countering syn flood denial of service dos attacks
play

Countering SYN Flood Denial-of-Service (DoS) Attacks Ross Oliver - PowerPoint PPT Presentation

Countering SYN Flood Denial-of-Service (DoS) Attacks Ross Oliver Tech Mavens reo@tech-mavens.com What is a Denial-of- Service (DoS) attack? ! Attacker generates unusually large volume of requests, overwhelming your servers ! Legitimate


  1. Countering SYN Flood Denial-of-Service (DoS) Attacks Ross Oliver Tech Mavens reo@tech-mavens.com

  2. What is a Denial-of- Service (DoS) attack? ! Attacker generates unusually large volume of requests, overwhelming your servers ! Legitimate users are denied access ! Can last from a few minutes to several days 2

  3. What is a SYN Flood? ! One kind of Denial-of-Service attack ! Simulates initial handshake of TCP/IP connection ! Web servers are particularly vulnerable 3

  4. Example SYN Flood Attack ! February 5 th – 11 th , 2000 ! Victims included CNN, eBay, Yahoo, Amazon ! Attacks allegedly perpetrated by teenagers ! Used compromised systems at UCSB 4

  5. Detailed Account of DDoS ! Gibson Research Corporation www.grc.com/dos/intro.htm ! May 4 th -20th, 2001 ! DDoS attack from 474 machines ! Completely saturated two T1s ! 13-year-old claimed responsibility 5

  6. Don’t Expect Outside Help ! GRC discovered: ! ISPs were unresponsive ! Law enforcement unable to help ! Under-age perpetrators have blanket immunity 6

  7. Normal TCP/IP Connection Initiation SYN SYN / ACK ACK Web surfer Web sever 7

  8. Unfinished TCP/IP Connection Initiation SYN SYN / ACK ??? Web surfer Web sever 8

  9. Web Server’s Table of Normal TCP/IP Connections Address Port State 192.168.3.16 80 ESTABLISHED 192.168.15.88 80 TIME_WAIT 192.168.3.94 80 ESTABILISHED 192.168.54.7 80 SYN 192.168.27.112 80 ESTABLISHED 192.168.4.23 80 TIME_WAIT 0.0.0.0 0 FREE 0.0.0.0 0 FREE 0.0.0.0 0 FREE 9

  10. Connections Table During SYN Flood Address Port State 192.168.7.99 80 SYN 192.168.7.99 80 SYN 192.168.7.99 80 SYN 192.168.7.99 80 SYN 192.168.7.99 80 SYN 192.168.7.99 80 SYN 192.168.7.99 80 SYN 192.168.7.99 80 SYN 192.168.7.99 80 SYN 10

  11. Why Defense is Difficult ! SYN packets are part of normal traffic ! Source IP addresses can be faked ! SYN packets are small ! Lengthy timeout period 11

  12. Possible Defenses ! Increase size of connections table ! Add more servers ! Trace attack back to source ! Deploy firewalls employing SYN flood defense 12

  13. Who Offers a Defense? ! PIX by Cisco ! Firewall-1 by Checkpoint ! Netscreen 100 by Netscreen ! AppSafe/AppSwitch by Top Layer 13

  14. Firewall-1 SYNDefender SYN SYN SYN / ACK ACK Web surfer FW-1 Web sever 14

  15. SYN Proxy SYN SYN / ACK ACK Web surfer Netscreen or Web sever AppSafe 15

  16. Measuring Effectiveness ! Create a realistic test environment ! Generate a SYN flood ! Measure how well each firewall keeps legitimate traffic flowing 16

  17. Test Configuration Attacker Test Firewall Hub Web Server Web Client 17

  18. Test Configuration ! Web Server: Linux (RedHat 7.2) " Apache web server ! Web Client: Windows 2000 " Script using wget to fetch web pages, measure response time ! Attacker: Linux (RedHat 7.2) " SYN flood generator 18

  19. Benchmark Results None 100 PI X 100 Firewall-1 500 Netscreen 14,000 AppSafe 22,000 1 10 100 1,000 10,000 100,000 Maximum SYNs per second 19

  20. Cisco PIX Results ! No significant difference over no firewall ! Large “embrionic” value allowed flood through to server ! Small “embrionic” value blocked both flood and normal traffic 20

  21. Firewall-1 Results ! Protected up to 500 SYNs/sec, but with degraded response time ! Above 500 SYNs/sec, web page requests failed ! Web server recovered to normal 3-10 minutes after attack ceased 21

  22. Netscreen 100 Results ! Protected up to 14,000 SYNs/sec with acceptable server response times ! Above 14,000, web server continued to respond, with increasing delays ! Response times recovered to normal immediately after attack ceased 22

  23. AppSafe Results ! Effective up to 22,000 SYNs/sec ! Maximum test setup could produce ! No measurable change in response time 23

  24. How Bad Can It Get? ! Theoretical maximums for attackers using: " Analog modem: 87 SYNs/sec " ISDN, Cable, DSL: 200 SYNs/sec " T1: 2,343 SYNs/sec " 474 hacked systems 94,800 SYNs/sec 24

  25. How Much Do You Need? ! Single firewall for attacker with single ISDN, DSL, or T1 ! Multiple parallel units for higher bandwidth ! “Transparent” mode permits rapid deployment 25

  26. Conclusion ! SYN floods are nasty ! Firewalls with SYN flood defense can successfully counter attacks ! Multiple or distributed attacks may require multiple parallel firewalls 26

  27. Acknowledgements ! PIX provided by Atebion, Inc. ! Netscreen 100 provided by Yipes Communications ! AppSafe provided by Top Layer Networks ! Information Warehouse! Inc. 27

Recommend


More recommend