Thursday, 23 February 2012

Doing your best to dodge a DDoS.

Sources: (Carnegie Mellon Software Engineering Institute Article, Computerworld Article, EarthWeb Article, Secure Dynamic White Paper, The Encyclopedia of Computer Security Article)

Coping with a distributed denial-of-service (DDoS) attack, like the one that MyDoom executed on The SCO Group Inc.'s Web site, continues to be a major challenge for companies. If a DDoS attack is large enough, there are no silver bullet tactics to protect your systems. Familiarize yourself with precautions to take in order to prevent smaller attacks, and be aware of the resources available to help cope with larger ones.

Types of DDoS Attacks

In a distributed denial of service attack, systems that have been compromised by a hacker are used to attack a single target. The aim is to make the attacked system incapable of performing its regular service functions. There are a number of different methods used to conduct a DDoS attack. Here are the main ones:

 Type of        What Happens                   Suggested Fix Attack  The Ping of    Formerly a long-standing       No modern operating Death          problem with UNIX systems.     system should have                Occurs when the attacker       this problem.                creates an IP packet that                exceeds the standard maximum                byte size (fat packet). When                this packet arrives, it                crashes systems that are                using a vulnerable                TCP/IP stack.  The Teardrop   An old attack still seen       Today, most systems Attack         today that works by            can deal with                interfering with how stacks    Teardrop, and                reassemble IP packet           firewalls can block                fragments. This attack         teardrop packets.                relies on poor TCP/IP                implementation.  SYN Flood      When two Internet-aware        You can set your                applications start a work      firewall to block all                session, there is a protocol   incoming packets from                handshake that has to take     bad external IP                place. This attack works by    addresses.                overwhelming that handshake.  Smurf Attack   Internet Control Message       Set your firewall to                Protocol (ICMP) echoes a       ignore ICMP requests                particular type of ping        and your router to                packet that overwhelms your    ignore broadcast                router. Each packet's          addressing.                destination IP address is                spoofed to be your local                broadcast address.  UDP (User      When the victim system         Block all non-service Diagram        receives a UDP packet from     UDP services requests Protocol)      an attacker, it will           for your network. Flood          determine what application                is waiting on the                destination port. When it                realizes that there is no                application that is waiting                on the port, it will                generate an ICMP packet of                destination unreachable to                the forged source address.                If enough UDP packets are                delivered, the system will                go down.  Source: EarthWeb 

Action Plan

Listed below are some options and resources that will help you deal with DDoS attacks.

1. Take proactive steps. Do what you can to prepare your systems for smaller, more common types of attacks. Here are some measures that you can take:

* Revisit security basics. Make sure you have a firewall set-up that aggressively keeps everything out except legal traffic. Keep your anti-virus software and security patches up to date.

* Set aside extra server processing capacity and network bandwidth. Ensure your systems will be more capable of dealing with sudden surges in Internet traffic. Keep in mind that implementing extra server processing capacity to handle an attack can be quite costly and might make more sense for larger companies only.

* Purchase a back-up domain name. Purchase this domain name prior to an attack because having it allows you to swiftly retreat and park your Web site at this back-up address while an attack plays out. Post a notice on your site that informs users of the temporary move.

* Distribute Web servers geographically. This allows for normal traffic to be redirected to other servers even if one network segment is taken down by an attack.

* Negotiate with your ISP. Require your Internet service provider (ISP) to offer some sort of guarantee against DDoS attacks--they are in a better position than you are to detect and choke off traffic directed at a specific IP address. Include DDoS protection language into your service-level agreements with data center hosting companies and ISPs.

2. Investigate service providers. The following companies offer solutions that help protect your systems from DDoS attacks.

* Network-level defenses that detect and stop floods:

* Riverhead.

* Arbor Networks.

* Mazu Networks.

* Captus Networks.

* Host-level defenses that detect and stop handler/agent installation:

* Tripwire.

* McAfee Entercept.

3. Keep yourself current on DDoS developments. Keep the following resources at hand, to help you fight the war against DDoS attacks.

* This resource from the University of Washington provides links to analyses and discussions on attack tools, defense tools, advisories, mitigation, plus much more.

* By signing up with DDoS World, you will receive incident alerts, article announcements, searched archived results, and be able to view past survey results.

* Contact security organizations, or emergency response teams at the CERT Coordination Center or SANS Institute, to report and request assistance after a system compromise.

* This list of other CERT resources will also be useful:

* "Trends in Denial of Service Attack Technology."

* "Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues."

* Papers on the topic of Survivability, which are best practices that involve making computers and networks more resilient in the face of an attack.

Bottom Line

Stay on top of the latest news and developments in an effort to minimize your exposure to DDoS attacks. Although there isn't much that can save you from large DDoS attacks, there is plenty of information out there that will assist you in protecting your organization from smaller attacks.

Want to Know More?

* "MyDoom Lesson: Take Proactive Steps to Prevent DDoS Attacks," Computerworld.

* "What is a Distributed Denial of Service (DDoS) Attack and What Can I Do About It?" Carnegie Mellon Software Engineering Institute.

* "Understanding and Preventing DDoS Attacks," EarthWeb.

* "10 Proposed 'first-aid' security measures against Distributed Denial of Service Attacks," Secure Dynamic Whitepaper.

* "Distributed Denial Of Service: Protecting Critical Systems," The Encyclopedia of Computer Security.

No comments:

Post a Comment