SlideShare a Scribd company logo
DDoSMon
A Global DDoS Monitoring Project
APNIC 42
Yiming Gong
Network	Security	Research	Lab,	 Qihoo 360
netlab.360.com
About
• About 360.com
• The biggest internet security company in China
• More than 500	million	monthly	active	Internet	users,	according	to	iResearch.
• About me
• Director of the network security research lab
• Passivedns https://passivedns.cn
• Ddosmon https://ddosmon.net
• Scanmon http://scan.netlab.360.com/
• Opendata http://open.netlab.360.com DGA, EK, etc
• And few other projects
Motivation
• DDoS is one of the biggest internet security threat globally
• Akamai: 129%	increase	in	DDOS	attacks in the second quarter of 2016
(https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/akamai-q2-2016-
internet-security-executive-review.pdf)
• Versign: DDOS	attacks	are	becoming	more	sophisticated	and	persistent	in	the	
second	quarter	of	2016
(https://www.verisign.com/assets/report-ddos-trends-Q22016.pdf)
• There is a lack of true visibility regarding to DDoS incident
• Most of the time, only the victims and the big pipe providers know what
happen
• Sometimes they don’t even have the needed visibility
Realtime Global DDoS attacks monitoring
https://ddosmon.net
• On average it sees more than 20,000 DDoS attacks every day(one of the
biggest?)
How does DDoSMon Work
• Mainly	based	on	three	major	components
o Realtime NetFlow traffic (layer4)
o Realtime DNS traffic(DNS amp, DNS reflection..etc)
o Realtime DDoS botnet command	tracking system
1: Realtime NetFlow Traffic
• Collect huge volume NetFlow from various networks
o Large network backbone routers
o User contribute flows
oHandle more	than	30	billions	NetFlow records	every day
oData is processed in near real-time
NetFlow Based Attacks Detecting
Spike detecting
The first important	step	for	the heuristic	DDoS	
attacks	recognition
• Cumulative	moving	average
algorithm
Characteristics	recognition
Different	DDoS	attack	vectors	usually	presents	a	
certain	characteristic	on	NetFlow traffic.
• Amplification flood
1. More	than	90%	traffic	is	UDP
2. Most	of	the	packets	from	some	fixed	
suspicious	source	port e.g. 19, 53, 123, 1900, 0
3. Most	of	the	packet	has	large	bytes
• SYN flood
1. More	than	90%	traffic	is	TCP
2. All	TCP	Flags	only	has	SYN Flag	set	packets
3. Source	IP	address	distribution	normally	not	
enough	random
2: Realtime DNS Traffic
• Process 240	billions	DNS	requests	every day which covers	about
10% total DNS traffic in China
• We also operate a Passive DNS platform http://passivedns.cn
Realtime DNS Traffic
• What can we get from DNS traffic?
o The ability to monitor Domains instead of just IPs.
o DNS reflection/amplification attacks
o Random subdomain attacks
Realtime DNS Traffic	– DNS
reflection/amplification attacks
• $	dig	cpsc.gov any +tcp
Realtime DNS Traffic – DNS
reflection/amplification attacks
• www.bankofamerica.com was attacked on Sep.14
• Attacker uses BOA address as query source to ask open dns resolvers for
cpsc.gov
• The dns responses from the open resolvers flooded BOA address
Realtime DNS Traffic – DNS
reflection/amplification attacks
• Live data
Realtime DNS Traffic	– DNS Random	
subdomain	attacks
• Random	subdomain	attacks
• Attack	is	to attack DNS	authoritative	provider
• Mostly	dns open	resolvers as query sources
• High	volume	of	queries	for	nonexistant subdomains
• Nonexistant subdomains so no local cache
• So the query will always reach the dns authoritative server
Realtime DNS Traffic	– DNS Random	
subdomain	attacks
• Random	subdomain	attacks
Realtime DNS Traffic	– DNS Random	
subdomain	attacks
• Random	subdomain	attacks
3: Realtime DDoS Botnet Command Tracking
System
• A live ddos botnet c2 tracking system
• For	some	big	ddos botnet	families,		track	the	analysis	their	C2	communication	
protocols
• ~190k C2 servers (IP + Port)
• Logged ~400M DDoS	related	instructions	
o Elknot (AKA. Linux/BillGates), A	notorious	DDoS	botnet	which	runs	on	both	Linux	and	
Windows.	Most	be	used	launch	SYN	Flooding	attacks.
o LDX (AKA. Xor.DDoS), A	rojan malware	attackers	are	using	to	hijack	Linux	machines	to	include	
within	a	botnet	for	DDoS.	Commonly	be	used	launch	SYN Flooding	and	DNS	Flooding	attacks.
DDoS Botnet Tracking System
• Example
• 23.73.108.99	
• www.microsoft.com
DDoS Botnet Tracking System
• Example
• 23.73.108.99	www.microsoft.com
• time				botname cc_server cc_ip cc_port type				atk_type target_host target_port notes
• 2016-09-23	01:57:43	ldx aaa.gggatat456.com	164.132.170.78	6003	ddos syn_flood 23.73.108.99	80	
syn_flood,	target=23.73.108.99,	port=80,	atk_time=30s,	payload_size=888,	tasks=11,	use_fake_source_ip
• C2	family:	LDX
• C2	server:	aaa.gggatat456.com (164.132.170.78)
• C2	Port:	6003
• Attack: syn flood
• Target ip and port 23.73.108.99	port 80
DDoS	Attack	Detecting	Procedure
1
5
4
3
2
A few cases
• Case	1	:	Target *.root-servers.net
• Case	2:		Target *.gov
Case1: Attacks Target *.root-servers.net
• We	detected	45	attacks	against	root-servers.net so far this year
• a,	b,	c,	d,	e,	f,	g,	h,	i,	l,	m.root-servers.net been attacked
• UDP reflection amplification and SYN flood are the major attack vectors
Case 1: e, g.root-servers.net be SYN Flood
• From Jun.25 22:00 to Jun.26 01:00 e.root-servers.net and g.root-
servers.net were SYN flooded
• An obvious spike can be observed for e.root-
servers.net(192.203.230.10) and g.root-servers.net(192.112.36.4),
and the spikes have highly similar pattern
The traffic figure of 192.203.230.10 from 2016-06-22	00:32:30 to 2016-06-28 23:59:50
Case 1: e, g.root-servers.net
• NetFlow records
o TCP packet percentage is extreme highly
compare to normal DNS traffic
o Almost all the TCP packets carry SYN flag
o The Source IP seems spoofed
183.131.2.66
183.131.2.67
183.131.2.70
183.131.2.71
183.131.2.72
Case 1: e, g.root-servers.net SYN Flood
• Botnet	command	and	controller(C2)	and	attacking	instructions	have	
been	logged	(botnet	family	:	elknot)
• 18 related C2 servers logged in this attack
Case 2: .gov ddos
• We detected 94 attacks target .gov sites last month.
(Aug. 10 – Sep.10 )
• whitehouse.gov , fbi.gov, nasa.gov, e.g.
• Reflection/Amplification are the most popular
attack vectors, 65%+,
o DNS > NTP> Chargen > SSDP is most be used UDP
protocol to launch amplification attacks
Case 2: Attack Target nsa.gov
• We detected nsa.gov(23.196.119.211) briefly been UDP
reflection/amplification attacked at 11:30:00(UTC) on Aug.19
• An obvious spike
The traffic figure of 23.196.119.211 from 2016-08-15 13:15:55 to 2016-08-22 10:52:52
Case 2: Attack Target nsa.gov
• UDP reflection amplification
• Mixed mulitiple attack vectors
o UDP	port	1900 SSDP-based	DDoS	
o UDP port 123 NTP-based DDoS
o UDP port 53 DNS reflection DDoS
oPacket size is unusually large, Most of
the packet sizes are 1500 bytes
reaching MTU threshold
DDoSMon System Demo
• Demonstration
How can I contribute
• More netflow data means more coverage
• Have netflow data to contribute?
Thanks
http://netlab.360.com

More Related Content

What's hot

The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
PECB
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
Karthikeyan Dhayalan
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
JayfErika
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Alisha Korpal
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
Karthikeyan Dhayalan
 
Android's security architecture
Android's security architectureAndroid's security architecture
Android's security architecture
Ofer Rivlin, CISSP
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)
Wail Hassan
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
Karthikeyan Dhayalan
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 
Pentesting ntp-17-02-18
Pentesting ntp-17-02-18Pentesting ntp-17-02-18
Pentesting ntp-17-02-18
Vengatesh Nagarajan
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
Syed Ubaid Ali Jafri
 
Cryptology
CryptologyCryptology
Cryptology
Rupesh Mishra
 
Verschlüsselung in Theorie und Praxis
Verschlüsselung in Theorie und PraxisVerschlüsselung in Theorie und Praxis
Verschlüsselung in Theorie und Praxis
Peter Tröger
 
Class diagram templates to instantly create class diagrams creately blog
Class diagram templates to instantly create class diagrams   creately blogClass diagram templates to instantly create class diagrams   creately blog
Class diagram templates to instantly create class diagrams creately blog
MdJishan7
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
Sanjiv Arora
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
Sam Bowne
 
CISSP - Software Development Security
CISSP - Software Development SecurityCISSP - Software Development Security
CISSP - Software Development Security
Karthikeyan Dhayalan
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course Catalog
NetCom Learning
 

What's hot (20)

The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Android's security architecture
Android's security architectureAndroid's security architecture
Android's security architecture
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Pentesting ntp-17-02-18
Pentesting ntp-17-02-18Pentesting ntp-17-02-18
Pentesting ntp-17-02-18
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
Cryptology
CryptologyCryptology
Cryptology
 
Verschlüsselung in Theorie und Praxis
Verschlüsselung in Theorie und PraxisVerschlüsselung in Theorie und Praxis
Verschlüsselung in Theorie und Praxis
 
Class diagram templates to instantly create class diagrams creately blog
Class diagram templates to instantly create class diagrams   creately blogClass diagram templates to instantly create class diagrams   creately blog
Class diagram templates to instantly create class diagrams creately blog
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
CISSP - Software Development Security
CISSP - Software Development SecurityCISSP - Software Development Security
CISSP - Software Development Security
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course Catalog
 

Similar to DDosMon A Global DDoS Monitoring Project

Drilling Down Into DNS DDoS
Drilling Down Into DNS DDoSDrilling Down Into DNS DDoS
Drilling Down Into DNS DDoS
APNIC
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
APNIC
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware
Dryden Geary
 
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetupWeapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
michaelxin2015
 
DDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationDDoS Attack Preparation and Mitigation
DDoS Attack Preparation and Mitigation
Jerod Brennen
 
Defcon
DefconDefcon
Defcon
OpenDNS
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
Felipe Prado
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
Amazon Web Services
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and Mitigation
Wilson Rogerio Lopes
 
Virus Bulletin 2012
Virus Bulletin 2012Virus Bulletin 2012
Virus Bulletin 2012
Cloudflare
 
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
ThousandEyes
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
Sagi Brody
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
Suzanne Aldrich
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security tool
Jisc
 
Spoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized InternetSpoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized Internet
APNIC
 
DDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internetDDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internet
Tom Paseka
 
(130119) #fitalk apt, cyber espionage threat
(130119) #fitalk   apt, cyber espionage threat(130119) #fitalk   apt, cyber espionage threat
(130119) #fitalk apt, cyber espionage threat
INSIGHT FORENSIC
 
What You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS AttackWhat You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS Attack
Cloudflare
 
Botconf ppt
Botconf   pptBotconf   ppt
Botconf ppt
Cloudflare
 
Secure 2013 Poland
Secure 2013 PolandSecure 2013 Poland
Secure 2013 Poland
Cloudflare
 

Similar to DDosMon A Global DDoS Monitoring Project (20)

Drilling Down Into DNS DDoS
Drilling Down Into DNS DDoSDrilling Down Into DNS DDoS
Drilling Down Into DNS DDoS
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware
 
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetupWeapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
Weapons of Mass Disruption by Roman Lara for OWASP San Antonio Chapter meetup
 
DDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationDDoS Attack Preparation and Mitigation
DDoS Attack Preparation and Mitigation
 
Defcon
DefconDefcon
Defcon
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and Mitigation
 
Virus Bulletin 2012
Virus Bulletin 2012Virus Bulletin 2012
Virus Bulletin 2012
 
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security tool
 
Spoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized InternetSpoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized Internet
 
DDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internetDDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internet
 
(130119) #fitalk apt, cyber espionage threat
(130119) #fitalk   apt, cyber espionage threat(130119) #fitalk   apt, cyber espionage threat
(130119) #fitalk apt, cyber espionage threat
 
What You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS AttackWhat You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS Attack
 
Botconf ppt
Botconf   pptBotconf   ppt
Botconf ppt
 
Secure 2013 Poland
Secure 2013 PolandSecure 2013 Poland
Secure 2013 Poland
 

More from APNIC

Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
APNIC
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
APNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
APNIC
 

More from APNIC (20)

Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 

Recently uploaded

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 

Recently uploaded (19)

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 

DDosMon A Global DDoS Monitoring Project

  • 1. DDoSMon A Global DDoS Monitoring Project APNIC 42 Yiming Gong Network Security Research Lab, Qihoo 360 netlab.360.com
  • 2. About • About 360.com • The biggest internet security company in China • More than 500 million monthly active Internet users, according to iResearch. • About me • Director of the network security research lab • Passivedns https://passivedns.cn • Ddosmon https://ddosmon.net • Scanmon http://scan.netlab.360.com/ • Opendata http://open.netlab.360.com DGA, EK, etc • And few other projects
  • 3. Motivation • DDoS is one of the biggest internet security threat globally • Akamai: 129% increase in DDOS attacks in the second quarter of 2016 (https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/akamai-q2-2016- internet-security-executive-review.pdf) • Versign: DDOS attacks are becoming more sophisticated and persistent in the second quarter of 2016 (https://www.verisign.com/assets/report-ddos-trends-Q22016.pdf) • There is a lack of true visibility regarding to DDoS incident • Most of the time, only the victims and the big pipe providers know what happen • Sometimes they don’t even have the needed visibility
  • 4. Realtime Global DDoS attacks monitoring https://ddosmon.net • On average it sees more than 20,000 DDoS attacks every day(one of the biggest?)
  • 5. How does DDoSMon Work • Mainly based on three major components o Realtime NetFlow traffic (layer4) o Realtime DNS traffic(DNS amp, DNS reflection..etc) o Realtime DDoS botnet command tracking system
  • 6. 1: Realtime NetFlow Traffic • Collect huge volume NetFlow from various networks o Large network backbone routers o User contribute flows oHandle more than 30 billions NetFlow records every day oData is processed in near real-time
  • 7. NetFlow Based Attacks Detecting Spike detecting The first important step for the heuristic DDoS attacks recognition • Cumulative moving average algorithm Characteristics recognition Different DDoS attack vectors usually presents a certain characteristic on NetFlow traffic. • Amplification flood 1. More than 90% traffic is UDP 2. Most of the packets from some fixed suspicious source port e.g. 19, 53, 123, 1900, 0 3. Most of the packet has large bytes • SYN flood 1. More than 90% traffic is TCP 2. All TCP Flags only has SYN Flag set packets 3. Source IP address distribution normally not enough random
  • 8. 2: Realtime DNS Traffic • Process 240 billions DNS requests every day which covers about 10% total DNS traffic in China • We also operate a Passive DNS platform http://passivedns.cn
  • 9. Realtime DNS Traffic • What can we get from DNS traffic? o The ability to monitor Domains instead of just IPs. o DNS reflection/amplification attacks o Random subdomain attacks
  • 10. Realtime DNS Traffic – DNS reflection/amplification attacks • $ dig cpsc.gov any +tcp
  • 11. Realtime DNS Traffic – DNS reflection/amplification attacks • www.bankofamerica.com was attacked on Sep.14 • Attacker uses BOA address as query source to ask open dns resolvers for cpsc.gov • The dns responses from the open resolvers flooded BOA address
  • 12. Realtime DNS Traffic – DNS reflection/amplification attacks • Live data
  • 13. Realtime DNS Traffic – DNS Random subdomain attacks • Random subdomain attacks • Attack is to attack DNS authoritative provider • Mostly dns open resolvers as query sources • High volume of queries for nonexistant subdomains • Nonexistant subdomains so no local cache • So the query will always reach the dns authoritative server
  • 14. Realtime DNS Traffic – DNS Random subdomain attacks • Random subdomain attacks
  • 15. Realtime DNS Traffic – DNS Random subdomain attacks • Random subdomain attacks
  • 16. 3: Realtime DDoS Botnet Command Tracking System • A live ddos botnet c2 tracking system • For some big ddos botnet families, track the analysis their C2 communication protocols • ~190k C2 servers (IP + Port) • Logged ~400M DDoS related instructions o Elknot (AKA. Linux/BillGates), A notorious DDoS botnet which runs on both Linux and Windows. Most be used launch SYN Flooding attacks. o LDX (AKA. Xor.DDoS), A rojan malware attackers are using to hijack Linux machines to include within a botnet for DDoS. Commonly be used launch SYN Flooding and DNS Flooding attacks.
  • 17. DDoS Botnet Tracking System • Example • 23.73.108.99 • www.microsoft.com
  • 18. DDoS Botnet Tracking System • Example • 23.73.108.99 www.microsoft.com • time botname cc_server cc_ip cc_port type atk_type target_host target_port notes • 2016-09-23 01:57:43 ldx aaa.gggatat456.com 164.132.170.78 6003 ddos syn_flood 23.73.108.99 80 syn_flood, target=23.73.108.99, port=80, atk_time=30s, payload_size=888, tasks=11, use_fake_source_ip • C2 family: LDX • C2 server: aaa.gggatat456.com (164.132.170.78) • C2 Port: 6003 • Attack: syn flood • Target ip and port 23.73.108.99 port 80
  • 20. A few cases • Case 1 : Target *.root-servers.net • Case 2: Target *.gov
  • 21. Case1: Attacks Target *.root-servers.net • We detected 45 attacks against root-servers.net so far this year • a, b, c, d, e, f, g, h, i, l, m.root-servers.net been attacked • UDP reflection amplification and SYN flood are the major attack vectors
  • 22. Case 1: e, g.root-servers.net be SYN Flood • From Jun.25 22:00 to Jun.26 01:00 e.root-servers.net and g.root- servers.net were SYN flooded • An obvious spike can be observed for e.root- servers.net(192.203.230.10) and g.root-servers.net(192.112.36.4), and the spikes have highly similar pattern The traffic figure of 192.203.230.10 from 2016-06-22 00:32:30 to 2016-06-28 23:59:50
  • 23. Case 1: e, g.root-servers.net • NetFlow records o TCP packet percentage is extreme highly compare to normal DNS traffic o Almost all the TCP packets carry SYN flag o The Source IP seems spoofed 183.131.2.66 183.131.2.67 183.131.2.70 183.131.2.71 183.131.2.72
  • 24. Case 1: e, g.root-servers.net SYN Flood • Botnet command and controller(C2) and attacking instructions have been logged (botnet family : elknot) • 18 related C2 servers logged in this attack
  • 25. Case 2: .gov ddos • We detected 94 attacks target .gov sites last month. (Aug. 10 – Sep.10 ) • whitehouse.gov , fbi.gov, nasa.gov, e.g. • Reflection/Amplification are the most popular attack vectors, 65%+, o DNS > NTP> Chargen > SSDP is most be used UDP protocol to launch amplification attacks
  • 26. Case 2: Attack Target nsa.gov • We detected nsa.gov(23.196.119.211) briefly been UDP reflection/amplification attacked at 11:30:00(UTC) on Aug.19 • An obvious spike The traffic figure of 23.196.119.211 from 2016-08-15 13:15:55 to 2016-08-22 10:52:52
  • 27. Case 2: Attack Target nsa.gov • UDP reflection amplification • Mixed mulitiple attack vectors o UDP port 1900 SSDP-based DDoS o UDP port 123 NTP-based DDoS o UDP port 53 DNS reflection DDoS oPacket size is unusually large, Most of the packet sizes are 1500 bytes reaching MTU threshold
  • 28. DDoSMon System Demo • Demonstration
  • 29. How can I contribute • More netflow data means more coverage • Have netflow data to contribute?