Demystifying DDoS As A Service
Demystifying DDoS As A Service
The authors present a Abstract resource is due to the fact that a single interaction
measurement study of 17 with the target requires an unusually high amount
different DaaS providers, In recent years, we have observed a resur- of resources in order to be processed. For exam-
in which they analyzed gence of DDoS attacks. These attacks often ple, on a web site, there might be a search form
exploit vulnerable servers (e.g., DNS and NTP) that, when provided with certain values, might
the different techniques
to produce large amounts of traffic with little require an extremely large database query that
used to launch DDoS effort. However, we have also observed the slows the whole website to a crawl. We call this
attacks, as well as the appearance of application-level DDoS attacks, kind of attack an asymmetric application-level or
infrastructure leveraged which leverage corner cases in the logic of an intensive DDoS.
in order to carry out the application in order to severely reduce the avail- While extensive DDoS attacks have been
ability of the provided service. In both cases, studied for quite a while [1] and some remedia-
attacks. Results show
these attacks are used to extort a ransom, to tion has been provided (e.g., coordinated filter-
a growing market of hurt a target organization, or to gain some tac- ing managed by blacklists, rate limiting, patching
short-lived providers, tical advantage. As it has happened for many of of vulnerable services), intensive DDoS attacks
where DDoS attacks are the components in the underground economy, have not received the same level of attention.
available at low cost (tens DDoS has been commoditized, and DDoS as a The latter is more difficult to characterize because
service (DaaS) providers allow paying customers they often depend on the logic of the applica-
of dollars) and capable of
to buy and direct attacks against specific targets. tion providing the target service. In addition, these
easily disrupting connec- In this article, we present a measurement study attacks do not rely on large volumes of data and
tions of over 1.4 Gb/s. of 17 different DaaS providers, in which we ana- therefore can go undetected by volumetric detec-
lyzed the different techniques used to launch tion mechanisms. Finally, since the attacker com-
DDoS attacks, as well as the infrastructure lev- municates with the service following the service
eraged in order to carry out the attacks. Results protocol, the attacker’s requests are similar to a
show a growing market of short-lived providers, legitimate request and hence more difficult to fil-
where DDoS attacks are available at low cost ter out.
(tens of dollars) and capable of easily disrupt- As both extensive and intensive DDoS attacks
ing connections of over 1.4 Gb/s. In our study, become an integral part of the efforts of cyber-
particular attention was given to characterize criminals to obtain financial gains (e.g., by black-
application-level (HTTP) DDoS attacks, which mailing organizations under attack or by obtaining
are more difficult to study given the low volume a tactical advantage in time-sensitive settings), the
of traffic they generate and the need to study provision of DDoS service has become commod-
the logic of the application providing the target itized. We now see the rise of DDoS as a service
service. (DaaaS) offerings, in which DDoS providers attack
a target in exchange for money.
Introduction
Distributed denial of service (DDoS) attacks Background
have been a problem on the Internet for more In this section we introduce the different types of
than 15 years. However, the recent increase in DDoS attacks available, as well as the basic infra-
the number of DDoS attacks and in the amount structure of the DaaS providers, which are the
of traffic that they generate has attracted the subject of our study.
attention of the media, the industry, and the
research community alike. This new wave of Types of DDoS Attacks
attacks exploit asymmetries in vulnerable ser- A DDoS attack can be extensive or intensive. An
vices to generate large amounts of traffic or use extensive attack relies on high volumes of traffic
large amounts of resources with relatively little that by itself is harmless. A malicious actor needs
effort from the attacker. For example, misconfig- a considerable amount of resources to success-
ured Network Time Protocol (NTP) services can fully execute an extensive attack, as it is costly
be leveraged to generate gigabytes of data with to generate enough traffic volume to impact a
a simple spoofed request. This generated traffic large target. Examples of these attacks include
exhausts the bandwidth available at the target. SYN flood, UDP flood, reflected Domain Name
We call this type of (more traditional) attack an Service (DNS), and reflected NTP.
extensive DDoS. In most extensive attacks, miscreants may
However, there is another type of DDoS use a technique called amplification. Leveraging
attack in which the lack of availability of a amplification, the attacker continuously abuses a
Digital Object Identifier: Ali Zand, Christopher Kruegel, and Giovanni Vigna are with the University of California, Santa Barbara; Gaspar Modelo-Howard is with Symantec;
10.1109/MCOM.2017.1600980 Alok Tongaonkar is with RedLock; Sung-Ju Lee is with KAIST.
set of hosts that responds to a request with a con- able on the Internet, providing cheap access to
siderably larger response that is delivered to the both extensive and intensive DDoS attacks. Using
destination of the attacker’s choosing. Previous a subscription-based model, the providers’ fees
studies have shown that this amplification factor range between $2 and $15 for basic packages.
differs according to the used protocol and can They support different payment mechanisms,
be as high as 4670. These types of attacks have ranging from traditional online systems like PayPal
achieved throughputs as high as 500 Gb/s and to the Bitcoin electronic currency and anonymous
affected enterprises with large infrastructures such payment systems like Paysafecard. The basic
as Sony PlayStation Network, Cloudflare, and sev- packages allow launching attacks for 60--90 s and
eral U.S. banks. currently produce attack volume peaking at more
Intensive attacks, on the other hand, target than 1.4 Gb/s. More expensive packages are also
specific weaknesses in a target application. Any available, which provide longer attack periods
request (or request access pattern) that takes a and subscription terms. The same sets of exten-
considerably larger amount of resources on the sive and intensive DDoS attacks are available for
server than the client can be leveraged to per- all subscription packages.
form this attack. These vulnerabilities can be due Figure 1 shows a diagram of the infrastructure
to problems like memory leaks and long running used by DaaS providers to offer their pay, point,
processes that never free their resources. Most and click service. The diagram includes the pay-
cases of intensive attacks target HTTP servers, ment platform used (phase 1, pay), as well as the
given their popularity on the Internet. Examples components used by the providers to launch a
include submitting data to web forms found on DDoS attack (phase 2, point and click). As shown
the victim server, at very slow rates (one byte in the diagram, intensive attacks are launched
at a time), and opening multiple connections using dedicated servers, since only a small set
that are kept alive by sending partial packets. of hosts is required and software needs to be
These examples have been implemented by the installed to interact with the logic of the web
R-U-Dead-Yet? (RUDY) and Slowloris tools [2], application under attack. Botnets and misconfig-
respectively. Also worth noting is that intensive ured hosts are commonly used when launching
attacks only send legit packets, not malformed the volumetric, extensive attacks.
ones, making the resulting traffic appear legiti- A common trait found in DaaS providers is the
mate, complicating their detection by security usage of anti-DDoS service providers to protect
systems. their web platforms. As many of them claim to be
only used to stress test the resources owned by a
Basic Scenario for a DDoS as a Service Providers customer, the providers include DDoS protection
The continued rise of DDoS attacks as a way to mechanisms in their infrastructure.
target the online presence of organizations can Given the shady nature of the business, DaaS
be attributed to several factors. One possibility is providers are not particularly dependable ser-
that these attacks are often conducted through vices. In our study, we found them to have a short
botnets, which often encompass thousands of life span (compared to legitimate online services),
computers. Pools of vulnerable computers are measured in weeks to months. Of the 17 provid-
always available, given the constant discovery of ers identified and tested, only 7 were functional
software bugs. at the end of our three-month evaluation. Addi-
Another possible factor for the rise of DDoS tionally, those providers that were functional deliv-
attacks is the commoditization phenomenon that ered an average of only 44 percent of the offered
these types of attacks have seen in the last few services. We also found several systems provided
years. A large number of DaaS providers are avail- intermittent service.
Extensive attacks
SSDP ü ü ü 1/1
ZSSYN 1/1
Website ü 1/1
Intensive attacks
Not working
KS (û) 0/1
No. Attacks 0/6 2/2 3/7 10/17 0/8 5/12 0/2 0/5 0/9 2/4 4/11 1/3 2/5 10/12 3/12 5/5 12/15
trast, a passive fingerprinting method observes the rest of the machines were not identified. The high
traffic originating from the target host and deter- occurrence of Linux hosts and non-spoofed IP
mines its type by looking for patterns that identify addresses suggests that DaaS providers depend-
a particular operating system or application. ed on machines that use popular OSs, such as
Our findings show that 81.5 percent of the dedicated servers and Internet of Things devices,
non-spoofed IP addresses belonged to Linux to successfully launch attacks. In terms of prox-
machines and 12.5 percent to Windows hosts; the ies used by the providers, we found that they
employed proxies in very small numbers, as only that were not working when we first accessed offer additional attack
0.76 percent of the non-spoofed addresses were them started working after three months. methods or an increase
identified as proxies, anonymizing VPN service or 13 out of the 17 tested providers claimed to in the intensity of the
TOR exit node. IP2Location also provided infor- support intensive DDoS attacks, but when we
mation on addresses identified as proxies, validat- tested them, only five successfully executed one attacks.
ing 92 percent of our results. or more types of application layer DDoS attacks.
Through the four runs of experiments launch- Out of the 17 DaaS providers tested, only 7 were
ing intensive attacks, we found few cases of IP still working after we finished our study.
address sharing among providers. Most did not
share any addresses, and in the cases were they Payment Methods
did, it was in very low numbers (1 to 5 address- The most popular payment methods used by the
es). This suggests the appropriation or exclusive DaaS providers were the popular online payment
control of the machines by each DaaS. WRA was system PayPal and the Bitcoin digital currency.
the only exception to this, sharing 5223 addresses Other methods found included the payment plat-
with DES, thanks to exploiting a high-risk vulnera- forms Google Wallet, Paysafecard (which allows
bility [7] on WordPress servers that was publicly anonymous transfers), Payza (transfers using
reported during our runs. The vulnerability did email), and Skrill (focused on low-cost trans-
not provide a mechanism for attackers to control fers). During the tests, three of the providers had
who could exploit these servers, thus leaving the their Paypal accounts deactivated and could not
opportunity for sharing. receive money.
Table 5 shows the number of IP addresses DaaS providers offered multiple subscription
reused by BIG and WRA during our experimental options for their services at different prices. For
runs, as these were the only providers that gen- 10 providers, a higher price only means a longer
erated non-spoofed traffic in all four executions. period of attack and longer-term subscriptions. In
The diagonals in the table show (in bold italic) the other words, they did not offer additional attack
total number of IP addresses used by each DaaS methods or an increase in the intensity of the
in a single run. From our experiments, both pro- attacks.
viders had to continuously add new machines to We evaluated GRI, one of the four provid-
their networks, as many of the IP addresses from ers that claimed better throughput and addition-
an attack execution would not be found in the al methods of attacks, to observe the difference
next. As an example, BIG showed 122 addresses between the cheap and more expensive options.
in the first run, but only 66 (54 percent) of those This DaaS was chosen as it offered the most pow-
would be present in the second run. The attacker erful attack, and in terms of throughput, pricing
needs to constantly find new machines, which is was cheaper than other DaaS ($50, compared
not always trivial. From the second to the third to up to $300 in the case of RAG), and offered
run, BIG went from 82 to 37 IP addresses, and a different class of attack. Results show that the
only two of those were new. In the case of WRA, more expensive service gives access to two VIP
the 21,573 different addresses found in the fourth servers (servers that regular accounts do not have
run correspond to web servers exhibiting the access to) at the same time (and therefore able to
high-risk vulnerability to WordPress, as discussed execute two concurrent attacks). The amount of
above. traffic generated and the list of offered attacks by
each VIP server were not different from its cheap
Operational Stability service.
Given the shady nature of their business, DaaS
providers are not particularly dependable services. Related Work
Our study found them to have a short life span Research on the analysis of existing DDoS attack
(compared to legitimate online services), mea- vectors [8–11] has focused on the resources avail-
sured in weeks to months. This was supported by able on the Internet that can be used to launch
the fact that 11 of the 28 DaaSs identified failed DDoS attacks. Particularly, researchers have
to provide any service, while several of the other studied the amplification effect produced from
DaaSs briefly disappeared during the different using certain network services on the impact from
executions. Only seven of the 17 DaaS were func- using botnets to create DDoS attacks. Our work
tional for all four runs, while four were successful- complements previous research by providing an
ly used in three runs and one DaaS was available unabridged analysis of the new vector available to
in two runs. Additionally, 3 of the 11 providers attackers: application-level, intensive DaaS.
TIT 35 10 22 45.7% 48.6% 5.7% 0 China and U.S. host 45% and 22.9%, respectively
Table 4. Geographical distribution of the IP addresses for each of the DaaS providers that generated intensive attacks. The table
also includes for each provider: the number of ASNs involved, the type of network to which the addresses where connected,
and the number of proxy servers identified.