Monitoring	Reflective	DDoS
with	Honeypots
Terrence	"tuna"	Gareau
@kingtuna
Github.com/kingtuna
&
Krassimir T.	Tzvetanov
Introduction
Goals
“Reproducible	data	source	for	
DDoS targets	that	is	easy	to	
use	and	share	content”
Summary
Introduction
Problems	to	Solve
Architecture
Code
Problem
Problem
Problem
Problem
Problem
Problem
2.1 / DDoS Attack Vectors / As shown in Figure 2-1,
infrastructure attacks continue to dominate, increasing
2% from last quarter and accounting for 97% of all
DDoS attack activity. The large increases at the
infrastructure layer further diminished the percentage
of application layer attacks, which have decreased
slightly over time.
https://www.akamai.com/us/en/multimedia/documents/report/q4-2015-state-of-the-internet-security-report.pdf
• (AS) (Count)
• 6939 7034 HURRICANE - Hurricane Electric,Inc.,US
• 4134 6663 CHINANET-BACKBONE No.31,Jin-rong Street,CN
• 7922 3447 COMCAST-7922 - ComcastCable Communications,Inc.,US
• 16276 3161 OVH OVH SAS,FR
• 37963 2989 CNNIC-ALIBABA-CN-NET-AP Hangzhou Alibaba Advertising Co.,Ltd.,CN
• 200000 2272 UKRAINE-AS Hosting Ukraine LTD,UA
• 48347 2056 MTW-AS JSC MediaSoftEkspert,RU
• 4837 1950 CHINA169-BACKBONE CNCGROUP China169 Backbone,CN
• 58543 1940 CHINATELECOM-GUANGDONG-IDC Guangdong,CN
• 7018 1677 ATT-INTERNET4 - AT&T Services, Inc.,US
• 28573 1290 CLAROS.A.,BR
• 701 1216 UUNET - MCI Communications Services,Inc.d/b/a Verizon Business,US
• 23650 981 CHINANET-JS-AS-AP AS Number for CHINANET jiangsu province backbone,CN
• 5089 945 NTL Virgin Media Limited,GB
• 24940 940 HETZNER-AS Hetzner Online GmbH,DE
• 18881 936 Global Village Telecom,BR
• 20115 931 CHARTER-NET-HKY-NC - Charter Communications,US
• 5607 911 BSKYB-BROADBAND-AS Sky UK Limited,GB
• 13335 783 CLOUDFLARENET- CloudFlare,Inc.,US
• 1221 723 ASN-TELSTRA Telstra Pty Ltd,AU
Our	research	has	pointed	something	out
DoS	Evolution
Reflection	and	amplification
S:	191.236.103.221	D:	3.3.3.3
Size:	64	bytes
S:	3.3.3.3	D:	191.236.103.221
Size:	512	bytes
Attacker
Victim
Victim
Attacker
Reflector
Reflector
20	Million
Open DNS Resolvers According to Open Resolver Project (10.15.2015)
Needles	are	No	Longer	in	Haystacks
There	is	about	3.7	Billion	Active	IPv4	
Addresses	
How	many	have	misconfigured	
services?
It	takes	about	8	hours	to	scan	the	
Internet	for	a	particular	service	on	a	
$10	VPS
Scanners
Appear	as	a	Victim,	Become	Exploited,	and	Log
What	Services	we	support
PORT Service Provide
19 CHARGEN x
7 Echo x
5353 MDNS x
1434 Mssql
5351 NAT-PMP x
111 Portmapper x
27960 Quake
520 RIP
5093 Sentinal x
161 SNMP x
1900 SSDP x
9987 TeamSpeak3, x
7778 UnrealTournament
177 XDMCP x
500 IKE x
69 TFTP
Architecture
Sensors	->	Message	Bus	->	Data	Store	->	
Visualize
Sensor AMQP Elasticsearch
Understand	the	Current	State
Collaborate
EMAIL
Message
Bus
Evaluate	Different	Risks
Basics
• Ubuntu	14.04LTS
• Installs	via	Bash	Script
• Runs	Xinetd,	Bind9,	NTPD,	Emulators
• Logs	with	BRO
• Ships	logs	with	logstash via	AMQP
• Receive	and	index	in	elasticsearch with	Logstash via	AMQP
• Visualize	with	Kibana
Simple	Sketch
Simple	Sketch
SSL AMQP
Bro
Logstash
Logstash
Bro
Parse	this	Nice	and	Easy	with	this.
Parse	this	Nice	and	Easy	with	this.	
input	{
#Production	Logs#############################
file	{
type	=>	"BRO_connlog"
path	=>	"/nsm/bro/logs/current/conn.log"
}
#	BRO_connlog	######################
if	[type]	==	"BRO_connlog"	{
grok	{
match	=>	[	"message",	
"(?<ts>(.*?))t(?<uid>(.*?))t(?<id.orig_h>(.*?))t(?<id.orig_p>(.*?))t(?<id.resp_h>(.*?))t(?<id.resp_p>(.*?))t(?<proto>(.*?))t(?<service>(.
*?))t(?<duration>(.*?))t(?<orig_bytes>(.*?))t(?<resp_bytes>(.*?))t(?<conn_state>(.*?))t(?<local_orig>(.*?))t(?<missed_bytes>(.*?))t(
?<history>(.*?))t(?<orig_pkts>(.*?))t(?<orig_ip_bytes>(.*?))t(?<resp_pkts>(.*?))t(?<resp_ip_bytes>(.*?))t(?<tunnel_parents>(.*?))"	 ]
}
}
Parse	this	Nice	and	Easy	with	this.	
output {
rabbitmq {
user => "USER"
exchange_type => "direct"
password => "PASSWORD"
exchange => "amq.direct"
vhost => "/amp"
durable => true
ssl => true
port => 5671
persistent => true
host => "hose_ip"
}
}
Same	on	the	Other	End
On	the	other	end	of	it,	where	elasticsearch	 is	being	hosted,	set	the	input	as	amqp	and	
set	the	output	to	be	elasticsearch.	
We	found	it	best	to	use	the	node	type	in	logstash	for	inserting	 logs	into	elasticsearch.	
FYI	it	uses	port	9300.
Same	on	the	Other	End
KOPF
Same	on	the	Other	End
KOPF
Same	on	the	Other	End
Don’t forget
to click all
the things
Daily	Cron
Everyday we	run	a	python	script	to	create	the	feed.
Recap
SSL AMQP
Bro
Logstash
Logstash
Python Feed Data
Make	Reports
API’s
Annoyances	TLP:RED
Hosting Providers responding to abuse….
Code
Extract	Data	from	the	Store
We	are	extracting	data	out	of	Elasticsearch	with	Python.	We	
learned	that	most	errors	are	coming	from	Elasticsearch.	For	
python	we	like	the	official	library	from	elasticsearch	the	most.	
We	also	increased	our	timeout	to	30	from	the	default	10.
Extract	Data	from	the	Store
We	used	kibana	to	help	us	build	our	queries
What	have	we	seen?
99,859 Attacks Observed
in
Q1 2016
What	have	we	seen?
(AS) (Count)
6939 7034 HURRICANE - Hurricane Electric, Inc.,US
4134 6663 CHINANET-BACKBONENo.31,Jin-rong Stre
7922 3447 COMCAST-7922 - Comcast Cable Communic
16276 3161 OVH OVH SAS,FR
37963 2989 CNNIC-ALIBABA-CN-NET-APHangzhouAlib
200000 2272 UKRAINE-AS HostingUkraine LTD,UA
48347 2056 MTW-AS JSC MediaSoft Ekspert,RU
4837 1950 CHINA169-BACKBONE CNCGROUP China1
58543 1940 CHINATELECOM-GUANGDONG-IDC Guang
7018 1677 ATT-INTERNET4 - AT&T Services, Inc.,US
28573 1290 CLARO S.A.,BR
701 1216 UUNET - MCI CommunicationsServices,Inc
23650 981 CHINANET-JS-AS-AP AS Number for CHINA
backbone,CN
5089 945 NTL Virgin Media Limited,GB
24940 940 HETZNER-AS Hetzner OnlineGmbH,DE
18881 936 Global Village Telecom,BR
20115 931 CHARTER-NET-HKY-NC - Charter Communi
5607 911 BSKYB-BROADBAND-AS Sky UK Limited,GB
13335 783 CLOUDFLARENET - CloudFlare, Inc.,US
1221 723 ASN-TELSTRA Telstra PtyLtd,AU
What	have	we	seen?
What	have	we	seen?
What	have	we	seen?
What	have	we	seen?
What	have	we	seen?
What	have	we	seen?
These	are	the	best	dudes	in	the	world
Zane	Witherspoon – San	Francisco Acheleas Mustakis – Athens,	Greece
Science	should	be	repeatable	and	open
RStudio Desktop
https://github.com/kingtuna/Hybrid-Darknet-Concept
Special	 thanks	to	- A10	Networks,	Nexusguard,	fsi.io,	and	Cari.net
Collaborators:	 Zane	Witherspoon,	Acheleas Mustakis,	and	Krassimir
Science	should	be	repeatable	and	open
https://github.com/kingtuna/Hybrid-Darknet-Concept
To	be	added	to	the	list
tuna@nexusguard.com

More Related Content

PDF
DNS как линия защиты/DNS as a Defense Vector
PDF
Introduction to Snort Rule Writing
PDF
Использование KASan для автономного гипервизора
PDF
DDoS Attack on DNS using infected IoT Devices
PDF
DDoS Defense Mechanisms for IXP Infrastructures
PDF
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
PPTX
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
DNS как линия защиты/DNS as a Defense Vector
Introduction to Snort Rule Writing
Использование KASan для автономного гипервизора
DDoS Attack on DNS using infected IoT Devices
DDoS Defense Mechanisms for IXP Infrastructures
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
Мобильная связь небезопасна. Аргументы, подкрепленные фактами

What's hot (20)

PDF
How the CC Harmonizes with Secure Software Development Lifecycle
PPTX
Ddos and mitigation methods.pptx (1)
PPTX
IPv6 Security
PDF
Using MikroTik routers for BGP transit and IX points
PDF
Make the internet safe with DNS Firewall
PDF
Preventing Traffic with Spoofed Source IP address
PDF
Carlos García - Pentesting Active Directory Forests [rooted2019]
PDF
Suricata: A Decade Under the Influence (of packet sniffing)
PDF
Fundamentals of network hacking
PPTX
DeiC DDoS Prevention System - DDPS
PDF
New flaws in WPA-TKIP
PDF
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
PPTX
Snort IDS
PDF
Database Firewall with Snort
PPTX
2014 Security Onion Conference
PDF
Blackholing from a_providers_perspektive_theo_voss
PPT
05 06 ike
PDF
The New Landscape of Airborne Cyberattacks
PDF
Intro to firewalls
PDF
DNS DDoS Attack and Risk
How the CC Harmonizes with Secure Software Development Lifecycle
Ddos and mitigation methods.pptx (1)
IPv6 Security
Using MikroTik routers for BGP transit and IX points
Make the internet safe with DNS Firewall
Preventing Traffic with Spoofed Source IP address
Carlos García - Pentesting Active Directory Forests [rooted2019]
Suricata: A Decade Under the Influence (of packet sniffing)
Fundamentals of network hacking
DeiC DDoS Prevention System - DDPS
New flaws in WPA-TKIP
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
Snort IDS
Database Firewall with Snort
2014 Security Onion Conference
Blackholing from a_providers_perspektive_theo_voss
05 06 ike
The New Landscape of Airborne Cyberattacks
Intro to firewalls
DNS DDoS Attack and Risk
Ad

Viewers also liked (20)

PPTX
Waf.js: как защищать веб-приложения с использованием JavaScript
PDF
Статический анализ кода в контексте SSDL
PDF
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
PDF
Обратная разработка бинарных форматов с помощью Kaitai Struct
PPTX
Целевые атаки: прицелься первым
PDF
Вирусы есть? А если найду?
PPT
Псевдобезопасность NFC-сервисов
PDF
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
PPTX
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
PDF
Метод машинного обучения для распознавания сгенерированных доменных имен
PPTX
Город никогда не спит / The City Never Sleeps
PDF
Боремся с читингом в онлайн-играх
PPTX
Угадываем пароль за минуту
PDF
Как начать бизнес в ИБ
PDF
Flash умер. Да здравствует Flash!
PDF
Применение виртуализации для динамического анализа
PPTX
Certifi-Gate: атака в теории и на практике
PDF
Обход файрволов веб-приложений
PDF
Tapping into the core
PPTX
Fingerprinting and Attacking a Healthcare Infrastructure
Waf.js: как защищать веб-приложения с использованием JavaScript
Статический анализ кода в контексте SSDL
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Обратная разработка бинарных форматов с помощью Kaitai Struct
Целевые атаки: прицелься первым
Вирусы есть? А если найду?
Псевдобезопасность NFC-сервисов
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
Метод машинного обучения для распознавания сгенерированных доменных имен
Город никогда не спит / The City Never Sleeps
Боремся с читингом в онлайн-играх
Угадываем пароль за минуту
Как начать бизнес в ИБ
Flash умер. Да здравствует Flash!
Применение виртуализации для динамического анализа
Certifi-Gate: атака в теории и на практике
Обход файрволов веб-приложений
Tapping into the core
Fingerprinting and Attacking a Healthcare Infrastructure
Ad

Similar to Строим ханипот и выявляем DDoS-атаки (20)

PPTX
The Background Noise of the Internet
PDF
Handout: 'Open Source Tools & Resources'
PDF
Cyber-security
PDF
9(1)
PDF
bro - what is in my network?
PDF
DDoS Mitigation Tools and Techniques
PDF
InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...
PDF
Open Source Logging and Metric Tools
PPTX
Debugging Microservices - key challenges and techniques - Microservices Odesa...
PPTX
Tech talk microservices debugging
PDF
Inside dropbox
PDF
Dragoncraft Architectural Overview
PDF
OSMC 2016 - DNS Monitoring from Several Vantage Points by Stéphane Bortzmeyer
PPTX
Open Source Monitoring Tools
PDF
Lesson_08_Continuous_Monitoring.pdf
KEY
London devops logging
PDF
Botnet Detection and Prevention in Software Defined Networks (SDN) using DNS ...
PDF
Open Standards and Open Source in Datacenter Management - OSDC.tw 2014
PDF
Webinar Monitoring in era of cloud computing
PDF
Open Security Operations Center - OpenSOC
The Background Noise of the Internet
Handout: 'Open Source Tools & Resources'
Cyber-security
9(1)
bro - what is in my network?
DDoS Mitigation Tools and Techniques
InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...
Open Source Logging and Metric Tools
Debugging Microservices - key challenges and techniques - Microservices Odesa...
Tech talk microservices debugging
Inside dropbox
Dragoncraft Architectural Overview
OSMC 2016 - DNS Monitoring from Several Vantage Points by Stéphane Bortzmeyer
Open Source Monitoring Tools
Lesson_08_Continuous_Monitoring.pdf
London devops logging
Botnet Detection and Prevention in Software Defined Networks (SDN) using DNS ...
Open Standards and Open Source in Datacenter Management - OSDC.tw 2014
Webinar Monitoring in era of cloud computing
Open Security Operations Center - OpenSOC

More from Positive Hack Days (20)

PPTX
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
PPTX
Как мы собираем проекты в выделенном окружении в Windows Docker
PPTX
Типовая сборка и деплой продуктов в Positive Technologies
PPTX
Аналитика в проектах: TFS + Qlik
PPTX
Использование анализатора кода SonarQube
PPTX
Развитие сообщества Open DevOps Community
PPTX
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
PPTX
Автоматизация построения правил для Approof
PDF
Мастер-класс «Трущобы Application Security»
PDF
Формальные методы защиты приложений
PDF
Эвристические методы защиты приложений
PDF
Теоретические основы Application Security
PPTX
От экспериментального программирования к промышленному: путь длиной в 10 лет
PDF
Уязвимое Android-приложение: N проверенных способов наступить на грабли
PPTX
Требования по безопасности в архитектуре ПО
PDF
Формальная верификация кода на языке Си
PPTX
Механизмы предотвращения атак в ASP.NET Core
PDF
SOC для КИИ: израильский опыт
PDF
Honeywell Industrial Cyber Security Lab & Services Center
PDF
Credential stuffing и брутфорс-атаки
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Как мы собираем проекты в выделенном окружении в Windows Docker
Типовая сборка и деплой продуктов в Positive Technologies
Аналитика в проектах: TFS + Qlik
Использование анализатора кода SonarQube
Развитие сообщества Open DevOps Community
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Автоматизация построения правил для Approof
Мастер-класс «Трущобы Application Security»
Формальные методы защиты приложений
Эвристические методы защиты приложений
Теоретические основы Application Security
От экспериментального программирования к промышленному: путь длиной в 10 лет
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Требования по безопасности в архитектуре ПО
Формальная верификация кода на языке Си
Механизмы предотвращения атак в ASP.NET Core
SOC для КИИ: израильский опыт
Honeywell Industrial Cyber Security Lab & Services Center
Credential stuffing и брутфорс-атаки

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
DOCX
search engine optimization ppt fir known well about this
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
STKI Israel Market Study 2025 version august
PPT
What is a Computer? Input Devices /output devices
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Five Habits of High-Impact Board Members
PPTX
The various Industrial Revolutions .pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Modernising the Digital Integration Hub
Module 1.ppt Iot fundamentals and Architecture
Taming the Chaos: How to Turn Unstructured Data into Decisions
search engine optimization ppt fir known well about this
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Web Crawler for Trend Tracking Gen Z Insights.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Benefits of Physical activity for teenagers.pptx
STKI Israel Market Study 2025 version august
What is a Computer? Input Devices /output devices
A contest of sentiment analysis: k-nearest neighbor versus neural network
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
DP Operators-handbook-extract for the Mautical Institute
Five Habits of High-Impact Board Members
The various Industrial Revolutions .pptx
A review of recent deep learning applications in wood surface defect identifi...
A novel scalable deep ensemble learning framework for big data classification...
Univ-Connecticut-ChatGPT-Presentaion.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game

Строим ханипот и выявляем DDoS-атаки