DDoS Attack Handbook CSP.
DDoS Attack Handbook CSP.
Service Providers
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers
CONTENTS
NTP Amplification 10
UDP Fragmentation 11
UDP Flood 12
Ping Flood 13
DNS Flood 15
RST/FIN Flood 17
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 02
INTRODUCTION
Denial of Service (DoS) and Distributed Denial of Another factor is the Quality of Experience (QoE) that
Service (DDoS) attacks have plagued commercial consumers expect from their CSP. Sluggish response
and enterprise networks since early 1970. In terms of time is not appreciated and downtime is not tolerated.
damage to network infrastructure, service continuity To assure service availability and performance, CSPs
and business reputation, DoS/DDoS attacks have must take measures to protect against DDoS attacks
racked up some of the most successful cyberattacks that are designed to overwhelm network resources
to date. and deny service to legitimate users.
Historically, Communication Service Providers This DDoS Attack Handbook outlines the most
(CSPs) assigned low risk to their chances of being common attacks and their implications for CSP network
attacked and avoided taking protective measures, assets and business. For every attack, real customer
assuming they could dodge the DDoS bullet. Today, success stories demonstrate how Allot’s DDoS
technological advances have made it easier to Protection solution, powered by Allot DDoS Secure,
launch flooding attacks and to increase the scope of is helping CSPs establish a highly effective first line of
damage. CSPs can no longer afford to take a reactive defense against cyber threats.
approach that assumes, ”If it hasn’t happened to my
network, it probably won’t. And if it does, I’ll handle it
then.” Deferred action is no longer a viable option.
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 03
FIGHTING DDoS
WHAT IS A DDOS ATTACK? DETECTING AND MITIGATING STOPPING INBOUND AND OUTBOUND
TOMORROW’S ATTACKS THREATS
A Denial of Service (DoS) or Distributed Denial of
Service (DDoS) attack occurs when one or many Cybercriminals continually hone their methods While most DDoS Protection systems focus on
compromised (that is, infected) systems launch a and change their tactics, such that DDoS attacks inbound attacks, outbound DDoS that originates
flooding attack on one or more targets, in an attempt exceeding 100 Gbps are no longer uncommon. within the CSP network and attacks external targets
to overload their network resources and disrupt Often, there is no advanced warning or known can also exhaust network resources and impact QoE.
service or cause a complete service shutdown. signature for an attack, as cybercriminals leverage
the element of surprise to avoid detection and inflict Allot’s inline deployment protects equally against
NEUTRALIZING ATTACKS AS THEY OCCUR maximum damage before the CSP can figure out both inbound and outbound DDoS attacks.
what’s going on and respond. To protect service
Massive DDoS attacks can cause immediate service networks against today’s and tomorrow’s attacks, MULTILAYER DEFENSE STRATEGY WORKS
interruption. Effective protection must be able to service providers need a solution that can scale to BEST
detect the attack and act fast enough to thwart it, so match the ever-increasing volume and innovation of
there is little or no impact on the network and/or its these attacks. DDoS detection and mitigation solutions are a
hosted targets. Fast detection and mitigation is even first line of defense in stopping the attack and
more important when dealing with hit-and-run DDoS The patented Network Behavior Anomaly Detection assuring service availability. But what about quality
attacks that are designed to do maximum damage in (NBAD) technology inside Allot's DDoS Secure of experience? How can CSPs assure the delivery
just a few minutes and then disappear. enables CSPs to identify unknown (zero-day) attacks of critical applications at all times - even during an
which have never been seen before and mitigate attack. Or how can CSPs prevent individual users
Allot’s DDoS Protection solution, powered by Allot them in seconds. Allot's DDoS Secure runs on Allot’s who are generating abnormal volumes of traffic
DDoS Secure, detects and mitigates DDoS attacks multiservice platform, which provides scalable capacity (not an attack, per se) from eating up available
inline, on the spot, within seconds, leaving the CSP to detect and mitigate massive attacks coming in even bandwidth? With a multilayer approach and a
network and hosted targets unharmed. Allot’s inline at Terabits per second. Allot’s multiservice platform multiservice platform like Allot Service Gateway, CSPs
advantage and real-time detection makes the solution also provides granular policy management. This allows can combine proactive defense measures such as
highly effective even for fragmented DDoS attacks. CSPs to accurately block attack traffic and avoid false policy-based traffic shaping with the event-triggered
positives, and to trigger traffic shaping to assure user measures of DDoS mitigation.
Quality of Experience (QoE).
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 04
FIGHTING DDoS Allot Inbound DDoS Protection
1. Mitigate attacks in seconds
Eliminate congestion on costly transit links
ACCURATE VISIBILITY TO ASSESS
2. P
rotect the perimeter
ATTACK IMPACT
Prevent overload on routers, rewalls, load balancers
Memcached attacks are a type of User Datagram Protocol (UDP) reflected amplification
Attack pattern
attack which uses vulnerable memcached servers exposed on the Internet. The attacker first Attack pattern and matched traffic reported by Allot's
loads the memcached server database. It then sends requests over UDP, using a forged IP DDoS Secure management console
address (the target's), to thousands of memcached servers which are open on the Internet.
The servers respond by sending many UDP packets coming from source port 11211 to the
target. The potency of the attacks is due to memcached servers amplifying the target's
spoofed requests by a factor of 50,000.
In February 2018, before publication of the record-breaking memcached attack, Allot’s bi-
directional, inline DDoS Secure solution successfully detected and prevented such attacks
observed in multiple customer networks worldwide. Below is an example:
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 06
SYN FLOOD
WHAT IS A SYN FLOOD?
A SYN Flood, often generated by botnets, is the target system with SYN messages requesting to
Attack pattern
designed to consume resources of the victim initiate a connection between the source system Attack pattern and matched traffic reported by Allot's
server, such as firewall or other perimeter and the target system. The target responds with DDoS Secure management console
defense elements, in an attempt to overwhelm a SYN-ACK message for each SYN message it
its capacity limits and bring it down. The target receives and temporarily opens a communications
receives SYN packets at very high rates which port for the requested connection while it waits for
rapidly fill up its connection state table, resulting a final ACK message from the source in response
in disconnections, dropping of legitimate traffic to each SYN-ACK message. The attacker never
packets, or even worse – element reboot. sends the final ACK and therefore the connection
is never completed. The temporary connection will
SYN Floods exploit the TCP (Transmission Control eventually time out and be closed, but not before
Protocol) three-way handshake process to wreak the target system is overwhelmed with incomplete
havoc. The attack floods multiple TCP ports on connections accumulated in its state table.
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 07
HTTP/S FLOOD
WHAT IS A HTTP/S FLOOD ATTACK?
HTTP (and its encrypted form HTTPS) is a The devices are coordinated to send multiple GET
transport protocol for browser-based Internet requests for image files or some other asset from
requests, commonly used to load webpages the target web server. The flood of HTTP requests
or to send form content over the Internet. In depletes the server resources until denial of service
an HTTP/S flood attack the attacker exploits occurs for requests coming from legitimate users.
seemingly-legitimate HTTP GET or POST An HTTP flood can also be launched by sending
requests to attack a web service or application. multiple POST requests which will trigger intensive
These attacks often utilize many botnets such as processing on the server and will saturate server
infected IoT devices. resources even more quickly.
Attacker Botnets HTTP GET / index.php Web Server Learn how Allot
helped stop HTTP/S
Flood Attacks
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 08
TOS FLOOD
WHAT IS A TOS FLOOD?
In a TOS (Type of Service) Flood, attackers forge the ‘TOS’ field of the IP packet header,
Attack pattern
which is used for Explicit Congestion Notification (ECN) and Differentiated Services (DiffServ) Attack pattern and matched traffic reported by Allot
flags. There are two known types of TOS attack scenarios. In the first, the attacker spoofs ServiceProtector management console
the ECN flag, which reduces the throughput of individual connections thereby Allot's DDoS
Secure causing a server to appear out of service or non-responsive. In the second, the
attacker utilizes the DiffServ class flags in the TOS field to increase the priority of attack
traffic over legitimate traffic in order to intensify the impact of the DDoS attack.
Spoofed TOS
Service Provider Potential Risks
CSPs will see their services slow down or become
non-responsive due to reduced connection throughput
caused by the TOS forging. Applications like VoIP, that
Attacker require fast response time, will suffer dropped calls and
Attacker bad QoE due to attack traffic receiving higher DiffServ
priority than legitimate VoIP traffic.
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 09
NTP AMPLIFICATION
WHAT IS NTP AMPLIFICATION?
Attacker
NTP Server Target
Botnets
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 10
UDP FRAGMENTATION
WHAT IS UDP FRAGMENTATION?
Firewall is
overloaded, cannot
handle any new Service Provider Potential Risks
connections
Large fragmented UDP packets SP customers experience connectivity
C
issues as a result of attack traffic congesting network
resources.
Legitimate
cannot get through
Learn how Allot
Users helps VOO fight UDP
Fragmentation attacks
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 11
UDP FLOOD
WHAT IS A UDP FLOOD?
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 12
PING FLOOD
WHAT IS A PING FLOOD?
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 13
ACK FLOOD (OR ACK-PUSH FLOOD)
WHAT IS AN ACK FLOOD?
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 14
DNS FLOOD
WHAT IS A DNS FLOOD?
Attacker
Open DNS Target
Botnets
Resolver
Learn how Allot helps a
National Broadband Carrier
in Africa stop DNS Floods
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 15
AMPLIFIED DNS FLOOD
WHAT IS AN AMPLIFIED DNS FLOOD?
Victim
Attacker
Server
Attacker Controlled
Botnet
Learn how Allot
helps VOO stop
Amplified DNS Floods
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 16
RST/FIN FLOOD
WHAT IS A RST/FIN FLOOD?
Attacker
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 17
SSDP REFLECTED AMPLIFICATION ATTACK
WHAT IS AN SSDP REFLECTED
AMPLIFIED ATTACK?
Attack pattern
Simple Service Discovery Protocol (SSDP) is a network. Vulnerable devices such as home Attack pattern and matched traffic reported by Allot's
network protocol that enables universal plug routers, firewalls, printers, access points DDoS Secure management console
and play (UPnP) devices to send and receive and the like, with UPnP service open to the
information using UDP on port 1900. As an Internet (1900 UDP port) respond with UPnP
open and non-secure protocol, SSDP is an “reply” packets sent to the spoofed IP address
attractive and vulnerable target for launching of victim’s network. The result is an effective
DDoS attacks. Attackers use bot-infected thirty-fold (30X) reflected amplification of the
machines to send UPnP “discovery” packets DDoS attack.
with spoofed IP addresses from the victim’s
IPS/APT
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 18
IOT BOTNET ATTACK
WHAT IS AN IOT BOTNET ATTACK?
IoT botnets are created as hackers infect numerous Internet-connected (IoT) devices and recruit them
Attack pattern
to launch large-scale DDoS attacks that have been measured in Terabits/sec! These attacks are difficult Attack pattern and matched traffic reported by Allot's
to detect and mitigate because they use hit-and-run tactics that originate from numerous IoT vectors DDoS Secure management console
distributed across many locations – often worldwide.
IoT botnets utilize malware source code that was leaked in early 2015 and has been parlayed into many
variants. The most infamous of these is called “Mirai.” In a Mirai botnet attack, the attacker scans for
vulnerable IoT devices such as digital surveillance cameras, modems, and DVR players (with open L4
ports), and employs a sequence of known passwords to gain access. Once inside, the attacker downloads
the malicious code, which enables remote control of the device and the ability to recruit it for attacks.
Bot
Commander
Baby
Monitor
Hacker
Service Provider Potential Risks
Surveillance
Camera CSPs risk protracted service interruption due to server
Target outages that make critical DNS and other services
Infected Bot Home/Office unresponsive. Or worse, they risk a complete network
Routers outage.
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 19
LDAP AMPLIFICATION ATTACK
WHAT IS AN LDAP AMPLIFICATION ATTACK?
LDAP Amplification attacks leverage the Lightweight Directory Access Protocol (LDAP)
Attack pattern
which is used by Microsoft Active Directory and millions of organizations to verify Attack pattern and matched traffic reported by Allot's
username and password information and permit access to applications. The attacker sends DDoS Secure management console
small requests to a publicly available vulnerable LDAP server with open TCP port 389 in
order to produce large (amplified) replies, reflected to a target server. The attacker spoofs
the source IP address so that the request appears to have originated from the target server,
thereby making the LDAP server “reply” to the target. Attackers select the queries that will
yield the largest replies resulting in an effective fifty-fold (50X) amplification of the reflective
DDoS attack.
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 20
CLDAP REFLECTION ATTACK
WHAT IS A CLDAP REFLECTION ATTACK?
A CLDAP Reflection Attack exploits the CLDAP Reflection attacks are powerful (up to
Attack pattern
Connectionless Lightweight Directory Access 70X amplification) and of short duration (hit Attack pattern and matched traffic reported by Allot's
Protocol (CLDAP), which is an efficient and run) and often result in service outages. DDoS Secure management console
alternative to LDAP queries over UDP. They are also used as a diversion for backdoor
attacks that seek to obtain or compromise
Attacker sends an CLDAP request to a LDAP personally identifiable data in the LDAP
server with a spoofed sender IP address (the database (port 389).
target’s IP). The server responds with a
bulked-up response to the target’s IP causing
the reflection attack. The victim’s machine
cannot process the massive amount of CLDAP
data at the same time.
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 21
CHARGEN REFLECTIVE FLOOD
WHAT IS A CHARGEN REFLECTIVE FLOOD ATTACK?
The requests use the UDP protocol and the spoofed IP address of the target. The CHARGEN
service replies with tens of thousands of replies to the target. Since the protocol allows
replies of random size, there is an amplification factor which could potentially reach 1024X.
1 CHARGEN UDP request to CHARGEN service with target’s IP as source IP Learn how Allot
helped stop CHARGEN
CHARGEN service sends UDP replay to target
2
Reflective Flood Attacks
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 22
SNMP REFLECTED AMPLIFICATION ATTACK
WHAT IS AN SNMP REFLECTED AMPLIFICATION ATTACK?
Attack pattern
SNMP reflected amplification attacks leverage the Simple Network Management Protocol Attack pattern and matched traffic reported by Allot's
(SNMP) used for configuring and collecting information from network devices like servers, DDoS Secure management console
switches, routers and printers. Similar to other reflection attacks, the attacker uses SNMP
to trigger a flood of responses to the target. The perpetrator sends out a large number of
SNMP queries with a spoofed IP address (the target’s) to numerous connected devices that,
in turn, reply to that forged address.
The attack volume grows as more and more devices continue to reply, until the target
network is brought down under the collective volume of these SNMP responses. The
responses themselves can be greatly amplified and produce even higher traffic volumes.
The amplification factor can be as high as 1700.
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 23
TSUNAMI SYN FLOOD
WHAT IS A TSUNAMI SYN FLOOD ATTACK?
A SYN flood attack is a flood of multiple TCP SYN messages requesting to initiate a
connection between the source system and the target, filling up its state table and
exhausting its resources. The Tsunami SYN flood attack is a flood of SYN packets containing
about 1,000 bytes per packet as opposed to the low data footprint a regular SYN packet
would usually contain.
Since the TCP RFC puts no limitation on the amount of data that a SYN packet can carry,
hackers can add data and produce packets that are larger by a factor of 25.
© 2018 Allot Communications, Ltd. All rights reserved | DDoS Attack Handbook - Service Providers 24
DDoS ATTACK HANDBOOK
Service Providers
About Allot
Allot Communications Ltd. (NASDAQ, TASE: ALLT) is a provider of leading innovative network intelligence and security
solutions for service providers worldwide, enhancing value to their customers. Our solutions are deployed globally for
network and application analytics, traffic control and shaping, network-based security services, and more. Allot’s multi-
service platforms are deployed by over 500 mobile, fixed and cloud service providers and over 1000 enterprises. Our industry
leading network-based security as a service solution has achieved over 50% penetration with some service providers and is
already used by over 18 million subscribers in Europe. Allot. See. Control. Secure.
D265053 Rev.1
www.allot.com
© 2018 Allot Communications, Ltd. All rights reserved. Specifications subject to change without notice. Allot Communications and the Allot
logo are registered trademarks of Allot Communications. All other brand or product names are trademarks of their respective holders.