, with Russian sites being the primary
request flooding, and ICMP directed broadcast. TFN2K [15], targets. One of the main features that BlackEnergy bot
as a derivative of TFN, can perform Smurf, SYN, UDP, and promote in forums is the capability to target more than one IP
ICMP flood attacks. TFN2K has the special capability of address per host name. This tool continues to be widely used
adding encrypted messages between attack components. to deny services from commercial Web sites.
Stacheldraht [17] is a product of previous TFN attempts.
Stacheldraht strengthens a number of TFN‘s weak points and 4.3.2 Low-Orbit Ion Cannon (LOIC)
is capable of implementing Smurf, SYN flood, UDP flood, The LOIC is a Botnet-based DDoS attack tool that releases
and ICMP flood attacks. On the other hand, Mstream [18] is a flooding in the server. This flooding apparently results from
simple point-to-point TCP ACK flooding tool that can the large volume of HTTP traffic. However, this tool has been
overwhelm fast-routing routine tables in some switches. used recently by an anonymous group to facilitate malicious
traffic through the Zeus Botnet, which is an advanced
4.2 IRC-based DDoS Attack Tools malware program that cannot be easily removed. The hacker
group administered the largest attack in 2012 against famous
IRC-based DDoS attack tools were developed after the
Web sites, such as the Department of Justice (DOJ) and the
emergence of agent–handler attack tools. More sophisticated
Federal Bureau of investigation (FBI) [22].
IRC-based tools have been developed, and these tools include
the important features of several agent-handler attack tools.
The Trinity is one of the best-known IRC-based DDoS tools 4.3.3 Aldi Botnet
on top of UDP, TCP SYN, TCP ACK, and TCP NUL packet Aldi is a newer inexpensive DDoS bot that is growing in
floods. The Trinity v3 [19] introduces TCP random flag popularity. Recent data [59] suggests that there are at least 50
packet floods, TCP fragment floods, TCP established floods, distinct Aldi bot binaries that have been seen in the wild with
and TCP RST packet floods. Along with the development of 44 unique Command & Control (C&C) points. As per Arbor
the Trinity came the myServer [15], that rely on external company which monitors real time Internet traffic, this bot is
programs to conduct DoS and plague to simulate TCP ACK active in Russia, Ukraine, US and Germany.
and TCP SYN flooding. Knight [20] is another light-weight
and powerful IRC-based DDoS attack tool that can perform 5. CLASSIFICATION OF BOTNETS
UDP flood attacks and SYN attacks. Knight can be considered BASED DDOS ATTACKS
an urgent pointer flooder [9]. An IRC-based DDoS tool based The wide variety of DDoS attacks indicates the various
on Knight is Kaiten [20], which conducts UDP, TCP flood conducted taxonomies of such attacks [9, 23-27]. New kinds
attacks, SYN, and PUSH+ACH attacks. of attacks are identified daily, and some remain undiscovered.
In this work, we focus on Botnet based DDoS attacks that
4.3 Web-based DDoS Attack Tools affect the application layer, especially the Web server [28].
Web-based DDoS attack tools were recently developed with The type of DDoS attack depends on the vulnerability of
the purpose of attacking the application layer, especially the exploitation. The first type of attack is characterized by the
Web server. IRC-based DDoS attack tools with the HTTP/S consumption of the resources of the host. The victim can
flooding function are used to attack a Web server, thus generally be a Web server or a proxy connected to the
proving that attackers are increasingly adopting various tools Internet. When the traffic load is high, packets are sent out to
to introduce DDoS attacks [5]. inform senders, who can either be legitimate users or attack
sources, to reduce their sending rates. Legitimate users
respond by decreasing their sending rates, whereas attack

26
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012

sources maintain or even increase their sending rates. download a large file from the target. The file is then read by
Consequently, resources of the host, such as the CPU or the target from the hard disk, stored in the memory, and
memory capacity, become depleted, and the host is hindered finally loaded into the packets, which are sent back to the
from servicing legitimate traffic. The second type of attack Botnet. Hence, a simple HTTP request can significantly
involves the consumption of network bandwidth. If malicious consume resources in the CPU, memory, input/output devices,
traffic in the network dominates the communication links, and outbound Internet link.
traffic from legitimate sources is obstructed. In effect,
bandwidth DDoS attacks are more disruptive than attacks However, the behavior of HTTP requests from the
resulting in resource consumption [29]. Detail discussion of abovementioned example can be obvious. Repetitive requests
these attacks is given below: for a large file can be detected and can then be blocked.
Attackers mimic legitimate traffic by instructing the Botnet to
send an HTTP request to the target Web site, analyze the
5.1 Net DDoS-based Bandwidth Attacks replies, and then recursively follow the links. The HTTP
Net DDoS-based bandwidth attacks are normally introduced requests from the attacker consequently become very similar
effectively from a single attack source that takes advantage of to normal Web traffic, thus explaining the extreme difficulty
specific IP weaknesses. Examples of such attacks are SYN in filtering this type of HTTP flood.
and ICMP flood attacks.

5.1.1 SYN Flood Attacks


A SYN flood attack utilizes a vulnerability of the TCP three-
way handshake, such that a server must contain a large data
structure for incoming SYN packets regardless of authenticity.
During SYN flood attacks, SYN packets are sent by the
attacker with unknown or non-existent source IP addresses.
The three-way handshake occurs when the server stores the
request information from the client into the memory stack and
then waits for client confirmation. Given that the source IP
addresses in SYN flood attacks are unknown or non-existent,
confirmation packets for the requests created by the SYN
flood attack are not received. Each half-open connection
accumulates in the memory stack until it times out. Hence, the
memory stack becomes full. Consequently, no requests can be Fig. 4: Distributed reflector denial of service (DRDoS)
processed, and the services of the system are disabled. Thus, Attack
SYN flood attacks are considered one of the most powerful
flooding methods [30].

5.1.2 ICMP Flood Attacks 5.2.2 Session Initiation Protocol (SIP) Flood
ICMP is based on the IP protocol that can diagnose the status Attacks
of the network. An ICMP flood attack is a bandwidth attack The SIP is a widely supported standard for call set-up in
that uses ICMP packets that can be directed to an individual Voice-over IP (VoIP). SIP proxy servers generally require
machine or to an entire network. When a packet is sent from a public Internet access to accomplish the standard in accepting
machine to an IP broadcast address in the local network, all call set-up requests from any VoIP client. For scalability, SIP
machines in the network receive the packet. When a packet is is typically implemented with UDP to become stateless. The
sent from a machine to the IP broadcast address outside the attacker can flood the SIP proxy in one attack using SIP
local network, the packet is delivered to all machines in the INVITE packets that pose as genuine source IP addresses. To
target network. Other types of ICMP flood attack are the avoid counter-hacking mechanisms, attackers can also launch
SMURF and the Ping-of-Death attacks [31]. the flood from a Botnet through a legitimate source IP
address. Two victim categories emerge in this attack scenario.
5.2 App-DDoS Attacks The first type comprises the SIP proxy servers with depleted
Attack power can be amplified by forcing the target to execute server resources as a result of the processing of SIP INVITE
expensive operations. These attacks can consume all available packets, while their network capacity is consumed by the SIP
corporate bandwidth and fill the pipes with illegitimate traffic. INVITE flood. The SIP proxy server subsequently becomes
Routing protocols can also be affected and services are incapable of providing VoIP service. The second type of
disrupted by either resetting the routing protocols or offering victim is the call receiver, who becomes overwhelmed by fake
data that harm server operation [29]. VoIP calls and encounters difficulty in reaching legitimate
callers [33].
5.2.1 HTTP Flood Attacks
5.2.3 Distributed Reflector Attacks
An attack that bombards Web servers with HTTP requests is
Attackers should necessarily hide the true sources of their
called an HTTP flood attack. According to [32], HTTP flood
resulting attack traffic. Figure 4 illustrates the distributed
attacks are common in most Botnet software programs. To
reflector denial of service (DRDoS) attack, which hides attack
send an HTTP request, a valid TCP connection that requires a
traffic sources using third parties, such as routers or Web
genuine IP address has to be established. Attackers send an
servers, during the relay of the attack traffic to the victim.
HTTP request through the IP address of a bot and then
These third parties are called reflectors. Any machine that
formulate the HTTP requests in different ways to maximize
responds to an incoming packet is a potential reflector. A
the attack power or to avoid detection. An attacker, for
DRDoS attack has three stages. In the second stage, after the
example, can manipulate the Botnet to send HTTP requests to
attacker has gained control of ―zombies,‖ these ―zombies‖ are

27
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012

instructed to send attack traffic information to the victims firewalls and IPS devices will pass legitimate traffic—thus
through the third parties, with the victim‘s IP address as the eliminating one layer of security for the attacker.
source IP address. In the third stage, the third parties send the
reply traffic to the victim. This stage constitutes the DDoS 5.3.2 Follow the Money
attack. This type of attack had shut down a security research Attackers see a major opportunity for extortion when
Web site (i.e. www.grc.com), in January 2002. DRDoS has applications are supporting high revenue-generating services.
been considered a potent and increasingly prevalent Internet For example, an online gaming company is far more likely to
attack. Unlike a traditional DDoS attack, the traffic from a pay an attacker to stop a DDoS attack that is costing millions
DRDoS attack is further dispersed through third parties, per day in revenue than is an owner of a nonprofit Web site.
resulting in the increased distribution of the attack traffic and
increasing the difficulty in the identification of the attack. 5.3.3 More Bang for the Buck
Moreover, the source IP addresses of the attack traffic point to
innocent third parties, thus complicating the process of tracing Some attacks cause significantly more collateral damage than
the attack traffic source. Finally, as observed by [34] and [35], others. For example, a DNS attack that targets a single DNS
DRDoS attacks can amplify the attack traffic, thereby making service provider impacts not only that provider but all of its
the attack even more potent. In the succeeding section, an customers as well.
actual example demonstrates the serious threat posed by
Organizations are beginning to realize that the power to
DRDoS attacks.
rapidly stop application-layer DDoS attacks that target
Internet-facing services is imperative for business continuity
5.2.4 Domain Name System (DNS) Amplification and success.
Attacks
An example of effective reflector attack is the DNS What makes this sort of attack different than a network or
amplification attack shown in Figure 5. DNS provides a transport layer attack is that there is no way for upstream
distributed infrastructure for the storage and association of networking equipment to easily detect and filter out the
different resource records (RR) with Internet domain names. attacker, since at the packet level, the traffic appears to be
DNS translates domain names into IP addresses. A recursive normal application traffic. System administrators and
DNS server usually accepts a query and then resolves a given application developers of potential targets must instead take
domain name for the requester. A recursive name server often measures to build DDoS protection into their network and
contacts other authoritative name servers when necessary and application design. Techniques such as caching and load
subsequently returns the query response to the requester [36]. balancing can increase the applications ability to absorb a
DNS query responses have disproportional sizes that normally flood of requests without becoming offline.
comprise the original query and the answer. The query 6. BOTNETS BASED DDOS ATTACK
response packet is always larger than the query packet.
Moreover, a query response can contain multiple RR, and
INCIDENTS
A DDoS attack is a major Internet threat as it can create a
some RR types can be very large.
huge volume of unwanted traffic. DDoS attacks can prevent
access to a particular resource, such as a Web site [37]. The
A huge first reported large-scale DDoS attack occurred in August
Step3: Botnet number of 1999 against a University [38]. The attack had shut down the
recursive
victim‘s network for over two days. In 7 February 2000, a
sends spoofed
number of Websites went offline for several hours after an
DNS request DNS
attack [38]. In some cases, DDoS attacks can produce
servers
approximately 1 Gbit/s of attack traffic against a single victim
available [39]. In February 2001, over 12,000 attacks were registered
on the against more than 5,000 distinct victims over a three-week
Step4: Amplified DNS
activate the botnet

Internet period [40]. The Coordination Center of the Computer


Step2: send an

traffic is return to the


instruction to

Emergency Response Team was also attacked in May 2001,


victim making the availability of their Website intermittent for more
than two days.

Step1: compromise DNS DDoS attacks usually continuously target DNS. In October
server by sending signal to 2002, all root name servers underwent an exceptionally
activate the bots intensive DoS attack [41] with some non-received DNS
requests to an outsourced DNS service in Akamai, which were
Fig. 5: DNS Attack meant to enhance service performance. In 2004, UK online
bookmaking, betting, and gambling sites were overwhelmed
5.3 Trends that surprise in application- by DoS attacks launched by unidentified attackers. The
layer DDoS attacks Internet-based business service of Al Jazeera, a provider of
Arabic-language news services, was similarly attacked in
5.3.1 Bypass One Layer of Security January 2005. The text-to-speech translation application in the
In most cases, the applications that attackers are trying to Sun Microsystem‘s Grid computing system was disabled
exploit or target are well-known and must be ―allowed‖ during its opening day by a DoS attack in March 2006.
through perimeter security devices such as firewalls or IPS
devices. For example, by default, firewalls allow HTTP or In [39], the presence of roughly 2,000 to 3,000 active DoS
DNS traffic. IPS devices are not much different as they attacks per week was described using an updated backscatter
enforce security policy by inspecting packets for signatures of analysis. The attack record over a three-year period revealed
known threats. DDoS attacks take advantage of the fact that 68,700 attacks on over 34,700 distinct Internet hosts from

28
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012

more than 5,300 organizations. Some DNS requests failed to [2] H. R. Zeidanloo, A. A. Manaf, "Botnet command and
reach a root name server because of the congestion caused by control mechanisms," in the proc. of Second
the DoS attack. In [41], another major DoS attack occurred International Conference on Computer and Electrical
on 15 June 2004 against name servers in the Akamai Content Engineering, (ICCEE '09), pp. 564-568, 2009.
Distribution Network. This attack blocked almost all access to
such sites as Apple computer, Google, Microsoft, and Yahoo [3] C. Douligeris and D. N. Serpanos, "Network security:
for more than two hours. These companies supposedly current status and future directions," Wiley-IEEE Press,
outsourced their DNS service to Akamai for improved 2007.
performance. [4] B. B. Gupta, M. Misra, R. C. Joshi, ―FVBA: A
Combined Statistical Approach for Low Rate Degrading
6.1 Recent Botnet based DDoS Incidents and High Bandwidth Disruptive DDoS Attacks Detection
DDoS attacks occur almost daily. Even well-known websites, in ISP Domain,‖ in the proceedings of 16th IEEE
such as Twitter, Facebook, Google, and other popular search International Conference on Networks (ICON-2008),
engines, cannot escape these attacks that affect countless DOI: 10.1109/ICON.2008.4772654, New Delhi, India,
users. An eye-opener case was the DDoS incident that 2008.
targeted the White House, FBI, DOJ [42], the Recording
[5] D. McPherson, ―Worldwide Infrastructure Security
Business Association of America, Universal Music Websites,
Report," Arbor Networks, January 19th, 2010, avilable
and the Hong Kong Stock Exchange [43]. A total of 80
at:
computers were compromised by the Botnet and up to
http://ipv6.org.sa/sites/default/files/World_Infrastructure
250,000 were infected with malware during the attack. The
_Security_Report_ 2011.pdf.
attack traffic consumed 45 gigabytes per second according to
the 7th Annual Report from the Arbor Company 2011 [5]. [6] Cloudflare, "2011: The Year of the DDoS". Available at:
The outage lasted for seven days, the longest in 2010. In 2011, http://blog.cloudflare.com/2011-the-year-of-the-ddos.
the longest attack ever recorded target a travel company,
lasting for 80 days, 19 hours, 13 minutes, and 5 seconds. The [7] S. Byers, et al., "Defending against an Internet-based
average duration of DDoS attacks is 9 hours and 29 minutes. attack on the physical world," ACM Transactions on
The observed DDoS incidents from 2011 to the first quarter of Internet Technology (TOIT), vol. 4, pp. 239-254, 2004.
2012 are shown in Table 1. [8] F. Freiling, et al., "Botnet tracking: Exploring a root-
cause methodology to prevent distributed denial-of-
6.2 Financial Losses by Botnet based DDoS service attacks," Computer Security–ESORICS 2005, pp.
Attack 319-335, 2005.
Large-scale attacks cause substantial financial damage to [9] S. M. Specht and R. B. Lee, "Distributed denial of
companies relying on the Internet for their daily business. service: Taxonomies of attacks, tools, and
Direct (e.g., revenue loss during the attack) and indirect (e.g., countermeasures," in the Proceedings of the International
customer loss attributed to degraded reputation) damages are Workshop on Security in Parallel and Distributed
also experienced. E-commerce and stock exchange sites spend Systems, 2004, pp. 543-550.
millions of dollars to recover from these attacks, whereas
other companies allocate a huge amount of money to defend [10] K. J. Houle, "Trends in Denial of Service Attack
themselves from possible hackers. As indicated by the survey Technology," CERT Coordination Center, Carnegie
of VeriSign respondents, expenditures reach up to $2.5 Mellon Software Engineering Institute, oct 2001.
million [57]. Table 2 shows the loss of revenue attributed to [11] V. Company, "Distributed Denial of Service (DDoS) and
service disruption among large companies in the world. Botnet Attacks," An iDefense Security Report, 2006.

7. CONCLUSIONS [12] B. B. Gupta, R. C. Joshi, M. Misra, ―Dynamic and Auto


Responsive Solution for Distributed Denial-of-Service
A Botnet-based DDoS attack is undoubtedly a serious Internet
problem that challenges the growth rate and the public Attacks Detection in ISP Network,‖ International Journal
acceptance of online government and business sites. In this of Computer Theory and Engineering (IJCTE) 1 (1), pp.
71-80, 2009.
paper, a clear view of the Botnet based DDoS attack on the
application layer, especially on the Web server, is presented. [13] B. B. Gupta, R. C. Joshi, M. Misra, ―Distributed Denial
Incidents around the world and revenue losses of famous of Service Prevention Techniques,‖ International Journal
companies and government Web sites are also described, of Computer and Electrical Engineering (IJCEE), vol. 2,
indicating that extreme care should be taken and a further number 2, pp. 268-276, 2010.
study should be conducted to assess the size of the problem
and then derive an optimal solution. [14] P. J. Criscuolo, "Distributed Denial of Service: Trin00,
Tribe Flood Network, Tribe Flood Network 2000, and
Stacheldraht CIAC-2319," DTIC Document, 2000.
8. ACKNOWLEDGMENTS
The authors gratefully acknowledge the financial support of [15] N. L. Sven Dietrich, David Dittrich, "Analyzing
the National Advanced IPv6 Centre (NAV6), Universiti Sains Distributed Denial Of Service Tools: The Shaft Case," in
Malaysia, for partial work reported in the paper. Proceedings of the 14th Systems Administration
Conference (LISA 2000), New Orleans, Louisiana, USA,
9. REFERENCES December 3– 8, 2000, p. 12.
[1] B. B. Gupta, R. C. Joshi, Manoj Misra, ―ANN Based [16] D. Dittrich, "The Tribe Flood Network," distributed
Scheme to Predict Number of Zombies involved in a denial of service attack tool, 199l. Available at:
DDoS Attack,‖ International Journal of Network http://staff.washington.edu/dittrich/misc/tfn.analysis.
Security (IJNS), vol. 14, no. 1, pp. 36-45, 2012.

29
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012

[17] D. Dittrich, "The stacheldraht," distributed denial of [32] P. Bächer, et al., "Know your enemy: Tracking botnets,"
service attack tool, 1999. Available: The Honeynet Project and Research Alliance, Tech. Rep,
http://staff.washington.edu/dittrich/misc/stacheldraht.ana 2005.
lysis.
[33] J. Rosenberg, et al, "RFC 3261 SIP: Session initiation
[18] G. W. David Dittrich , Sven Dietrich , Neil Long, "The protocol", 2002. Available at: www.ietf.org
mstream," distributed denial of service attack tool, 2000.
Available at: [34] V. Paxson, "An analysis of using reflectors for
http://staff.washington.edu/dittrich/misc/mstream.analysi distributed denial-of-service attacks," ACM SIGCOMM
s.txt. Computer Communication Review, vol. 31, pp. 38-47,
2001.
[19] B. Hancock, "Trinity v3, a DDoS tool, hits the streets,"
Computers & Security, vol. 19, pp. 574-574, 2000. [35] S. Gibson, "Distributed reflection denial of service,"
2002. Available at: http://grc. com/dos/drdos.htm.
[20] Bysin, ―knight.c sourcecode," 2001. Available at:
http://packetstormsecurity.org/distributed/ knight.c. [36] P. V. Mockapetris, "Domain names-concepts and
facilities," RFC, USA, 1987.
[21] F. Y. Rashid, "DDoS Attack Tools, Service Help Target
Organizations: Arbor Networks," Feb, 2012. Available [37] M. Sachdeva, et al., "DDoS Incidents and their Impact: A
at: http://www.eweek.com/c/a/Security/DDoS-Attack- Review," International Arab Journal of Information
Tools-Service-Help-Target-Organizations-Arbor- Technology, vol. 7, pp. 14-19, 2010.
Networks-763865. [38] L. Garber, "Denial-of-service attacks rip the Internet,"
[22] E. Mills, ―DOJ, FBI, entertainment industry sites IEEE Computer, vol. 33, pp. 12-17, 2000.
attacked after piracy arrests ", 2012. Available: [39] D. Moore, et al., "Inferring internet denial-of-service
http://news.cnet.com/8301-27080_3-57362279-245/doj- activity," ACM Transactions on Computer Systems
fbi-entertainment-industry-sites-attacked-after-piracy- (TOCS), vol. 24, pp. 115-139, 2006.
arrests.
[40] ITworld.com.. "CERT hit by DDoS attack for a third
[23] J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack day," 2001. Available at:
and DDoS defense mechanisms," ACM SIGCOMM http://www.itworld.com/IDG010524CERT2
Computer Communication Review, vol. 34, pp. 39-53,
2004. [41] C. Gonsalves, "Akamai DDoS Attack Whacks Web
Traffic," 2004. Available: at
[24] B. B. Gupta, R. C. Joshi, M. Misra, ―An ISP level http://www.eweek.com/c/a/IT-Infrastructure/Akamai-
solution to combat DDoS attacks using combined DDoS-Attack-Whacks-Web-Traffic-Sites/
statistical based approach,‖ International Journal of
Information Assurance and Security (JIAS), 3 (2), pp. [42] FBI, "Justice Department Charges Leaders of
102-110, 2008. Megaupload with Widespread Online Copyright
Infringement," 2012. Available at:
[25] U. Tariq, et al., "A comprehensive categorization of http://www.fbi.gov/news/pressrel/press-releases/justice-
DDoS attack and DDoS defense techniques," Advanced department-charges-leaders-of-megaupload-with-
Data Mining and Applications, pp. 1025-1036, 2006. widespread-online-copyright-infringement.
[26] A. Asosheh Dr and N. Ramezani, "A comprehensive [43] Headlines, "DDoS Attacks Against Government and
taxonomy of DDOS attacks and defense mechanism Entertainment Websites Escalate," 2012. Available at:
applying in a smart classification," WSEAS Transactions http://www.infosecisland.com/blogview/19543-DDoS-
on Computers, vol. 7, pp. 281-290, 2008. Attacks-Against-Government-and-Entertainment-
[27] B. B. Gupta, R. C. Joshi, M. Misra, ―Defending against Websites-Escalate.html.
Distributed Denial of Service Attacks: Issues and [44] E. Hill, "Hackers hit Tunisian websites," 2011. Available
Challenges,‖ Information Security Journal: A Global at: http://www.aljazeera.com/news/
Perspective, vol. 18, issue 5, Taylor & Francis, UK, pp. africa/2011/01/201113111059792596.html.
224-247, 2009. DOI: 10.1080/19393550903317070
[45] The journal.ie, "Fine Gael website defaced by
[28] Debasish Das, Utpal Sharma, D. K. Bhattacharyya., Anonymous ‗hacktivists‘," 2011. Available at:
"Detection of HTTP flooding attacks in multiple http://www.thejournal.ie/fine-gael-website-defaced-by-
scenarios," in the proc. of ICCCS-2011, 2011, pp.517- anonymous-hacktivists-2011-01.
522.
[46] R. Somaiya, "Hackers Shut Down Government Sites,"
[29] A Mishra, BB Gupta, RC Joshi, ―A Comparative Study 2011. Available at:
of Distributed Denial of Service Attacks, Intrusion http://www.nytimes.com/2011/02/03/world/middleeast/0
Tolerance and Mitigation Techniques," In the proc. of 3hackers.html?_r=2.
European Intelligence and Security Informatics
Conference (EISIC-2011), , pp. 286-289, 2011. [47] P. Bright, "Anonymous speaks: the inside story of the
HBGary hack," 2011. Available at:
[30] D. C. Wyld, et al., "Trends in Network and http://arstechnica.com/tech-policy/2011/02/anonymous-
Communications," International Conferences, NeCOM, speaks-the-inside-story-of-the-hbgary-hack.
197: Springer, 2011.
[48] B. N. Technology, "Anonymous denies Westboro
[31] M. Zelkowitz, "New programming paradigms," vol. 64, attack," 2011. Available at:
Academic Press, 2005. http://www.bbc.co.uk/news/technology-12535456.

30
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012

[49] Laurie Segall, "Wordpress hammered by massive DDoS http://www.guardian.co.uk/technology/2011/jun/21/soca-


attack," 2011. Available at: website-hacking-lulzsec.
http://money.cnn.com/2011/03/03/technology/wordpress
_attack/index.htm [56] Tech4Biz, "DDoS attack sends Hong Kong stock
exchange back to paper," 2011. Available at:
[50] C. Uygar, "Wisconsin & Anonymous Strike Back," 2011. http://www.techcentral.ie/article.aspx?id=17247
Available at: http://www.youtube.com/watch?v=lQGY-
vHjhXo [57] S. M. Kerner, "DDoS Attacks on the Rise," 2011.
Available at:
[51] D. Takahashi, "Hackers deny involvement in PlayStation http://www.esecurityplanet.com/trends/article.php/39329
Network outage," 2011. Available at: 76/DDoS-Attacks-on-the-Rise.htm.
http://venturebeat.com/2011/04/22/as-playstation-
network-outage-continues-hackers-deny-involvement/ [58] Forrester, "DDoS: A Threat You Can‘t Afford To Ignore
," 2009. Available at:
[52] B. N. Technology, "Spanish police website hit by http://www.verisigninc.com/assets/whitepaper-ddos-
Anonymous hackers," 2011. Available at: threat-forrester.pdf.
http://www.bbc.co.uk/news/technology-13749181.
[59] Arbor Sert, " DDoS and Security Reports: The Arbor
[53] C. Albanesius, "Hackers Target Malaysian Government Networks Security Blog," 2011. Available at:
Sites," 2011. Available at: http://ddos.arbornetworks.com/2012/02/ddos-tools/.
http://www.pcmag.com/article2/0,2817,2387108,00.asp.
[60] Jose Nazario, , ―BlackEnergy DDoS Bot Analysis,‖
[54] P. Eric Mack, "Anonymous Plans Attack on City of Arbor Networks, 2007. Available at: http://atlas-
Orlando Website, IRC Chatter Suggests," 2011. public.ec2.arbor.net/docs/BlackEnergy+DDoS+Bot+Ana
Available at: http://www.webcitation.org/5zb2cJRKl. lysis.pdf.
[55] J. Halliday, "Serious Organised Crime Agency takes
down website after hacking attack," 2011. Available at:

31
International Journal of Computer Applications (0975 – 8887)
Volume 49– No.7, July 2012

Table 1. Botnet-Based DDoS attack incidents 2011-2012

The Target Date of Attack Details

Tunisian Government Web sites 3 January 2011 Web site outage that included the president, prime minister, ministry
of industry, ministry of foreign affairs, and stock exchange [44]

FINE GAEL‘s News Web site 9 January 2011 One-night content outage by an anonymous attacker using the LOIC
tool [45]
www.finegael2011.com

Egyptian government Web sites 25 January Site went offline from the beginning of the revolution until the
2011 president stepped down [46]

HB Gary Federal 5–6 February Hacked by dumping 68,000 e-mails from the system [47]
2011

Operation Ouraborus 16 February Threats from an anonymous attacker who hacked the site and caused
2011 irreversible damage [48]

NEW YORK (CNN Money) 3 March 2011 The huge attack hit the company‘s data centers with tens of millions
of packets per second [49]

Operation Empire State Rebellion 14 March 2011 Threat from an anonymous attacker affecting the Bank of America
[50]

Operation Sony April 2011 Outage of the Play Station Network [51]

Spanish Police 12 Jun 2011 DDoS attack lasted for approximately one hour [52]

Operation Malaysia 15 Jun 2011 Outage of 91 Web sites of the Malaysian Government that started
7:30 pm GMT [53]
Malaysia.gov.my

Operation Orlando 16 Jun 2011 Orlando government Web sites went offline daily because of the
LOIC tool [54]

Visa Card, Master Card, Wikileaks and 27 July 2011 Payment processing from Wikileaks through PayPal were
www.paypal.com continuously denied [55]

Hong Kong stock exchange 15 August Hundreds of companies were affected with a single target [56]
2011

Justice.gov, MPAA.org, White House, the FBI, 19 Jan 2012 The largest attack for 2012 from an anonymous attacker who shut
BMI.com, Copyright.com, Viacom, Anti- down all the affected sites for 10 minutes [22]
piracy.be/nl, Vivendi.fr, Hadopi.fr, and
ChrisDodd.com,

Table 2. Financial Losses by Botnet based DDoS Attack [58]

Action Company A Company B Company C Company D

Loss of Revenue per $19 million $240,000 $650,000 $190,000


hour

Line Business E-banking E-banking E-Commerce E-Commerce

Average Loss in an $38-114 million $480,000-1,440,000 $1,300,000-3,900,000 $380,000-1,140,000


attack

32

View publication stats

You might also like