SlideShare a Scribd company logo
Mitigating DDoS
Attacks at Layer 7
Detect, Localize and
Mitigate using DNS GSLB
Allan Jude
ScaleEngine Inc.
Introductions
Allan Jude
● 12 Years as FreeBSD Server Admin
● Architect of the ScaleEngine CDN (HTTP and Video)
● Host of BSDNow.tv & TechSNAP.tv Podcasts
● Former Professor @ Mohawk College (2008-2011)
teaching Network Engineering and Security Analysis
● Extensive work with Puppet to manage our 80 odd
servers in 28 data centers in 10 countries
● Lots of work with ZFS to manage large collections of
videos as well as extremely large website caches (15+
million objects in ff*ff directories)
History
From 2002 - 2012 I ran an IRC shell provider,
specializing in hosting smallish IRC networks
as well as protection bots and BNCs (proxies)
During this time my servers were subject to
numerous different types and sizes of DDoS
attacks and other attempts to disrupt services
(take down IRC servers, gain control of rooms
on EFNet etc)
Overview
● DDoS Attack Types
● Defensive Techniques
● Commercial Solutions
● Using a GSLB to Localize Attackers
and Mitigate Volume
● Implementation Examples
● Where to go from here
What Is Distributed Denial of Service
● "A Denial of Service attack (DoS) is any
intended attempt to prevent legitimate users
from reaching a specific network resource."
[1]
● Distributed Denial of Service attacks are
harder to mitigate because there are
innumerable source addresses and they
attack traffic can be difficult to distinguish
from legitimate traffic
[1] Protection against Denial of Service Attacks: A Survey - http://staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-
DoSSurveyComputerJournal.pdf
Types of DDoS
● Volumetric / Link Saturation (Bandwidth)
● Protocol Attacks (SYN flood, fragments)
● Packet Storm (Excessive PPS)
● Resource Starvation (CPU, I/O, Memory)
● Stealth/Creeper (Slowloris, Slow POST)
● Exploit (Application or OS Specific DoS)
● DoS L2 - Intentionally trigger defensive
mechanisms to block traffic from the
(spoofed) source address or subnet
Statistics
● Average attack lasts 34.5 hours
● China is #1 origin of DDoS traffic, making up
40-50% of all botnet activity
● 75% of attacks are against Infrastructure
(layers 3 & 4, SYN Flood, ICMP/UDP attack)
with only 25% against Applications (layer 7)
● 25% of all attacks are under 1 gbps, and
50% of all attacks are under 6 gbps
[Source] Prolexic Quarterly Global DDoS Attack Report 2013Q1 - http://www.prolexic.
com/kcresources/attack-report/attack_report_q113_english-
version/Prolexic_Quarterly_Global_DDoS_Attack_Report_Q113_041613.pdf
Planning ...
Defensive Techniques
● Simple Failover
● Null Route (Automated or Manual)
● Web Application Firewall
● Anycast
● Proactive Name servers (a service from your
registrar that provides failover to additional
name servers, especially useful in the event
of a DDoS against your name servers)
● Commercial Solutions
Simple Failover (Hidden Spares)
● When a machine or location is under attack,
fail over to another machine/location
● Works better in Active/Passive mode,
because in Active/Active the attacker may
attack both locations
● If you have a sufficient number of hidden
spares, you may be able to evade the
attacker for a while
Null Route (Blackhole)
● You or your provider send /32 routes
upstream, routers stop forwarding the attack
(and all other) traffic to you, preventing the
saturation of your link
● This allows traffic to adjacent machines or
customers that are not under attack to
continue normally
● Some providers implement this automatically
to lessen the disruption of a single customer
being attacked
Web Application Firewall
● Only protect against specific known attacks
● Actually meant to prevent intrusions and
exploits, rather than brute force attacks
● Are often a bottleneck or failure point
because they can handle only very limited
packets-per-second and often have
underpowered CPUs, can actually amplify
the attack and take you down sooner
● Usually subject to limits on the number of
concurrent sessions/connections or other
scalability issues
Anycast
● Announce BGP routes for a single prefix
from multiple locations
● Traffic is directed based on fewest hops
● Automatically distributes traffic between
locations based on source network
● Limits damage caused by DDoS attacks to
the areas nearest the attackers
● Requires your own IP space or LoA
● Often requires 24/7 NOC
● Much harder to maintain and scale on a
limited budget with limited personnel
Commercial Solutions
● Filtering Hardware
○ Arbor Networks (PeakFlow) - Profiling and trend
analysis, attempts to automatically detect out of
character traffic in addition to known attack patterns
○ Checkpoint (DDoS Protector Appliances)
○ Cisco (Guard XT)
○ Fortinet (FortiDDoS)
● Protected Hosting
○ BlackLotus - Dedicated Servers or (BGP)
GRE Tunnel to your own network
○ Staminus - Dedicated Servers
Commercial Solutions (Continued)
● Protection for Hire
○ Prolexic (PLXRouter) - Prolexic announces your
BGP routes and Inbound traffic is routed through
Prolexic ‘Scrubbing’ facilities then on to your facilities
via a GRE tunnel. Asymmetric (outbound traffic
comes directly from your facilities)
○ Prolexic (PLXProxy) - HTTP and HTTPS only, traffic
is symmetrically routed through scrubbing facilities
○ CloudFlare - Application Proxy. HTTP(S) only
○ DDoSArrest - HTTP(S) only
Global Server Load Balancer
Using a GSLB
Another option for dealing with inbound DDoS
is to mitigate with a GSLB. The solution we
use, gdnsd (in ports), brings with it a number of
useful features.
The first of these is its integration with GeoIP.
Providing some of the functionality of Anycast,
it allows you to localize an attack. If most of the
attackers are in Europe, your North American
nodes will remain up
Before Geographic Mitigation
After Geographic Mitigation
“Transit providers are simply not going to transport
more than 40 Gbps of dirty traffic across the world;
the only solution is to launch multiple
geographically distributed scrubbing centers”
[1] https://blog.staminus.net/mitigation-of-attacks-exceeding-40-gbps
Sinkhole
Another option with the GSLB is to sinkhole all
traffic from a specific region. If the attack is
coming from zombies in China, you can point
all of those clients to an unroutable address
GSLB also allows ‘overrides’ to the GeoIP
database, allowing you to return a different
response for addresses in specific network
ranges. This can be used to prevent known
bots on some blacklist from reaching your sites
Sinkhole Mitigation - DC Map
plugins => { geoip => { maps => { geo_map => {
geoip_db => GeoIPCity.dat,
datacenters => [US-WEST, EU-WEST, EU-EAST, NULL],
map => {
EU => {
NL => [ EU-WEST ],
DE => [ EU-WEST ],
PL => [ EU-EAST ],
default => [ EU-WEST, EU-EAST ]
},
NA => { default => [ US-WEST ] }
}
Identify and Classify Attackers
nets => { #Bogons
10.0.0.0/16 => [ NULL ],
127.0.0.0/8 => [ NULL ],
#China
1.80.0.0/13 => [ NULL ],
1.192.0.0/13 => [ NULL ],
1.202.0.0/15 => [ NULL ],
#Autogenerated list of attackers below
},
},
Adapt DNS results sent to Attackers
resources => {
prod_www => {
map => geo_map
service_types => default
dcmap => {
US-WEST => 192.0.2.1,
EU-WEST => [ 192.0.2.4, 192.0.2.5, 192.0.2.6 ]
EU-EAST => {
lb01 => 192.0.2.2, lb02 => 192.0.2.3 },
NULL => 127.0.0.2,
}
}
} }
Whack-a-mole
If you have various geographically separated nodes, a
less graceful approach I have used in the past
● All traffic is sent to node A and everything is fine
● Attack starts, and overwhelms node A
● GSLB kicks in and redirects new users to node B
● Attackers often only do an initial DNS lookups or
cache the results, so they keep attacking node A for
a while
● Attackers eventually migrate to node B
● GSLB shifts load to node C
● repeat
● Shift back to node A, which has since recovered
Detecting an Attack
In order to respond to an attack, you must first detect when
you are under attack
In our case this is especially important. With video
streaming, it is not uncommon for our servers to see very
large sudden spikes in traffic; this does not necessarily
indicate an attack.
Even a large spike of incoming HTTP requests from diverse
sources does not presage an attack. We host an
advertising network that is used on CBS / CBSSports.com
TechRepublic.com, CollegeHumor.com and various others.
A large news event can drive a sudden surge of traffic.
Business Rules
What is an expected increase in traffic, and
what is an not? Is it an attack or just a surge?
For video streaming, does the traffic level
correspond to the viewer count (outbound) or
repeater count (inbound)? If not, this may be a
sign of an attack
False positives would be a very bad thing, so
extra care must be taken here
Implementation - Traffic Level
service_types => {
netif => {
plugin => "extmon", timeout => 5,
cmd => [
"/usr/local/libexec/nagios/check_snmp_int.pl",
"-H", "%%IPADDR%%", "-n", "em0", "-fkBM", "-w",
"500,500",
"-c", "640,640", "-d", "300", "-2", "--64bits", "-C",
"public", "--label"
]
}
}
Implementation - Business Rule
service_types => {
viewers_vs_bw => {
plugin => "extmon", timeout => 5,
cmd => [ "/usr/local/libexec/nagios/check_ddos",
"--viewers",
"http://%%IPADDR%%:8086/connectioncounts",
"--bandwidth", "-H %%IPADDR%%",
"--avgout", "2000"
]
}
}
Going Forward
● Implement Flow Analysis - automatically add
source addresses that match known attack
fingerprints to the ‘NULL’ class
● Increase adoption of EDNS0-Client-Subnet
so that addresses of zombies can be more
easily identified. May require mitigation
measures to prevent L2DoS
● Consider additional factors and business
rules to more accurately identify attack
conditions and attack sources
Podcasts
BSDNow.tv is a weekly video podcast featuring
News, Interviews and Tutorials about the BSD
family of Operating Systems. Hosted by Kris
Moore (founder of PC-BSD) and Myself.
TechSNAP.tv is a weekly sysadmin video
podcast covering an OS agnostic range of
security and production issues of interest to
those working , studying or interested in the
field.

More Related Content

What's hot

OSMC 2012 | Zabbix 2.0: Even Better by Rihards Olups
OSMC 2012 | Zabbix 2.0: Even Better by Rihards OlupsOSMC 2012 | Zabbix 2.0: Even Better by Rihards Olups
OSMC 2012 | Zabbix 2.0: Even Better by Rihards Olups
NETWAYS
 
BlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo TalkBlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo Talk
Simon Bennetts
 
OWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP HackathonOWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP Hackathon
Simon Bennetts
 
Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17
Brandon Arvanaghi
 
Red Team Methodology - A Naked Look
Red Team Methodology - A Naked LookRed Team Methodology - A Naked Look
Red Team Methodology - A Naked Look
Jason Lang
 
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
Sergey Gordeychik
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
Sunny Neo
 
From 0 to 0xdeadbeef - security mistakes that will haunt your startup
From 0 to 0xdeadbeef - security mistakes that will haunt your startupFrom 0 to 0xdeadbeef - security mistakes that will haunt your startup
From 0 to 0xdeadbeef - security mistakes that will haunt your startup
Diogo Mónica
 
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
CODE BLUE
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Priyanka Aash
 
BSides Manchester 2014 ZAP Advanced Features
BSides Manchester 2014 ZAP Advanced FeaturesBSides Manchester 2014 ZAP Advanced Features
BSides Manchester 2014 ZAP Advanced Features
Simon Bennetts
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guys
Nick Landers
 
OWASP 2013 AppSec EU Hamburg - ZAP Innovations
OWASP 2013 AppSec EU Hamburg - ZAP InnovationsOWASP 2013 AppSec EU Hamburg - ZAP Innovations
OWASP 2013 AppSec EU Hamburg - ZAP Innovations
Simon Bennetts
 
OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!
Matt Tesauro
 
Node.js post-mortem debugging with mdb and SmartOS
Node.js post-mortem debugging with mdb and SmartOSNode.js post-mortem debugging with mdb and SmartOS
Node.js post-mortem debugging with mdb and SmartOS
juliengilli
 
2014 ZAP Workshop 1: Getting Started
2014 ZAP Workshop 1: Getting Started2014 ZAP Workshop 1: Getting Started
2014 ZAP Workshop 1: Getting Started
Simon Bennetts
 
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
Mike Spaulding
 
Oscp preparation
Oscp preparationOscp preparation
Oscp preparation
Manich Koomsusi
 
Web security for developers
Web security for developersWeb security for developers
Web security for developers
Sunny Neo
 
OWASP 2013 APPSEC USA Talk - OWASP ZAP
OWASP 2013 APPSEC USA Talk - OWASP ZAPOWASP 2013 APPSEC USA Talk - OWASP ZAP
OWASP 2013 APPSEC USA Talk - OWASP ZAP
Simon Bennetts
 

What's hot (20)

OSMC 2012 | Zabbix 2.0: Even Better by Rihards Olups
OSMC 2012 | Zabbix 2.0: Even Better by Rihards OlupsOSMC 2012 | Zabbix 2.0: Even Better by Rihards Olups
OSMC 2012 | Zabbix 2.0: Even Better by Rihards Olups
 
BlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo TalkBlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo Talk
 
OWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP HackathonOWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP Hackathon
 
Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17
 
Red Team Methodology - A Naked Look
Red Team Methodology - A Naked LookRed Team Methodology - A Naked Look
Red Team Methodology - A Naked Look
 
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 
From 0 to 0xdeadbeef - security mistakes that will haunt your startup
From 0 to 0xdeadbeef - security mistakes that will haunt your startupFrom 0 to 0xdeadbeef - security mistakes that will haunt your startup
From 0 to 0xdeadbeef - security mistakes that will haunt your startup
 
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
BSides Manchester 2014 ZAP Advanced Features
BSides Manchester 2014 ZAP Advanced FeaturesBSides Manchester 2014 ZAP Advanced Features
BSides Manchester 2014 ZAP Advanced Features
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guys
 
OWASP 2013 AppSec EU Hamburg - ZAP Innovations
OWASP 2013 AppSec EU Hamburg - ZAP InnovationsOWASP 2013 AppSec EU Hamburg - ZAP Innovations
OWASP 2013 AppSec EU Hamburg - ZAP Innovations
 
OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!
 
Node.js post-mortem debugging with mdb and SmartOS
Node.js post-mortem debugging with mdb and SmartOSNode.js post-mortem debugging with mdb and SmartOS
Node.js post-mortem debugging with mdb and SmartOS
 
2014 ZAP Workshop 1: Getting Started
2014 ZAP Workshop 1: Getting Started2014 ZAP Workshop 1: Getting Started
2014 ZAP Workshop 1: Getting Started
 
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
 
Oscp preparation
Oscp preparationOscp preparation
Oscp preparation
 
Web security for developers
Web security for developersWeb security for developers
Web security for developers
 
OWASP 2013 APPSEC USA Talk - OWASP ZAP
OWASP 2013 APPSEC USA Talk - OWASP ZAPOWASP 2013 APPSEC USA Talk - OWASP ZAP
OWASP 2013 APPSEC USA Talk - OWASP ZAP
 

Similar to EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7

Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmon
Pavel Odintsov
 
Security Bootcamp 2013 mitigate d do-s attack with effective cost
Security Bootcamp 2013   mitigate d do-s attack with effective costSecurity Bootcamp 2013   mitigate d do-s attack with effective cost
Security Bootcamp 2013 mitigate d do-s attack with effective cost
Security Bootcamp
 
DDos, Peering, Automation and more
DDos, Peering, Automation and moreDDos, Peering, Automation and more
DDos, Peering, Automation and more
Internet Society
 
DDoS - unstoppable menace
DDoS - unstoppable menaceDDoS - unstoppable menace
DDoS - unstoppable menace
Aravind Anbazhagan
 
DDoS - unstoppable menace
DDoS - unstoppable menaceDDoS - unstoppable menace
DDoS - unstoppable menace
Aravind Anbazhagan
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
Marta Pacyga
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PROIDEA
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solution
Redge Technologies
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
Haltdos
 
Security Bootcamp 2013 - Mitigate DDoS attack with effective cost - Nguyễn Ch...
Security Bootcamp 2013 - Mitigate DDoS attack with effective cost - Nguyễn Ch...Security Bootcamp 2013 - Mitigate DDoS attack with effective cost - Nguyễn Ch...
Security Bootcamp 2013 - Mitigate DDoS attack with effective cost - Nguyễn Ch...
Security Bootcamp
 
What You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS AttackWhat You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS Attack
Cloudflare
 
Combating DDoS and why peering is important in Asia
Combating DDoS and why peering is important in AsiaCombating DDoS and why peering is important in Asia
Combating DDoS and why peering is important in Asia
MyNOG
 
Defend Software Puzzle against Denial of Services Attacks using a Countermeas...
Defend Software Puzzle against Denial of Services Attacks using a Countermeas...Defend Software Puzzle against Denial of Services Attacks using a Countermeas...
Defend Software Puzzle against Denial of Services Attacks using a Countermeas...
IRJET Journal
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PROIDEA
 
Zero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesZero Downtime JEE Architectures
Zero Downtime JEE Architectures
Alexander Penev
 
DDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP InfrastructuresDDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP Infrastructures
Pavel Odintsov
 
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
DataWorks Summit
 
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek JanikPLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PROIDEA
 
20140313_tu_delft
20140313_tu_delft20140313_tu_delft
20140313_tu_delft
University of Twente
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
HaipengCai1
 

Similar to EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7 (20)

Nanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmonNanog66 vicente de luca fast netmon
Nanog66 vicente de luca fast netmon
 
Security Bootcamp 2013 mitigate d do-s attack with effective cost
Security Bootcamp 2013   mitigate d do-s attack with effective costSecurity Bootcamp 2013   mitigate d do-s attack with effective cost
Security Bootcamp 2013 mitigate d do-s attack with effective cost
 
DDos, Peering, Automation and more
DDos, Peering, Automation and moreDDos, Peering, Automation and more
DDos, Peering, Automation and more
 
DDoS - unstoppable menace
DDoS - unstoppable menaceDDoS - unstoppable menace
DDoS - unstoppable menace
 
DDoS - unstoppable menace
DDoS - unstoppable menaceDDoS - unstoppable menace
DDoS - unstoppable menace
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solution
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Security Bootcamp 2013 - Mitigate DDoS attack with effective cost - Nguyễn Ch...
Security Bootcamp 2013 - Mitigate DDoS attack with effective cost - Nguyễn Ch...Security Bootcamp 2013 - Mitigate DDoS attack with effective cost - Nguyễn Ch...
Security Bootcamp 2013 - Mitigate DDoS attack with effective cost - Nguyễn Ch...
 
What You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS AttackWhat You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS Attack
 
Combating DDoS and why peering is important in Asia
Combating DDoS and why peering is important in AsiaCombating DDoS and why peering is important in Asia
Combating DDoS and why peering is important in Asia
 
Defend Software Puzzle against Denial of Services Attacks using a Countermeas...
Defend Software Puzzle against Denial of Services Attacks using a Countermeas...Defend Software Puzzle against Denial of Services Attacks using a Countermeas...
Defend Software Puzzle against Denial of Services Attacks using a Countermeas...
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
Zero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesZero Downtime JEE Architectures
Zero Downtime JEE Architectures
 
DDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP InfrastructuresDDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP Infrastructures
 
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
 
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek JanikPLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
 
20140313_tu_delft
20140313_tu_delft20140313_tu_delft
20140313_tu_delft
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 

EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7

  • 1. Mitigating DDoS Attacks at Layer 7 Detect, Localize and Mitigate using DNS GSLB Allan Jude ScaleEngine Inc.
  • 2. Introductions Allan Jude ● 12 Years as FreeBSD Server Admin ● Architect of the ScaleEngine CDN (HTTP and Video) ● Host of BSDNow.tv & TechSNAP.tv Podcasts ● Former Professor @ Mohawk College (2008-2011) teaching Network Engineering and Security Analysis ● Extensive work with Puppet to manage our 80 odd servers in 28 data centers in 10 countries ● Lots of work with ZFS to manage large collections of videos as well as extremely large website caches (15+ million objects in ff*ff directories)
  • 3. History From 2002 - 2012 I ran an IRC shell provider, specializing in hosting smallish IRC networks as well as protection bots and BNCs (proxies) During this time my servers were subject to numerous different types and sizes of DDoS attacks and other attempts to disrupt services (take down IRC servers, gain control of rooms on EFNet etc)
  • 4. Overview ● DDoS Attack Types ● Defensive Techniques ● Commercial Solutions ● Using a GSLB to Localize Attackers and Mitigate Volume ● Implementation Examples ● Where to go from here
  • 5. What Is Distributed Denial of Service ● "A Denial of Service attack (DoS) is any intended attempt to prevent legitimate users from reaching a specific network resource." [1] ● Distributed Denial of Service attacks are harder to mitigate because there are innumerable source addresses and they attack traffic can be difficult to distinguish from legitimate traffic [1] Protection against Denial of Service Attacks: A Survey - http://staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke- DoSSurveyComputerJournal.pdf
  • 6. Types of DDoS ● Volumetric / Link Saturation (Bandwidth) ● Protocol Attacks (SYN flood, fragments) ● Packet Storm (Excessive PPS) ● Resource Starvation (CPU, I/O, Memory) ● Stealth/Creeper (Slowloris, Slow POST) ● Exploit (Application or OS Specific DoS) ● DoS L2 - Intentionally trigger defensive mechanisms to block traffic from the (spoofed) source address or subnet
  • 7. Statistics ● Average attack lasts 34.5 hours ● China is #1 origin of DDoS traffic, making up 40-50% of all botnet activity ● 75% of attacks are against Infrastructure (layers 3 & 4, SYN Flood, ICMP/UDP attack) with only 25% against Applications (layer 7) ● 25% of all attacks are under 1 gbps, and 50% of all attacks are under 6 gbps [Source] Prolexic Quarterly Global DDoS Attack Report 2013Q1 - http://www.prolexic. com/kcresources/attack-report/attack_report_q113_english- version/Prolexic_Quarterly_Global_DDoS_Attack_Report_Q113_041613.pdf
  • 9. Defensive Techniques ● Simple Failover ● Null Route (Automated or Manual) ● Web Application Firewall ● Anycast ● Proactive Name servers (a service from your registrar that provides failover to additional name servers, especially useful in the event of a DDoS against your name servers) ● Commercial Solutions
  • 10. Simple Failover (Hidden Spares) ● When a machine or location is under attack, fail over to another machine/location ● Works better in Active/Passive mode, because in Active/Active the attacker may attack both locations ● If you have a sufficient number of hidden spares, you may be able to evade the attacker for a while
  • 11. Null Route (Blackhole) ● You or your provider send /32 routes upstream, routers stop forwarding the attack (and all other) traffic to you, preventing the saturation of your link ● This allows traffic to adjacent machines or customers that are not under attack to continue normally ● Some providers implement this automatically to lessen the disruption of a single customer being attacked
  • 12. Web Application Firewall ● Only protect against specific known attacks ● Actually meant to prevent intrusions and exploits, rather than brute force attacks ● Are often a bottleneck or failure point because they can handle only very limited packets-per-second and often have underpowered CPUs, can actually amplify the attack and take you down sooner ● Usually subject to limits on the number of concurrent sessions/connections or other scalability issues
  • 13. Anycast ● Announce BGP routes for a single prefix from multiple locations ● Traffic is directed based on fewest hops ● Automatically distributes traffic between locations based on source network ● Limits damage caused by DDoS attacks to the areas nearest the attackers ● Requires your own IP space or LoA ● Often requires 24/7 NOC ● Much harder to maintain and scale on a limited budget with limited personnel
  • 14. Commercial Solutions ● Filtering Hardware ○ Arbor Networks (PeakFlow) - Profiling and trend analysis, attempts to automatically detect out of character traffic in addition to known attack patterns ○ Checkpoint (DDoS Protector Appliances) ○ Cisco (Guard XT) ○ Fortinet (FortiDDoS) ● Protected Hosting ○ BlackLotus - Dedicated Servers or (BGP) GRE Tunnel to your own network ○ Staminus - Dedicated Servers
  • 15. Commercial Solutions (Continued) ● Protection for Hire ○ Prolexic (PLXRouter) - Prolexic announces your BGP routes and Inbound traffic is routed through Prolexic ‘Scrubbing’ facilities then on to your facilities via a GRE tunnel. Asymmetric (outbound traffic comes directly from your facilities) ○ Prolexic (PLXProxy) - HTTP and HTTPS only, traffic is symmetrically routed through scrubbing facilities ○ CloudFlare - Application Proxy. HTTP(S) only ○ DDoSArrest - HTTP(S) only
  • 16. Global Server Load Balancer
  • 17. Using a GSLB Another option for dealing with inbound DDoS is to mitigate with a GSLB. The solution we use, gdnsd (in ports), brings with it a number of useful features. The first of these is its integration with GeoIP. Providing some of the functionality of Anycast, it allows you to localize an attack. If most of the attackers are in Europe, your North American nodes will remain up
  • 20. “Transit providers are simply not going to transport more than 40 Gbps of dirty traffic across the world; the only solution is to launch multiple geographically distributed scrubbing centers” [1] https://blog.staminus.net/mitigation-of-attacks-exceeding-40-gbps
  • 21. Sinkhole Another option with the GSLB is to sinkhole all traffic from a specific region. If the attack is coming from zombies in China, you can point all of those clients to an unroutable address GSLB also allows ‘overrides’ to the GeoIP database, allowing you to return a different response for addresses in specific network ranges. This can be used to prevent known bots on some blacklist from reaching your sites
  • 22. Sinkhole Mitigation - DC Map plugins => { geoip => { maps => { geo_map => { geoip_db => GeoIPCity.dat, datacenters => [US-WEST, EU-WEST, EU-EAST, NULL], map => { EU => { NL => [ EU-WEST ], DE => [ EU-WEST ], PL => [ EU-EAST ], default => [ EU-WEST, EU-EAST ] }, NA => { default => [ US-WEST ] } }
  • 23. Identify and Classify Attackers nets => { #Bogons 10.0.0.0/16 => [ NULL ], 127.0.0.0/8 => [ NULL ], #China 1.80.0.0/13 => [ NULL ], 1.192.0.0/13 => [ NULL ], 1.202.0.0/15 => [ NULL ], #Autogenerated list of attackers below }, },
  • 24. Adapt DNS results sent to Attackers resources => { prod_www => { map => geo_map service_types => default dcmap => { US-WEST => 192.0.2.1, EU-WEST => [ 192.0.2.4, 192.0.2.5, 192.0.2.6 ] EU-EAST => { lb01 => 192.0.2.2, lb02 => 192.0.2.3 }, NULL => 127.0.0.2, } } } }
  • 25. Whack-a-mole If you have various geographically separated nodes, a less graceful approach I have used in the past ● All traffic is sent to node A and everything is fine ● Attack starts, and overwhelms node A ● GSLB kicks in and redirects new users to node B ● Attackers often only do an initial DNS lookups or cache the results, so they keep attacking node A for a while ● Attackers eventually migrate to node B ● GSLB shifts load to node C ● repeat ● Shift back to node A, which has since recovered
  • 26. Detecting an Attack In order to respond to an attack, you must first detect when you are under attack In our case this is especially important. With video streaming, it is not uncommon for our servers to see very large sudden spikes in traffic; this does not necessarily indicate an attack. Even a large spike of incoming HTTP requests from diverse sources does not presage an attack. We host an advertising network that is used on CBS / CBSSports.com TechRepublic.com, CollegeHumor.com and various others. A large news event can drive a sudden surge of traffic.
  • 27. Business Rules What is an expected increase in traffic, and what is an not? Is it an attack or just a surge? For video streaming, does the traffic level correspond to the viewer count (outbound) or repeater count (inbound)? If not, this may be a sign of an attack False positives would be a very bad thing, so extra care must be taken here
  • 28. Implementation - Traffic Level service_types => { netif => { plugin => "extmon", timeout => 5, cmd => [ "/usr/local/libexec/nagios/check_snmp_int.pl", "-H", "%%IPADDR%%", "-n", "em0", "-fkBM", "-w", "500,500", "-c", "640,640", "-d", "300", "-2", "--64bits", "-C", "public", "--label" ] } }
  • 29. Implementation - Business Rule service_types => { viewers_vs_bw => { plugin => "extmon", timeout => 5, cmd => [ "/usr/local/libexec/nagios/check_ddos", "--viewers", "http://%%IPADDR%%:8086/connectioncounts", "--bandwidth", "-H %%IPADDR%%", "--avgout", "2000" ] } }
  • 30. Going Forward ● Implement Flow Analysis - automatically add source addresses that match known attack fingerprints to the ‘NULL’ class ● Increase adoption of EDNS0-Client-Subnet so that addresses of zombies can be more easily identified. May require mitigation measures to prevent L2DoS ● Consider additional factors and business rules to more accurately identify attack conditions and attack sources
  • 31. Podcasts BSDNow.tv is a weekly video podcast featuring News, Interviews and Tutorials about the BSD family of Operating Systems. Hosted by Kris Moore (founder of PC-BSD) and Myself. TechSNAP.tv is a weekly sysadmin video podcast covering an OS agnostic range of security and production issues of interest to those working , studying or interested in the field.