Countering SYN Flood Denial-of-Service (DoS) Attacks Ross Oliver - - PowerPoint PPT Presentation
Countering SYN Flood Denial-of-Service (DoS) Attacks Ross Oliver - - PowerPoint PPT Presentation
Countering SYN Flood Denial-of-Service (DoS) Attacks Ross Oliver Tech Mavens reo@tech-mavens.com What is a Denial-of- Service (DoS) attack? ! Attacker generates unusually large volume of requests, overwhelming your servers ! Legitimate
SLIDE 1
SLIDE 2
2
What is a Denial-of- Service (DoS) attack?
! Attacker generates unusually large
volume of requests, overwhelming your servers
! Legitimate users are denied access ! Can last from a few minutes to
several days
SLIDE 3
3
What is a SYN Flood?
! One kind of Denial-of-Service
attack
! Simulates initial handshake of
TCP/IP connection
! Web servers are particularly
vulnerable
SLIDE 4
4
Example SYN Flood Attack
! February 5th – 11th, 2000 ! Victims included CNN, eBay, Yahoo,
Amazon
! Attacks allegedly perpetrated by
teenagers
! Used compromised systems at UCSB
SLIDE 5
5
Detailed Account of DDoS
! Gibson Research Corporation
www.grc.com/dos/intro.htm
! May 4th-20th, 2001 ! DDoS attack from 474 machines ! Completely saturated two T1s ! 13-year-old claimed responsibility
SLIDE 6
6
Don’t Expect Outside Help
! GRC discovered: ! ISPs were unresponsive ! Law enforcement unable to help ! Under-age perpetrators have
blanket immunity
SLIDE 7
7
Normal TCP/IP Connection Initiation
Web surfer Web sever
SYN ACK SYN / ACK
SLIDE 8
8
Unfinished TCP/IP Connection Initiation
Web surfer Web sever
SYN ??? SYN / ACK
SLIDE 9
9
Web Server’s Table of Normal TCP/IP Connections
FREE 0.0.0.0 FREE 0.0.0.0 FREE 0.0.0.0 TIME_WAIT 80 192.168.4.23 ESTABLISHED 80 192.168.27.112 SYN 80 192.168.54.7 ESTABILISHED 80 192.168.3.94 TIME_WAIT 80 192.168.15.88 ESTABLISHED 80 192.168.3.16 State Port Address
SLIDE 10
10
Connections Table During SYN Flood
SYN 80 192.168.7.99 SYN 80 192.168.7.99 SYN 80 192.168.7.99 SYN 80 192.168.7.99 SYN 80 192.168.7.99 SYN 80 192.168.7.99 SYN 80 192.168.7.99 SYN 80 192.168.7.99 SYN 80 192.168.7.99 State Port Address
SLIDE 11
11
Why Defense is Difficult
! SYN packets are part of normal
traffic
! Source IP addresses can be faked ! SYN packets are small ! Lengthy timeout period
SLIDE 12
12
Possible Defenses
! Increase size of connections table ! Add more servers ! Trace attack back to source ! Deploy firewalls employing SYN
flood defense
SLIDE 13
13
Who Offers a Defense?
! PIX by Cisco ! Firewall-1 by Checkpoint ! Netscreen 100 by Netscreen ! AppSafe/AppSwitch by Top Layer
SLIDE 14
14
Firewall-1 SYNDefender
Web surfer Web sever
SYN ACK SYN / ACK
FW-1
SYN
SLIDE 15
15
SYN Proxy
Web surfer Web sever Netscreen
- r
AppSafe
SYN ACK SYN / ACK
SLIDE 16
16
Measuring Effectiveness
! Create a realistic test environment ! Generate a SYN flood ! Measure how well each firewall
keeps legitimate traffic flowing
SLIDE 17
17
Test Configuration
Attacker Test Firewall Web Client Web Server Hub
SLIDE 18
18
Test Configuration
! Web Server: Linux (RedHat 7.2)
" Apache web server
! Web Client: Windows 2000
" Script using wget to fetch web pages,
measure response time
! Attacker: Linux (RedHat 7.2)
" SYN flood generator
SLIDE 19
19
Benchmark Results
22,000 14,000 500 100 100 1 10 100 1,000 10,000 100,000 AppSafe Netscreen Firewall-1 PI X None Maximum SYNs per second
SLIDE 20
20
Cisco PIX Results
! No significant difference over no
firewall
! Large “embrionic” value allowed
flood through to server
! Small “embrionic” value blocked
both flood and normal traffic
SLIDE 21
21
Firewall-1 Results
! Protected up to 500 SYNs/sec, but
with degraded response time
! Above 500 SYNs/sec, web page
requests failed
! Web server recovered to normal
3-10 minutes after attack ceased
SLIDE 22
22
Netscreen 100 Results
! Protected up to 14,000 SYNs/sec
with acceptable server response times
! Above 14,000, web server
continued to respond, with increasing delays
! Response times recovered to
normal immediately after attack ceased
SLIDE 23
23
AppSafe Results
! Effective up to 22,000 SYNs/sec ! Maximum test setup could produce ! No measurable change in response
time
SLIDE 24
24
How Bad Can It Get?
! Theoretical maximums for
attackers using:
" Analog modem:
87 SYNs/sec
" ISDN, Cable, DSL:
200 SYNs/sec
" T1:
2,343 SYNs/sec
" 474 hacked systems 94,800 SYNs/sec
SLIDE 25
25
How Much Do You Need?
! Single firewall for attacker with
single ISDN, DSL, or T1
! Multiple parallel units for higher
bandwidth
! “Transparent” mode permits rapid
deployment
SLIDE 26
26
Conclusion
! SYN floods are nasty ! Firewalls with SYN flood defense
can successfully counter attacks
! Multiple or distributed attacks may
require multiple parallel firewalls
SLIDE 27
27