Jump to content

DDoS attack - What is it and can we do anything about it?


Recommended Posts

Posted

Hello :)

Let's see some basics about Ddos attack and what we can do about it...

Distributed Denial of Service Attack (DDoS) Definition

DDoS stands for “Distributed Denial of Service.” A DDoS attack is a malicious attempt to make an online service unavailable to users, usually by temporarily interrupting or suspending the services of its hosting server.

Unlike a Denial of Service (DoS) attack, in which a single Internet-connected device (one network connection) is used to flood targeted resource with packets, a DDoS attack is launched from numerous compromised devices, often distributed globally in what is referred to as a botnet.

DDoS attacks can be broadly divided into three types:

 

1)Volume Based Attacks

Includes UDP floods, ICMP floods, and other spoofed-packet floods. The attack’s goal is to saturate the bandwidth of the attacked site, and magnitude is measured in bits per second (Bps).

 

2)Protocol Attacks

Includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. This type of attack consumes actual server resources, or those of intermediate communication equipment, such as firewalls and load balancers, and is measured in Packets per second.

 

3)Application Layer Attacks

Includes low-and-slow attacks, GET/POST floods, attacks that target Apache, Windows or OpenBSD vulnerabilities and more. Comprised of seemingly legitimate and innocent requests, the goal of these attacks is to crash the web server, and the magnitude is measured in Requests per second.

 

Specific DDoS Attacks Types

Some specific and particularly popular and dangerous types of DDoS attacks include:

UDP Flood

This DDoS attack leverages the User Datagram Protocol (UDP), a sessionless networking protocol. This type of attack floods random ports on a remote host with numerous UDP packets, causing the host to repeatedly check for the application listening at that port, and (when no application is found) reply with an ICMP Destination Unreachable packet. This process saps host resources, and can ultimately lead to inaccessibility.

ICMP (Ping) Flood

Similar in principle to the UDP flood attack, an ICMP flood overwhelms the target resource with ICMP Echo Request (ping) packets, generally sending packets as fast as possible without waiting for replies. This type of attack can consume both outgoing and incoming bandwidth, since the victim’s servers will often attempt to respond with ICMP Echo Reply packets, resulting a significant overall system slowdown.

SYN Flood

A SYN flood DDoS attack exploits a known weakness in the TCP connection sequence (the “three-way handshake”), wherein a SYN request to initiate a TCP connection with a host must be answered by a SYN-ACK response from that host, and then confirmed by an ACK response from the requester. In a SYN flood scenario, the requester sends multiple SYN requests, but either does not respond to the host’s SYN-ACK response, or sends the SYN requests from a spoofed IP address. Either way, the host system continues to wait for acknowledgement for each of the requests, binding resources until no new connections can be made, and ultimately resulting in denial of service.

Ping of Death

A ping of death ("POD") attack involves the attacker sending multiple malformed or malicious pings to a computer. The maximum packet length of an IP packet (including header) is 65,535 bytes. However, the Data Link Layer usually poses limits to the maximum frame size - for example 1500 bytes over an Ethernet network. In this case, a large IP packet is split across multiple IP packets (known as fragments), and the recipient host reassembles the IP fragments into the complete packet. In a Ping of Death scenario, following malicious manipulation of fragment content, the recipient ends up with an IP packet which is larger than 65,535 bytes when reassembled. This can overflow memory buffers allocated for the packet, causing denial of service for legitimate packets.

Slowloris

Slowloris is a highly-targeted attack, enabling one web server to take down another server, without affecting other services or ports on the target network. Slowloris does this by holding as many connections to the target web server open for as long as possible. It accomplishes this by creating connections to the target server, but sending only a partial request. Slowloris constantly sends more HTTP headers, but never completes a request. The targeted server keeps each of these false connections open. This eventually overflows the maximum concurrent connection pool, and leads to denial of additional connections from legitimate clients.

NTP Amplification

In NTP Amplification attacks the perpetrator exploits publically-accessible Network Time Protocol (NTP) servers to overwhelm the targeted server with User Datagram Protocol (UDP) traffic. In an NTP amplification attack, the query-to-response ratio is anywhere between 1:20 and 1:200 or more. This means that any attacker that obtains a list of open NTP servers (e.g., by using tool like Metasploit or data from the Open NTP Project) can easily generate a devastating high-bandwidth, high-volume DDoS attack.

HTTP Flood

In HTTP flood DDoS attack the attacker exploits seemingly-legitimate HTTP GET or POST requests to attack a web server or application. HTTP floods do not use malformed packets, spoofing or reflection techniques, and require less bandwidth than other attacks to bring down the targeted site or server. The attack is most effective when it forces the server or application to allocate the maximum resources possible in response to each single request.

 

As more details emerge on last week's massive Dyn DNS DDoS, new analysis indicated as few as 100,000 Mirai IoT botnet nodes were enlisted in the incident and reported attack rates up to 1.2 Tbps.

That's a huge one !!!!

Most attacks are from 1Gbps up to 10Gbps and they are using the Wordpress xmlrpc vulnerability and a few other known methods....

So how we identify an attack and is there anything that we can do for it?

There is no a yes or no answer here to be honest but we can try and for me many times it works :)

So the easiest way for volumetric/layer7 attacks is to install dstat using for Centos:

yum install dstat

Then you can run it as:

dstat

and you will see something like this:

Untitled.png

 

That's a normal very low traffic close to none .....

When there is an attack you will see on the column recv a few MB's !

Untitled2.png

So what we can try to do to stop it?

BE VERY CAREFUL WITH THE BELLOW INFO AS YOU MAY LOCK YOURSELF AND YOUR USERS OUT OF THE SERVER IF YOU DO ANY MISTAKE !

First you can try to install fail2ban:

yum install fail2ban

Then create a Definition and a Jail for it.....There is no default info for this but Googling about it you will get an idea what to add there and how to...

Then restart fail2ban:

systemctl restart fail2ban

Then we can check our rule that is ok by running:

fail2ban-client status

You can verify the rules that were added by Fail2Ban in iptables using the following command:

iptables -L

Then you must use a .conf file to limit bots connections/requests and totaly block some known bad ones !

You should block also bad user agents .

Then you can limit connections and requests to Nginx like (Cloudflare is comingwith that option too very soon):

Connections 10

So if a user open 11 tabs in browser and refresh them all at the same time one will not opened .....

Requests 70

One connection can open many requests so let's limit that also.... You have an option for this also to use Burst up to x requests like 70 connections and burst up to 90 for example....

Other than that you can use some specialized AntiDDOS companies but that will not be cheap at all !

In general is very hard to deal with DDOS and can cost a lot of money so it is good to be prepared with anything that you can do from your side !

There are many more solutions and a lot more complex that i use also but that's a good start :)

Enjoy !

Posted

A very good way to catch a layer 7 attack, is to install ngxtop. 

More than 90% of the layer 7 attacks are from wordpress servers using the pingback function. Its very easy to stop those attacks. With nginx we just drop the connection if it receives a request with the user agent of Wordpress. With fail2ban we just block the IP.

Unfortunately, this last year i have dealt with many layer 7 attacks, but that solution saved my life.

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...