140 likes | 166 Views
Learn about various types of DoS attacks, vulnerabilities, psychology of attackers, legal issues, and how to respond effectively. Get insights on incident response planning, network engineering, and security measures to mitigate risks.
E N D
Understanding, Planning For, and Responding To Denial of Service Attacks Barrett Lyon blyon@netpr.com Robert Brown rjb@netpr.com SANS 2001
Types of attacks Flood-based Crash-based Difficult problem Network Engineering Information Security Psychology Denial of Service Attacks – The Game
Denial of Service Attacks – The Game • Vulnerability management (or lack thereof) • Psychology aspect – what is the attacker trying to accomplish? • Legal liability and negligence issues
Denial of Service Attacks – The Game • Attacker compromises multiple hosts and configures DDoS clients • Attacker utilizes hosts to flood the Internet pipe of your organization • Most commonly use ICMP, UDP, and TCP SYN floods • New paper measuring attacks shows 4000 DoS attacks per week
Overview of TheShell.com • ISP specializing in Unix shell accounts • Most users utilize the IRC chat network • IRC is a magnet for attack • At least one attack per day and 19 serious attacks in a 1 year period
Planning for the Attack – Training Camp • Developing an incident response plan is key • All players must be identified, brought on board, and taught their assignments • Network Engineering • Information Security • Internet Service Provider
Planning for the Attack – Training Camp • Create a form with complete contact information, network information, and responsibilities • Ensure ISP engineering contacts are established – this is extremely important!
Planning for the Attack – Training Camp • Have a packet sniffer ready to go • Ensure that a SPAN port is available on your Internet-facing switch • Map existing traffic patterns • Implement bandwidth limiting filters at your ISP • Implement ISP-side filters for other traffic you don’t want/need
Playing the Game • Identify that you are under attack • MRTG, syslog, flow logs, Intrusion Detection, Firewall logs, sniffers • Identify deviation from normal traffic • Determine intent of attacker • Immediately look for ICMP pings and traceroute packets – the attacker usually will try to determine if the attack is working
Playing the Game • Climb the ladder • Port/Service • Host IP stack • Local segment (switches/routers) • Border router • ISP router
Playing the Game • Take system offline • Ask ISP to null route IP or group of IPs • Develop local filters to push the traffic up the ladder (and farther away from you) • Implement local filters at your border router • Ask your ISP to implement the same filters on their side of the link
Sample ISP Contact Policy • TheShell.com • Qwest Communications • NOC : 1-800-860-1020 Press: 1,#,2,2 • IP Team : 888-795-0420 • Tony : 408-555-6677 • Tony Cell : 703-455-6677 • CORE : 98765432 • ACCT : 44566789 • Circuit : 1234567890 • email : support@qwestip.net • : cmc1@qwest.com
Conclusion • Nobody wins this game • No easy solution to the problem • Best defense lies in organization and policy
Contact: Robert Brown Vice President rjb@netpr.com Barrett Lyon Security Consultant blyon@netpr.com Network Presence, LLC 6033 W. Century Blvd., Ste 400 Los Angeles, CA 90045 310-412-8607