Ddos Handbook Online PDF
Ddos Handbook Online PDF
7-12 $2.3M
HOURS $5,600 TO
median downtime average per minute $4M
caused by a DDoS of downtime average cost of
attack a DDoS attack
As technology evolves, so do DDoS attacks. And attackers are continually using these types of
attacks to achieve their objectives. This guide will help IT pros understand everything from the
basics of detection to tools for combatting attacks, along with the skills one needs to develop to
prepare for cybersecurity incidents of this kind.
Raging IT Warfare:
What Is a DDoS Attack?
DDoS stands for distributed denial-of-service attack. DDoS attacks occur when servers and
networks are flooded with an excessive amount of traffic. The goal is to overwhelm the website
or server with so many requests that the system becomes inoperable and ceases to function.
Botnets, which are vast networks of computers, are often used to wage DDoS attacks. They are
usually composed of compromised computers (e.g., internet of things (IoT) devices, servers,
workstations, routers, etc.) that are controlled by a central server.
DDoS attacks can also originate from tens of thousands of networked computers that are not
compromised. Instead, they are either misconfigured or simply tricked into participating in a
botnet, in spite of operating normally.
Master Attack
(C&C) Server
Wrangler
C&C Traffic
Recruitment Traffic
Heartbeat Traffic
“Beaconing”
Attack
Traffic
Attacked
Systems
Recruitment Botnet
DDoS Guide for IT Pros 4
Gathering Intel:
Why You Need to Know
About DDoS Attacks
DDoS attacks have become increasingly problematic and IT pros need to be ready.
• DDoS attacks are becoming more common. In the first part of 2019 alone, TechRepublic saw a
whopping 967% increase in volumetric attacks designed to clog networks and deny access to
resources.
• The sheer size of these attacks has increased to overwhelming proportions. InfoSecurity
reports that the average attack grew in size by 500% in 2018 alone. This figure got worse in 2019,
and 2020 data is showing us that the problem is not abating on its own.
• Attacks have become more sophisticated. They’re not limited to layer 3-level attacks. Attackers
have developed massive application-layer attacks, as well. Neustar reported that 77% of all the
attacks mitigated in Q1 2019 used two or more vectors.
• DDoS attackers have adopted sophisticated artificial intelligence (AI) and machine learning
methods. For example, DDoS botnets apply machine learning methods to conduct sophisticated
network reconnaissance to find the most vulnerable systems. They also use AI to reconfigure
themselves at times to thwart detection and change attack strategies. Modern attacks will likely
manifest as, both defenders and attackers pit AI-informed systems against each other.
• DDoS attackers have adopted a blended attack strategy. They combine various attack methods
with social engineering, credential stealing and physical attacks, making the DDoS attack only a
single factor in a multifaceted approach.
Even though automation, orchestration and AI are now commonplace, humans are still the ones
that make final decisions on how to defend companies.
500 %
THE AVERAGE
ATTACK GREW
IN SIZE BY
DDoS Guide for IT Pros 5
Attack Strategy:
Two Types of DDoS Attacks
There are two primary ways a DDoS attack can take form.
Bombardment Technological
(volumetric) Infection
This strategy involves a coordinated attack In this strategy, attackers manipulate applications.
on the targeted system from a collective of They are often called Layer 7 attacks, because
devices. Another term for this type of attack is attackers and botnets co-opt applications to do
volumetric, coined as such because of the sheer their bidding. These applications then become
volume of network traffic used to bombard unwitting DDoS attack vectors.
systems. This type of traffic focuses on Layer 3 This could involve using IoT-connected devices –
of the open systems interconnection/reference such as baby monitors, phones or hubs – to
model (OSI/RM), for the most part and is usually send traffic at the target. This strategy can be
measured in packets per second (PPS) or more easily understood when you think of the
megabits per second (Mbps). Borg, assimilating others against their will to be
Volumetric attacks can be long term or burst: part of a larger system of attackers.
• Long-Term Attack: An attack waged over Layer 7 attacks can also disable critical web and
a period of hours or days. cloud applications on a massive scale. Today, more
companies are using microservices and container-
• Burst Attack: Waged over a very short
based applications. Layer 7 DDoS attacks are also
period of time, such as a minute or even
increasingly popular against cloud-based resources;
a few seconds.
simply migrating to a cloud provider won’t solve
Despite being very quick, burst attacks can still the problem.
be extremely damaging. With the advent of
As the world moves to containers, Kubernetes
IoT-based devices and increasingly powerful
and more cloud-based services, it’s expected that
computing devices, it is possible to generate
DDoS attack methods will naturally move to and
more volumetric traffic than ever before. As a
exploit these elements.
result, attackers can create higher volumes of
traffic in a very short period of time. This attack
is often advantageous for the attacker because it
is more difficult to trace.
Strategic Gaps:
How Vulnerabilities are Created
DDoS and other attacks arise as a result of three vulnerabilities: monocultures, technical debt and
system complexity.
1. Monocultures: The first vulnerability is created because of our interest in automating and
replicating systems. In this age of the cloud and hyper-virtualization, it is a common practice for IT
departments to create once and deploy often. This means that once you have created a particular
service, such as an Amazon Web Services (AWS) workspace, or a web server, you will replicate it
and use it multiple times. This creates a monoculture, or a situation where dozens, or even hun-
dreds, of the same instance exists.
Attackers focus on these types of situations because they can exploit a small vulnerability to
achieve maximum damage. This is ideal for attackers because one piece of malware can be used
to target many systems.
Replicated
Single Workspace
2. Technical Debt: Companies often skip development steps as they implement a new business
solution – a piece of software, a cloud implementation or a new web server. The IT industry long
ago identified critical steps that organizations should take to create secure software and services.
But these steps take time. Too often, organizations neglect security best practices in the interests
of saving time and money.
Whenever a company skips essential steps, they are said to incur a technical debt. The resulting
software represents an obligation that the organization eventually needs to re-pay. If an organization
doesn’t pay this debt back by fixing the software or properly configuring and securing a critical
service, that organization will suffer consequences that range from lost business to becoming the
target of a successful cyberattack.
DDoS Guide for IT Pros 8
One example of technical debt can be found in IoT devices that have powerful networking ability,
but no default password. As a result, attackers have been able to easily enlist these devices into
their botnets or other DDoS schemes. What makes this situation particularly disturbing is that
consumers end up paying the price for a technical debt.
PASSWORD?
3. Complexity: Complex systems are difficult to manage and monitor, especially if these systems
are hastily created. Sophistication is often good and necessary, but as we create more interconnected
systems, this complexity can cause us to lose control of our information. In many cases, issues
occur because essential steps of the software development lifecycle or the platform development
lifecycle are skipped. It’s one thing to create buggy software, but when that software connects to
multiple cloud instances, it creates a larger, more scalable problem.
DDoS Guide for IT Pros 9
Plan of Attack:
The Anatomy of a Botnet Attack
DDoS traffic comes in quite a few varieties. Understanding the types of traffic will
help you select proactive measures for identification and mitigation.
1
Command and Control (C&C)
A botnet administrator (i.e., wrangler) uses a central server or network of
servers to control the thousands of members of the botnet. Whenever a
wrangler issues a command to control the botnet, this is called Command
and Control (C&C) traffic. The actual administrator is usually far removed
from the botnet or C&C server, and the network traffic is usually spoofed,
often making detection difficult.
2
Coordination
The most effective DDoS attacks are highly coordinated. The best
analogy for a coordinated attack involves comparing a DDoS botnet to
a colony of fire ants. When a fire ant colony decides to strike, they first
take a position and ready themselves for the attack. Acting under a
single directive and without obvious warning, they wait for the signal
and then act simultaneously.
3
Beaconing/Heartbeat Traffic
Whenever a compromised system calls home to a C&C server, it is said
to be beaconing. This traffic passing between a botnet member and its
controller often has specific, unique patterns and behaviors. As a result,
it is possible for security analysts to identify this traffic and treat it as
a signature. If this is the case, analysts can then identify compromised
systems, as well as manage or block this type of traffic and even trace
this traffic to isolate and eradicate botnet infections.
DDoS Guide for IT Pros 10
4
Attack Traffic
• TCP: In a DDoS attack of this variety, the attacker capitalizes on a
vulnerability in the TCP connection. Sometimes that vulnerability exists due
to weak or completely non-existent encryption. Normally, a client sends a
SYN packet, the server responds with an ACK and the client returns the ACK packet. This
communication verifies a connection. An attacker can spoof IP addresses and send a
connection request that is never acknowledged, leaving a port open for response. Continued
sending of SYN packets compromises all open port connections, disabling the server.
• UDP: UDP packets are often sent to servers in normal computing. Each time a UDP packet is
sent, the server must use resources to process the request. When large amounts are sent at
one time, the server becomes overwhelmed and is unable to process legitimate traffic.
• ICMP: ICMP is utilized for diagnostic purposes on networks. During an attack, ping requests
flood the servers with illegitimate traffic so that the server can no longer process legitimate
requests.
• Layer 7: Many modern attacks use floods of (HTTP) GET and POST traffic. They also focus
on vulnerabilities found in various servers, including Apache and NGNIX servers. This type
of DDoS traffic is often measured in requests per second (RPS). A common example of this
type of attack is the age-old Slowloris attack.
• Amplified: DDoS attackers, including botnets, often take advantage of legitimate service
and protocol behaviors. For example, attackers often use ICMP traffic and NTP servers to
amplify attacks.
5
Operational Technology (OT)/IoT
• OT: This involves physical items that have programming and an IP address
associated with them. This could be devices such as those that are used
to control electrical grids, pipelines, automobiles, drones or robots.
• IoT: These devices contain individual systems that can communicate
with one another or be integrated. Some examples include video
doorbells, smart thermostats, smart watches, IP-enabled light bulbs
and printers.
6
Memcached
Memcached is an often-used service that distributes memory caching
on multiple systems. It is used to help speed up websites by caching
information in Random Access Memory. Botnets have often exploited
Memcached implementations that are not properly secured.
DDoS Guide for IT Pros 11
7
Unusual Traffic
Atypical traffic involves using strategies such as reflection and amplification.
• Reflection: Sending traffic through devices, or reflectors, to divert
attention away from the attacker’s systems.
• Amplification: Occurs when the botnet sends traffic through devices,
which respond normally while multiplying the outgoing traffic to
compromise the target.
8
Monoculture
A collection of similarly configured systems that all contain the same flaw.
Here are some examples of compromised monocultures:
• Decades ago, the creators of the Melissa and I Love You worms realized
that the Windows systems of that era were identical and open to a
particular type of attack. They created malware to manipulate the flaw.
• In more recent times, IoT devices such as webcams and baby monitors,
have created monoculture conditions that led to the Mirai botnet. Other
IoT devices create potentially dangerous monoculture conditions which
are vulnerable to DDoS attacks.
• The 2010 Stuxnet incident in Iran is another example of a monoculture
attack. Iranian centrifuges all fell victim to the Stuxnet worm, damaging
the SCADA system responsible for processing their nuclear fuel
processing plant.
9
Multivector
Modern attacks combine different attack strategies, including Layer 7,
volumetric and even ransomware. In fact, these three attack types have
become something of a trifecta in the DDoS attack world.
DDoS Guide for IT Pros 12
Assembling Weaponry:
Tools for Understanding
How Botnets Work
Botnets are often used as malicious tools to help conduct the work of a DDoS attack. It’s essential
that IT pros equip themselves with the knowledge of how that occurs to help them stay ahead of
the onslaught.
There are two models that can help provide insight:
• Lockheed Cyber Kill Chain: This model outlines seven steps a hacker might take to conduct
a long-term persistent DDoS attack. This model does not account for the use of botnets to
compromise systems.
• Mitre ATT&CK Model: This model profiles real-world attacks and inventories those into a
collective of information to help IT pros analyze and prevent future incidents. This model is
particularly useful to individuals who wish to defend themselves against DDoS attacks because
it allows you to profile attackers and identify their strategies.
As an IT pro, knowing how to approach a DDoS attack is of vital importance. Security analysts and
threat hunters often use the ATT&CK model and the Mitre ATT&CK Navigator to help identify botnets.
It is very likely that your organization may have to deal with an attack of one variety or another.
DDoS Guide for IT Pros 13
Client Mothership
Fast-flux bot
DDoS Guide for IT Pros 17
Missile Launched:
Tools That Perform DDoS Attacks
Attackers use several devices to target organizations. These are some common tools
for DDoS attacks:
Botnets: Collections of
compromised systems
commonly used in DDoS
attacks.
Misconfigured Systems:
Modern or older equipment
and services that are open to
attack. One issue currently
IoT Devices: Weaknesses in found in cloud-based platforms
connected devices can be is the lack of proper asset
exploited by hackers. The discovery. This problem leads
infamous Mirai botnet was to many (sometimes forgotten)
utilized to launch a series systems that are vulnerable to
of attacks. DDoS attacks or susceptible to
becoming part of a botnet.
DDoS Guide for IT Pros 19
• Dumpster diving: Attackers make use of • End points: Can be vulnerable if configured
scavenged documents taken from the trash. poorly.
Sensitive information can easily be obtained • Monocultures: Exploiting a monoculture can
by sifting through organizational and individual yield extensive damage with a smaller amount
trash, particularly that of a high-profile person. of effort.
• Organizational activity: Attackers use building A common name given to indirect recon is
activity to gain physical recon. By monitoring open-source intelligence (OSINT). Indirect
who comes and goes and what time they reconnaissance tools do not leave the same
routinely enter and exit, hackers can gain traces as active tools.
access to protected physical space and
computing equipment.
Network Profiling
Attackers can use techniques like ping and port scan to uncover network vulnerabilities and utilize
AI-driven scans to detect weaknesses they can exploit. This can vary by existing network conditions
and is constantly evolving.
DDoS Guide for IT Pros 20
Tools for
Cybersecurity
Awareness
Censys
A site similar to Shodan.
IVRE
A site similar to Shodan.
DDoS Guide for IT Pros 21
Modern Warfare:
The Role of AI in DDoS Attacks
There are multiple resources for IT pros to gain information about cyber threats.
3 RESOURCES FOR
CYBER THREAT DETAILS
Threat
Feeds
Multi-Engine - The FBI’s InfraGard Portal
Sites
Homeland Security’s
Automated Indicator
Sharing
-VirusTotal -AegisLab
- SANS: Internet Storm
-VirSCAN -Jotti
Center
-Malwarebytes
CVE
Feeds
- CVE List
- National Vulnerability Database
DDoS Guide for IT Pros 22
Target Identified:
What Do DDoS Attackers Target the Most?
Certain systems are particularly vulnerable to DDoS attacks. Attackers will target the following
devices in an attempt to gain control of your network.
• End Points: This includes equipment such as mobile devices, workstations and servers –
anything that is connected to your network.
• ISP/Cloud Providers: Because these providers service many companies, they are often a target
of DDoS attacks.
• Operational Technology: When the goal is to target infrastructure, OT often comes under
attack.
• Social Media: Instagram and Facebook have both been the target of attacks affecting access
for all platform users.
SECTORS MOST
VULNERABLE
TO DDoS
ATTACKS:
HEALTH CARE
GOVERNMENT
INTERNET SERVICE PROVIDERS (ISPs)
CLOUD SERVICE PROVIDERS
DDoS Guide for IT Pros 24
DDoS Response
and Mitigation
Preparation and quick response are of vital importance when
facing a DDoS attack. Knowing what to look for and where to
find information can help you mitigate damage.
DDoS Guide for IT Pros 25
Tool Description
Security Information and Event Many SIEM products exist, including AlienVault, Splunk
Management (SIEM) software Enterprise Security and RSA NetWitness.
DDoS Guide for IT Pros 27
Tactically, IT professionals spend considerable time tracing spoofed traffic to its actual source.
Here are some commonly used applications:
Angry IP Scanner
DDoS Guide for IT Pros 28
A Defense Strategy:
DDoS Response
Cloudflare DDoS Protection Layer 3, 4, and 7 services for free, as well as more
sophisticated services for a fee.
A Coordinated Defense:
Best Practices for DDoS Response
Use the steps in the following table to prepare for a DDoS attack.
2 Identify vulnerable assets Identify key endpoint and server assets, including the following:
• Traditional installed services
• Cloud services
• Data centers
• Infrastructure servers (e.g., DNS and dynamic host configuration protocol
(DHCP).
• Business-critical servers: web, customer relationship management (CRM),
AI, machine learning, streaming, data collection and so forth. It may also
be necessary to outline all business-critical applications running on your
web servers.
3 Information backup Have full copies of mission-critical information to allow your organization
to reduce mean time to recovery and mean time to respond.
4 ISP backup Larger organizations will want to have multiple ISPs ready in case one
becomes flooded with traffic or can’t provide an essential filtering service
in time. Another option is obtaining a third-party scrubbing service that
filters out DDoS traffic.
5 Server and endpoint backup It is important to back up server resources, as well as workstations and
other devices.
6 Risk analysis A DDoS preparation scheme will always identify the risk involved when
specific resources become compromised.
7 Identify and assign responsibility The last thing an organization wants to do is assign responsibility for DDoS
response during or after an actual attack. Assign responsibility before an
attack happens.
8 Practice Never assume that an untested set of procedures is adequate. In the same
way an untested backup is no backup at all, an untested DDoS response
plan is no plan at all.
DDoS Guide for IT Pros 32
A Coordinated Defense:
Best Practices for DDoS Response
When dealing with a DDoS attack, there are certain best practices that can help keep a situation
under control. Observe these DDoS attack do’s and don’ts.
IT Pro Skills
and Tools
As an IT pro, you can take steps to help ready yourself for a DDoS
attack. Check out the following skills and tools that can help you
successfully manage an incident.
DDoS Guide for IT Pros 34
Attack Basics:
The Skills You Need to Manage
DDoS Attacks
Employers will want to know that you are armed with the skills necessary for combatting a DDoS
attack. Adding these skills to your toolset will help illustrate your ability to thwart attacks.
RANSOMWARE
DDoS
BROWSER-BASED THREAT
DDoS Guide for IT Pros 36
CySA+
Download the exam objectives for the above CompTIA exams to see what’s covered and decide
which one is right for you.
DDoS Guide for IT Pros 37
Terms to Know
TCP: Transmission control protocol DNS: Domain Name System TCP handshake: A three-step
process that occurs whenever two
UDP: User Datagram Protocol OSI/RM: Open Systems
computers communicate with each
Interconnection/Reference Model
ACK: Acknowledgement packet other at the beginning of a TCP
Incident response: Steps to take session. Also known as the TCP
SYN: Synchronize packet
when managing a DDoS attack. three-way handshake.
ICMP: Internet Control Message
SYN Flood: Where an attacker
Protocol
manipulates the three-way TCP
HTTP: Hyper Text Transfer Protocol handshake to create a DDoS attack.