TLP WHITE Denial of service attacks: what you need to know TLP WHITE Contents Introduction..................................................................................................................................................... 2 What is DOS and how does it work? ................................................................................................................ 2 DDOS ............................................................................................................................................................... 4 Why are they used? ......................................................................................................................................... 5 Take action ...................................................................................................................................................... 6 Firewalls, antivirus and updates ...................................................................................................................... 6 Use specialised equipment .............................................................................................................................. 6 Seek advice and share experience ................................................................................................................... 6 1 TLP WHITE Introduction Denial of service (DOS) attacks and distributed denial of service (DDOS) attacks are disrupting business and costing the UK immeasurable amounts of revenue from disrupted services and follow-on attacks. This paper will explain what is meant by DOS/DDOS and how this type of attack works, examine why an attacker might choose to launch such an attack and the effect that it might have. Finally, some general guidelines will be provided that may help to mitigate any DOS attacks. What is DOS? A denial of service attack, often referred to as a “DOS” attack, is a method of stopping a website or service from running. The outcome of this may be causing a website to stop displaying content, or preventing a system that operates on the Internet from working properly. DOS attacks can range in duration and may target more than one site or system at a time. It becomes a distributed DOS, referred to as “DDOS”, when the attack comes from multiple computers (or vectors) instead of one, as is the case in DOS. A server, or anything connected to the Internet, works by passing data to and from multiple devices in a network, known as nodes. However, each node can only handle a certain amount of traffic – the amount of data being passed between nodes. This happens millions of times a second on the Internet1 but when traffic gets busy, data rates slow down. A good example of this is ‘Black Friday’ or ‘Cyber Monday’, where millions of people attempt to buy gifts online but can be greeted with error messages rather than the webpage they expect to see. This is because the amount of traffic is too great for the host to handle and so it simply can’t serve each user. There needs to be a two-way communication in order for the customer to be able to interact with the website, but the host has stopped responding because its resources are being completely used up by others. 1 http://scoop.intel.com/what-happens-in-an-internet-minute/ 2 TLP WHITE The communication between (for example) a laptop and a website is happening in the background without the user’s interaction. There are many ways devices communicate on the Internet2, and this means that there are many different ways in which an attacker can disrupt these services. Many different types of DOS/DDOS attacks exist, all working for slightly different purposes, but the goal is always to ‘deny the service’, by overloading it. How does it work? When a user clicks to load a webpage, a ‘three-way handshake’ begins between the user and the server hosting the webpage, much like making a phone call. A user ‘calls up’ the webpage to initiate a conversation; the webpage answers (“hello?”) and the user responds (“hello, it’s…[name]...”), after that the two participants can converse freely, knowing that each party is active. The diagram shows this handshake between computer and server annotated with their associated flag (SYN and ACK, standing for synchronise and acknowledge). The flags are what is actually communicated by the devices. This process is happening millions of times a day for more popular sites and so the servers that host those sites are designed to handle lots of traffic. A small independent company’s website however, might be hosted on a server that can’t handle as much traffic. 2 http://computer.howstuffworks.com/internet/basics/internet.htm 3 TLP WHITE The SYN flood The three way handshake can be maliciously manipulated in order to create an excessive amount of traffic for the server. An attacker can repeatedly send out the first step to initiate the handshake (SYN) but then not respond to the server once it communicates back (SYN-ACK). Because the server is waiting for the third step (ACK) it is using up resources. When the server then receives what it thinks is another user trying to start a conversation it dedicates a small amount of resources to keeping that session open. If this step is repeated thousands of times then the server is making room for thousands of sessions but with no one actually using them. The attacker continues to create traffic until the server can’t handle any more resulting in no legitimate users being able to log on. Failure to connect to a website can be for any number of legitimate reasons, the Internet connection may have temporarily dropped for example, but this will persist in the event of a DOS attack. The message seen by most is ‘ERROR 404 PAGE NOT FOUND’ and this is the computer telling the user that, because it has not been able to complete the handshake with the desired service, it is unable to display the content. The attack described here, known as a SYN flood, is only one example of many different types of attack. Other types of DOS/DDOS have the purpose of creating an overload for a system. In the SYN flood it is an overload of processing when trying to deal with the amount of traffic. There are many different types of data protocol3 used on the Internet which, in turn, can be used to form different types of flood attack. Other attacks can overload the bandwidth of a network, which is the amount of data that can be sent and received. DDOS A DDOS attack differs in that a malicious actor can attack from different sources using multiple devices, known as attack vectors, in order to bring down the victim site or server. This makes DDOS more suitable to attackers who want to deny more sophisticated services to sites that may be hosted on multiple servers, such as an email application. Because more computing power will be required in order to create a successful attack, multiple computers will be used, though they might not necessarily belong to the attacker. In what would be only a small part of a complicated attack, the DDOS would be controlled by the attacker’s machine but using (potentially hundreds) of other machines via the Internet. These extra machines would have been infected with malicious software4 previously and specifically so that they could be remotely activated to launch an attack and the computer’s owner won’t even know that it is being used in a DDOS attack. 3 4 http://computernetworkingnotes.com/osi-layer-modals/osi-model.html https://www.cert.gov.uk/resources/best-practices/an-introduction-to-malware/ 4 TLP WHITE Once a computer is infected with malware so it can be used in a DDOS, the machine is then referred to as a ‘zombie’ and a network of zombie machines is known as a botnet5. Why are they used? It is illegal to launch a DOS or DDOS attack, but their use has increased in the UK6. While the criminal aspect of these attacks is apparent to many, the motivation is not always clear. Several high profile attacks occurred in 2014, notably the raised profile of the Lizard Squad hacking group that brought down Sony and Microsoft gaming services on Christmas Day7, the reason for which one alleged member stated was “for laughs”8. Denying an Internet service could have severe consequences for many different types of organisation. In 2007 and 2010 respectively, Estonia and Burma suffered DDOS attacks from a botnet known as Conficker 9 . Both attacks used so many machines that Burma was almost entirely cut off from the Internet for more than ten days ahead of an election. Estonia suffered compromised financial institutions and government communications networks were forced to use radio for a brief period. $100,000 per hour Creating an overwhelming amount of traffic Estimated potential cost of a DDOS attack can also be a cover for a different type of cyber-attack altogether. An investigation after a DOS attack will examine the logs that automatically collect data about connections to and from servers. The DOS will create many thousands of logs thus making the real attack vector extremely difficult to find. Committing a DOS/DDOS attack however is not difficult. An Internet search will detail step by step guides for those with even limited technical ability, and for those with none, it is possible even to pay for an attack, with costs dependant on duration and ranging from minutes to weeks. A company may even be contacted and then ransom the return to normal service. In 2013, almost 30% of reported DDOS attacks cost their victims in excess of $100,000 per hour10. Many DDOS attacks are not even politically or commercially motivated but rather a personal test of skill to the hacker or even a show of force. In 2000, a 15-year-old Canadian boy brought down the world’s most popular search engine and several other websites including Amazon and Yahoo causing an estimated $1.7bn in damages. In February 2014, what was thought to be the biggest DDOS attack in history targeted the content delivery network of online security company, Cloudflare11. This attack utilised a major timing protocol using a tool that was found in hacking circles only six months prior to the event. 5 https://www.cert.gov.uk/wp-content/uploads/2014/08/An-introduction-to-malware.pdf http://www.techweekeurope.co.uk/workspace/ddos-attacks-akamai-154110 7 http://www.theguardian.com/technology/2015/jan/02/sony-christmas-playstation-network-hack-discountspsn-lizard-squad 8 http://uk.businessinsider.com/why-hacker-gang-lizard-squad-took-down-xbox-live-and-playstation-network2014-12 9 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cybercrime-full-report.pdf 10 http://www.neustar.biz/resources/whitepapers/ddos-protection/2014-annual-uk-ddos-attacks-and-impactreport.pdf 11 http://arstechnica.com/security/2014/02/biggest-ddos-ever-aimed-at-cloudflares-content-deliverynetwork/ 6 5 TLP WHITE Mitigation advice It is important to note that some companies legitimately offer services of DOS/DDOS attacks for network testing purposes. The simulation of attacks can help to find weaknesses and test responses and business continuity plans. While this may not be proportionate for small and medium enterprises, there are other defences that may be suitable. Firewalls, antivirus and updates CERT-UK recommends the use of an appropriate firewall and antivirus software (which should be updated regularly). New vulnerabilities are constantly being discovered and so a system’s defences are only as good as the day they were updated. A culture of safety and good housekeeping should be encouraged as per the UK government’s ’10 Steps to Cyber Security’12. Think about your servers Smaller companies might lease servers to host their business platform. Whether this is the case or not, consideration should be made to the configuration of servers and it should be clearly stated what resources an application can access and how the server will respond to requests from clients. Not only does strong configuration of servers help to reduce the risk from other cyber-attacks, it may actually ensure continued service during some types of DDOS attack13. Use specialised equipment A DOS attack often utilises legitimate traffic and so badly designed firewalls will allow all the traffic through because the firewall itself is only concerned with content and not quantity. Intrusion detection systems (IDS) can provide a capability to detect when valid protocols are being used as an attack vehicle and IDS, in conjunction with firewalls, can also monitor traffic levels and automatically block certain traffic. Specialised equipment can often require installation and monitoring by trained professionals and it is possible to procure services for business needs. It is important however that these needs be scaled in line with the business risk linked to the website or service you are trying to protect and independent advice should be sought. Seek advice and share experience Network defence can be a daunting prospect to understand. DOS is just one of many threats to businesses in the UK and globally. CiSP contains groups and spaces where users can share and receive information about specific vulnerabilities and events, such as DOS/DDOS attacks. Members can post in forums and request advice and help from the community while sharing experiences. 12 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/73129/12-1121-10-stepsto-cyber-security-advice-sheets.pdf 13 http://www.computerworld.com/article/2564424/security0/how-to-defend-against-ddos-attacks.html 6 TLP WHITE Summary DOS attacks are a significant threat to many online services that are used every day and can cost businesses significant amounts in lost revenue. They can often be a cover for a different kind of cyber-attack, most notably theft from networks. Organisations of all sizes, including small and medium sized enterprises, should take this threat seriously and are recommended to follow the mitigation advice in this paper. With greater cyber awareness and better working practices, the threat from DOS attacks can be reduced and make the UK a safer place in which to be online. 7 TLP WHITE www.cert.gov.uk @CERT_UK A CERT-UK PUBLICATION COPYRIGHT 2014 © 8
© Copyright 2026 Paperzz