janna hilferty version 1 - usenix · janna hilferty @warjanna. rule #1: every internet-connected...

63

Upload: others

Post on 26-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:
Page 2: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

c

Janna Hilferty Version 1.0

The Anatomy of a DDoS

Janna HilfertyDevOps EngineerTwitter: @warjannaBlog: https://techgirlkb.guru

Page 3: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Janna Hilferty Version 1.0

TOC

What is a DDoS?

Botnets & Malware

IoT Threat Landscape

Attacks & the OSI model

Mitigation techniques

Prevention & Legislation

Q&A

Janna Hilferty@warjanna

Page 4: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS

Janna Hilferty@warjanna

Page 5: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS =Distributed Denial of Service

Janna Hilferty@warjanna

Page 6: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

A malicious attempt to disrupt normal traffic of a targeted server, service or network …

Janna Hilferty@warjanna

Page 7: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

… by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

- Cloudflare

Janna Hilferty@warjanna

Page 8: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Visualization of a DDoS - IPViking from Norse Corp Janna Hilferty@warjanna

Page 9: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Modern DDoS Examples

Janna Hilferty@warjanna

Page 10: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

1.3TB/s: Github Memcached Servers (2018)

Janna Hilferty@warjanna

Page 11: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Android-based WireX attacks (2017)

Janna Hilferty@warjanna

Page 12: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

1.1TB/s Mirai botnet attacks (2016)

Janna Hilferty@warjanna

Page 13: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Level 3/DynDNS attacks (2016)

Janna Hilferty@warjanna

Page 15: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS attackers may seek a ransom, revenge, secure data, or simply to disarm your business.

Janna Hilferty@warjanna

Page 16: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Janna Hilferty@warjanna

Page 17: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Cost of a DDoS

1 On average, the cost of a DDoS

attack for enterprises was $2 million, and the cost of a DDoS

attack for small and medium-sized

businesses (SMBs) was $120,000.

- Kaspersky 2017 study

Janna Hilferty@warjanna

Page 18: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Cost of a DDoS

1 On average, the cost of a DDoS

attack for enterprises was $2 million, and the cost of a DDoS

attack for small and medium-sized

businesses (SMBs) was $120,000.

- Kaspersky 2017 study

2 49% of DDoS attacks last between

6-24 hours, averaging $40,000/hr.

- Incapsula study

Janna Hilferty@warjanna

Page 19: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Cost of a DDoS

3 33% of respondents

acknowledged customer data theft, and 19% of respondents

suffered intellectual property loss.

- Incapsula study

Janna Hilferty@warjanna

Page 20: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Cost of a DDoS

3 33% of respondents

acknowledged customer data theft, and 19% of respondents

suffered intellectual property loss.

- Incapsula study

4 64% of respondents say reputation damage is the main consequence of

a denial-of-service attack. This is

followed by diminished productivity for IT staff (35%) and revenue losses

(33%).

- Ponemon Institute (Akamai

study)

Janna Hilferty@warjanna

Page 21: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Botnets & Malware

Janna Hilferty@warjanna

Page 22: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Botnet

Janna Hilferty@warjanna

Page 23: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Botnet = robot + network

Janna Hilferty@warjanna

Page 24: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Structure of a botnet

Bot herder

Page 25: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Structure of a botnet

Bot herder Malware

Janna Hilferty@warjanna

Page 26: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Structure of a botnet

Bot herder Malware Zombies

Janna Hilferty@warjanna

Page 27: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

IoT Threat Landscape

Janna Hilferty@warjanna

Page 28: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Janna Hilferty@warjanna

Page 29: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

LandscapeInternet of Things

The sphere of internet-connected devices is changing faster than regulation and security patches can keep up.

Janna Hilferty@warjanna

Page 30: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

LandscapeInternet of Things

The sphere of internet-connected devices is changing faster than regulation and security patches can keep up.

Implications:

● Security settings● Factory-default passwords● Peer-to-peer communications● Open ports● ‘Listening’ devices● Open databases/cloud drives

Janna Hilferty@warjanna

Page 31: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

LandscapeInternet of Things

The sphere of internet-connected devices is changing faster than regulation and security patches can keep up.

Implications:

● Security settings● Factory-default passwords● Peer-to-peer communications● Open ports● ‘Listening’ devices● Open databases/cloud drives

SANITY CHECKSWhen was the last time you checked your router, thermostat, wireless speakers, or smart doorbell for a security update?

Janna Hilferty@warjanna

Page 32: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Rule #1: Every internet-connected device is a potential entry-point for malware.

Janna Hilferty@warjanna

Page 33: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Rule #2: If you can install malware on it, an attacker can harness it to attack you & others.

Janna Hilferty@warjanna

Page 34: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

IoT + Malware = <3

Janna Hilferty@warjanna

Page 35: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Scanning for open ports

Janna Hilferty@warjanna

Page 36: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Click-fraud & spam

Janna Hilferty@warjanna

Page 37: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

The users of devices with malware are often completely unaware their device is being remotely controlled by the attacker.

R u a bot?

Janna Hilferty@warjanna

Page 38: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Attacks & the OSI Model

Page 39: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

The OSI model

Kind of like all the layers of an internet cake.

Janna Hilferty@warjanna

Page 40: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

1 - Physical Layer

Janna Hilferty@warjanna

Page 41: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

2 - Data Link Layer

Janna Hilferty@warjanna

Page 42: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

3 - Network Layer

Janna Hilferty@warjanna

Page 43: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

4 - Transport Layer

Janna Hilferty@warjanna

Page 44: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

5 - Session Layer

Janna Hilferty@warjanna

Page 45: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

6 - Presentation Layer

Janna Hilferty@warjanna

Page 46: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

7 - Application Layer

Janna Hilferty@warjanna

Page 47: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS and the OSI model

Most attacks happen on layers 3 (Network), 4 (Transport), and 7 (Application).

Layer 3 attacks: IP Spoofing, ICMP floods,

Packet sniffing

Layer 4 attacks: Syn floods

Layer 7 attacks: HTTP floods (botnets), DNS

poisoning, DNS amplification Janna Hilferty@warjanna

Page 48: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Mitigation Techniques

Page 49: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

The best mitigation is to protect against DDoS before it happens.

Janna Hilferty@warjanna

Page 50: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS mitigation: unprotected server

1

Unprotected origin server

Janna Hilferty@warjanna

Page 51: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS mitigation: unprotected server

1 2

Unprotected origin server

Attacker identifies origin

server IP and sends traffic

Janna Hilferty@warjanna

Page 52: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS mitigation: unprotected server

1 2 3

Unprotected origin server

Attacker identifies origin

server IP and sends traffic

Firewall added, but attackers bypass (origin

already known)Janna Hilferty

@warjanna

Page 53: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS mitigation: unprotected server

1 2 3 4

Unprotected origin server

Attacker identifies origin

server IP and sends traffic

Firewall added, but attackers bypass (origin

already known)

Migration of origin server

requiredJanna Hilferty

@warjanna

Page 54: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS mitigation: protected server

1

Protected origin server

Janna Hilferty@warjanna

Page 55: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS mitigation: protected server

1 2

Protected origin server

Attack is deflected at the

firewall OR network soaks

attackJanna Hilferty

@warjanna

Page 56: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS mitigation: protected server

1 2 3

Protected origin server

Attack is deflected at the

firewall OR network soaks

attack

No downtime or migration

required - origin server remains

online. Janna Hilferty@warjanna

Page 57: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

DDoS Protection Services

01 | Managed WAF services

02 | Caching and CDN services

03 | In-server protection

Janna Hilferty@warjanna

Page 58: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Prevention

Page 59: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

What is action is being taken against DDoS attackers?

Janna Hilferty@warjanna

Page 60: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Legislation against DDoS

01 | Computer Fraud & Abuse Act (USA)

02 | Police & Justice Act (UK)

Janna Hilferty@warjanna

Page 61: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Legal Timeline

2015

Anonymous petitions White House to label DDoS as “free speech”

2016

Europol partnership against DD4BC

2017

FBI asks DDoS victims to come forward

2018

UK, US, Netherlands partner to take down webstresser.org

2019

FBI takes down 15 DDoS-for-hire websites

Interpol goes after users of webstresser.org

Mirai botnet creators assist FBI to take down new attackers

Janna Hilferty@warjanna

Page 62: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

Q&A

Janna Hilferty@warjanna

Page 63: Janna Hilferty Version 1 - USENIX · Janna Hilferty @warjanna. Rule #1: Every internet-connected device is a potential entry-point for malware. Janna Hilferty @warjanna. Rule #2:

c

Thank you.

Janna HilfertyDevOps EngineerTwitter: @warjannaBlog: https://techgirlkb.guru