SlideShare a Scribd company logo
Wilson Rogério Lopes
LACNIC 26 / LACNOG 2016
09/2016
DDoS Attacks
Scenery, Evolution and Mitigation
Wilson Rogério Lopes
• Network Engineer Specialist, with 12 years of experience in the internet
industry
• Postgraduate degree from University of Sao Paulo – USP
• Frequent speaker at GTER and GTS – Network engineering and security
groups of Brazil, talking about network engineering, DDoS mitigation, DNS
and DNSSEC
• Interests – Network architecture and network security, IaaS, SDN, DNS,
DNSSEC
Contacts – wilsonlopes00@gmail.com
https://br.linkedin.com/in/wrlopes
Disclaimer
All information and opinions contained in this presentation does not represent
my employer. All information and stats presented is public, collected from blogs
and specialized sites on the internet.
Agenda
• DDoS – Scenery and Evolution
• Mitigation – Options and Applicability
• General Recomendations
“DDoS is a new spam…and it’s
everyone’s problem now.”
Technical Details Behind a 400Gbps NTP Amplification
DDoS Attack
13 Feb 2014 by Matthew Prince
http://blog.cloudflare.com/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack/
“To generate approximately 400Gbps of traffic, the attacker used
4,529 NTP servers running on 1,298 different networks. On
average, each of these servers sent 87Mbps of traffic to the
intended victim on CloudFlare's network. Remarkably, it is
possible that the attacker used only a single server running on a
network that allowed source IP address spoofing to initiate the
requests.”
Source: Atlas Arbor Networks
SSDP - Simple Service Discovery Protocol
• UDP port 1900
• “Search” Request
• Amplification factor – 30x
• 8 million of opened devices around the world
Source: https://ssdpscan.shadowserver.org/
2016 - IoT – CCTV Botnet
• CCTV devices – telnet, admin with default passwd
• At least 70 vendors running the same linux embedded
• Lizard Squad – Bot LizardStresser
• 400Gbps of volumetry – without amplification
HTTP Request flood, tcp connections flood, udp flood
Source: https://www.arbornetworks.com/blog/asert/lizard-brain-lizardstresser/
2016 – Rio Olympic Games
Start of IoT botnet activity
• 540Gbps sustained
• Targets – Sponsors, government sites, financial
institutions
• Use of GRE to bypass the mitigations
Fonte: https://www.arbornetworks.com/blog/asert/lizard-brain-lizardstresser/
2016 – 21/09 – Retaliation and Censorship
• vDOS from Israel identified and owners were arrested
• Reported by Brian Krebs - http://krebsonsecurity.com/about/
• 665Gbps – 143Mpps – Without amplification !
2016 – 25/09 – Google Project Shield
#dig krebsonsecurity.com.
krebsonsecurity.com. 246 IN A 130.211.45.45
CIDR: 130.211.0.0/16
NetName: GOOGLE-CLOUD
DDoS Attacks – IPv6
Source: Arbor 2016 Worldwide Infrastructure Security Report
• 354 Service Providers interviewed
• 70% answered that have IPv6 deployed
2015 – 2% at least 1 DDoS attack
2016 – 9%
Biggest volumetry - 6Gbps
Mitigation – Team Cymru UTRS
BGP Peering
x.x.x.x/32 announce
• UTRS - Unwanted Traffic Removal Service
• Destination RTBH multihop – BGP
• AS victim annouces the ip under attack
• Authenticity verified – whois and peering db
• The attack is blocked in the source AS
• Restricted to /32 prefixes
• More participants, more efficacy
Recommended
• Internet service providers for home users
One or more user will lost the connectivity, but the
provider remains up
Maybe recommended....
ISPs, Content Providers, Hosting Providers
Client Services unavailable (news home, e-commerce basket, bakline page)
UTRS
AS 1234
Network Under Attack
Destination: x.x.x.x/32
Upstream 1 Upstream 2
AS YYYY
route x.x.x.x/32 null0
AS XXXX
route x.x.x.x/32 null0
BGP update
BGP update
Attack Traffic
Mitigation – Clean Pipe IP Transit Providers
PE Provider
CPE Client
Cleaning Center
• Normal Traffic
• Attack Traffic
• Cleaned Traffic
• Detection via Netflow
• Start a more specific announce of ip/prefix under attack
• The traffic will be “cleaned” using:
- Syn cookies / Syn Auth
- Static filters : drop proto udp and src port 1900
drop proto udp and src port 123
- Rate Limit per src/dst prefix and ports
- Protocol Authentication
- Payload regular expressions
- TCP connection limit
- Rate limit or drops using GeoIP
Mitigation – Cloud DDoS Mitigation Service Providers
PE Provider
CPE Client
• Normal Traffic
• Attack Traffic
• Cleaned Traffic
• GRE tunnel between client and provider
• BGP session under gre tunnel
• Detection via Netflow
• Start a more specific announce of ip/prefix under attack
• Cloud Provider annouce to your upstreams
• All the input traffic will be via Cloud Provider Network
• Block of layer 3 and 4 attacks
• Additionaly, WAF services
Cloud Provider Network
BGP
GRE
GRE
Pros
• Capacity of mitigation – Tbps
• Easy implementation, without changes in the client network
Cons
• Latency
• GRE and MSS –MSS, TCP DF bit setted
Inbound traffic
Outbound traffic
Mitigation Layer 7 – Load Balancers
• L7 HTTP/HTTPS Floods
- Rate limit client IP, destination URL, destination URI
- HTTP header analisys
Check of User Agent
Check of Referer
Validation if client is a browser:
- Cookie insertion
- JS insertion
Validation if client is a human:
- Captcha insertion
Mitigation – Home Made
• Iptables SynProxy
Kernel 3.13, Red Hat 7
iptables -t raw -I PREROUTING -p tcp -m tcp --syn -j CT –notrack
iptables -I INPUT -p tcp -m tcp -m conntrack –ctstate UNTRACKED
-j SYNPROXY --sack-perm --timestamp --wscale 7 --mss 1460
Mitigation – Home Made
• Mod Evasive
Rate limit client IP, destination URL, destination URI
DOSPageCount 2
DOSSiteCount 50
DOSPageInterval 1
DOSSiteInterval 1
DOSBlockingPeriod 60
DOSEmailNotify admin@example.org
Mitigation – Home Made
• Mod Security
WAF – Monitoring, Log and Block
OWASP Core rules - https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project
Protocol violation
RBL
Block of floods e slow attacks
Bot, crowler and scan detection
Mitigation – General Recomendations
• Use Hybrid strategy
Block l3/l4 attacks os the service provider
Block l7 attacks using on-premisse solutions
• Monitoring systems focused on DDoS detection
• Configure Control Plane Policy. Use filters to block traffic to control plane of network devices
• Don’t use the same prefixes to infrastructure and clients
• Keep the mitigation easy – WEB Servers separated of DNS Servers, etc....
• Use anycast as possible – our old and good friend 
• Get away of statefull controls on the edge (Firewalls, IPS, etc). Use only where is necessary.
References
• CERT.BR - Recomendações para Melhorar o Cenário de Ataques Distribuídos de Negação de Serviço (DDoS)
http://www.cert.br/docs/whitepapers/ddos/
• Mod Evasive - http://www.zdziarski.com/blog/?page_id=442
• Mod Security - https://www.modsecurity.org/
• Iptables SynProxy - http://rhelblog.redhat.com/2014/04/11/mitigate-tcp-syn-flood-attacks-with-red-hat-
enterprise-linux-7-beta/
• UTRS - https://www.cymru.com/jtk/misc/utrs.html
• Google Project Shield - https://projectshield.withgoogle.com/public

More Related Content

PDF
Ripe71 FastNetMon open source DoS / DDoS mitigation
PPT
PDF
Protect your edge BGP security made simple
PPTX
DeiC DDoS Prevention System - DDPS
PDF
Keeping your rack cool
PDF
Jon Nield FastNetMon
PDF
DDoS Mitigation Tools and Techniques
PDF
FastNetMon - ENOG9 speech about DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigation
Protect your edge BGP security made simple
DeiC DDoS Prevention System - DDPS
Keeping your rack cool
Jon Nield FastNetMon
DDoS Mitigation Tools and Techniques
FastNetMon - ENOG9 speech about DDoS mitigation

What's hot (19)

PPTX
FastNetMon Advanced DDoS detection tool
PDF
Distributed Denial of Service Attack - Detection And Mitigation
PDF
DDoS Defense Mechanisms for IXP Infrastructures
PDF
Blackholing from a_providers_perspektive_theo_voss
PDF
Using MikroTik routers for BGP transit and IX points
PDF
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
PDF
Nanog66 vicente de luca fast netmon
PPT
Why Managed Service Providers Should Embrace Container Technology
PDF
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
PPTX
Multi-Layer DDoS Mitigation Strategies
PDF
Make the internet safe with DNS Firewall
PDF
Preventing Traffic with Spoofed Source IP address
PPTX
BGP FlowSpec experience and future developments
PDF
Implementing BGP Flowspec at IP transit network
PDF
An Introduction to BGP Flow Spec
PDF
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
PDF
FastNetMonを試してみた
PDF
Route Origin Validation - A MANRS Approach
PDF
DDoS Challenges in IPv6 environment
FastNetMon Advanced DDoS detection tool
Distributed Denial of Service Attack - Detection And Mitigation
DDoS Defense Mechanisms for IXP Infrastructures
Blackholing from a_providers_perspektive_theo_voss
Using MikroTik routers for BGP transit and IX points
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
Nanog66 vicente de luca fast netmon
Why Managed Service Providers Should Embrace Container Technology
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
Multi-Layer DDoS Mitigation Strategies
Make the internet safe with DNS Firewall
Preventing Traffic with Spoofed Source IP address
BGP FlowSpec experience and future developments
Implementing BGP Flowspec at IP transit network
An Introduction to BGP Flow Spec
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
FastNetMonを試してみた
Route Origin Validation - A MANRS Approach
DDoS Challenges in IPv6 environment
Ad

Viewers also liked (20)

PDF
Ataques DDoS - Panorama, Mitigação e Evolução
PDF
Cisco TrustSec - Software Defined Segmentation e sua aplicabilidade em Segura...
PPSX
R&T Company Profile
PDF
TeamTILT for Nagios - Graphical based installation Guide
PPTX
10 group presentation
PDF
DNSSEC -Provisioning and Automatization using Bind
PDF
Sdn&security
PPTX
А.Кумаков Apiship eRetailForum2015
PPTX
História em quadrinhos
PPTX
Songwriting Unleashed
PPTX
Виртуальный номер связывает филиалы в единую сеть
PPTX
Difference between Prefix & Postfix
PPTX
PROYECTO ESTADISTICA "FACTORES QUE INFLUYEN QUE LOS ESTUDIANTES DEL PL18 TEHU...
PDF
Сколько стоит доступ в память, и что с этим делать
PPTX
Capital budgeting
PDF
WSO2-WSF-install-manual-linux-th
PDF
DDoS Prevention: Market Growth, Deployments, and NSS Test Results
Ataques DDoS - Panorama, Mitigação e Evolução
Cisco TrustSec - Software Defined Segmentation e sua aplicabilidade em Segura...
R&T Company Profile
TeamTILT for Nagios - Graphical based installation Guide
10 group presentation
DNSSEC -Provisioning and Automatization using Bind
Sdn&security
А.Кумаков Apiship eRetailForum2015
História em quadrinhos
Songwriting Unleashed
Виртуальный номер связывает филиалы в единую сеть
Difference between Prefix & Postfix
PROYECTO ESTADISTICA "FACTORES QUE INFLUYEN QUE LOS ESTUDIANTES DEL PL18 TEHU...
Сколько стоит доступ в память, и что с этим делать
Capital budgeting
WSO2-WSF-install-manual-linux-th
DDoS Prevention: Market Growth, Deployments, and NSS Test Results
Ad

Similar to DDoS Attacks - Scenery, Evolution and Mitigation (20)

PDF
Multi-Layer DDoS Mitigation Strategies
PDF
DDoS Attacks in 2017: Beyond Packet Filtering
PDF
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
PDF
DDoS Mitigation using BGP Flowspec
PPTX
Dns security threats and solutions
PPTX
Getting the most out of the aruba policy enforcement firewall
PPTX
LACNOG - Logging in the Post-IPv4 World
PDF
KHNOG 3: DDoS Attack Prevention
PDF
IPv6 Security - Myths and Reality
PDF
Dynamic Service Chaining
PDF
Make DDoS expensive for the threat actors
PDF
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PDF
Stanford Drupal Camp 2015 - Repelling Bots, DDOS, and other Fiends
PPT
DNS Security Threats and Solutions
PPTX
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"
PDF
Denial of Service - Service Provider Overview
PPTX
redGuardian DP100 large scale DDoS mitigation solution
PPTX
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
Multi-Layer DDoS Mitigation Strategies
DDoS Attacks in 2017: Beyond Packet Filtering
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
DDoS Mitigation using BGP Flowspec
Dns security threats and solutions
Getting the most out of the aruba policy enforcement firewall
LACNOG - Logging in the Post-IPv4 World
KHNOG 3: DDoS Attack Prevention
IPv6 Security - Myths and Reality
Dynamic Service Chaining
Make DDoS expensive for the threat actors
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
Stanford Drupal Camp 2015 - Repelling Bots, DDOS, and other Fiends
DNS Security Threats and Solutions
Helen Tabunshchyk "Handling large amounts of traffic on the Edge"
Denial of Service - Service Provider Overview
redGuardian DP100 large scale DDoS mitigation solution
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...

More from Wilson Rogerio Lopes (7)

PDF
DNS na AWS - Zero To Hero using Route 53
PDF
Zero to Hero for Network Admins on AWS
PDF
Uso do MacSec (802.1ae) em complemento ao 802.1x em redes corporativas - Cont...
PDF
Implementação do DNSSEC no iG
PDF
BGP Traffic Engineering on IXP
PDF
DNS,DNSSEC and Best Practices
PDF
Palestra sobre DNS apresentada no 3 PTT Forum
DNS na AWS - Zero To Hero using Route 53
Zero to Hero for Network Admins on AWS
Uso do MacSec (802.1ae) em complemento ao 802.1x em redes corporativas - Cont...
Implementação do DNSSEC no iG
BGP Traffic Engineering on IXP
DNS,DNSSEC and Best Practices
Palestra sobre DNS apresentada no 3 PTT Forum

Recently uploaded (20)

PPTX
Digital Literacy And Online Safety on internet
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Introduction to Information and Communication Technology
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
Internet___Basics___Styled_ presentation
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
DOCX
Unit-3 cyber security network security of internet system
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
The Internet -By the Numbers, Sri Lanka Edition
Digital Literacy And Online Safety on internet
RPKI Status Update, presented by Makito Lay at IDNOG 10
Introduction to Information and Communication Technology
PptxGenJS_Demo_Chart_20250317130215833.pptx
Internet___Basics___Styled_ presentation
The New Creative Director: How AI Tools for Social Media Content Creation Are...
WebRTC in SignalWire - troubleshooting media negotiation
522797556-Unit-2-Temperature-measurement-1-1.pptx
Module 1 - Cyber Law and Ethics 101.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Design_with_Watersergyerge45hrbgre4top (1).ppt
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
SAP Ariba Sourcing PPT for learning material
Tenda Login Guide: Access Your Router in 5 Easy Steps
Unit-3 cyber security network security of internet system
Unit-1 introduction to cyber security discuss about how to secure a system
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
The Internet -By the Numbers, Sri Lanka Edition

DDoS Attacks - Scenery, Evolution and Mitigation

  • 1. Wilson Rogério Lopes LACNIC 26 / LACNOG 2016 09/2016 DDoS Attacks Scenery, Evolution and Mitigation
  • 2. Wilson Rogério Lopes • Network Engineer Specialist, with 12 years of experience in the internet industry • Postgraduate degree from University of Sao Paulo – USP • Frequent speaker at GTER and GTS – Network engineering and security groups of Brazil, talking about network engineering, DDoS mitigation, DNS and DNSSEC • Interests – Network architecture and network security, IaaS, SDN, DNS, DNSSEC Contacts – wilsonlopes00@gmail.com https://br.linkedin.com/in/wrlopes
  • 3. Disclaimer All information and opinions contained in this presentation does not represent my employer. All information and stats presented is public, collected from blogs and specialized sites on the internet.
  • 4. Agenda • DDoS – Scenery and Evolution • Mitigation – Options and Applicability • General Recomendations
  • 5. “DDoS is a new spam…and it’s everyone’s problem now.”
  • 6. Technical Details Behind a 400Gbps NTP Amplification DDoS Attack 13 Feb 2014 by Matthew Prince http://blog.cloudflare.com/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack/ “To generate approximately 400Gbps of traffic, the attacker used 4,529 NTP servers running on 1,298 different networks. On average, each of these servers sent 87Mbps of traffic to the intended victim on CloudFlare's network. Remarkably, it is possible that the attacker used only a single server running on a network that allowed source IP address spoofing to initiate the requests.”
  • 8. SSDP - Simple Service Discovery Protocol • UDP port 1900 • “Search” Request • Amplification factor – 30x • 8 million of opened devices around the world Source: https://ssdpscan.shadowserver.org/
  • 9. 2016 - IoT – CCTV Botnet • CCTV devices – telnet, admin with default passwd • At least 70 vendors running the same linux embedded • Lizard Squad – Bot LizardStresser • 400Gbps of volumetry – without amplification HTTP Request flood, tcp connections flood, udp flood Source: https://www.arbornetworks.com/blog/asert/lizard-brain-lizardstresser/
  • 10. 2016 – Rio Olympic Games Start of IoT botnet activity • 540Gbps sustained • Targets – Sponsors, government sites, financial institutions • Use of GRE to bypass the mitigations Fonte: https://www.arbornetworks.com/blog/asert/lizard-brain-lizardstresser/
  • 11. 2016 – 21/09 – Retaliation and Censorship • vDOS from Israel identified and owners were arrested • Reported by Brian Krebs - http://krebsonsecurity.com/about/ • 665Gbps – 143Mpps – Without amplification !
  • 12. 2016 – 25/09 – Google Project Shield #dig krebsonsecurity.com. krebsonsecurity.com. 246 IN A 130.211.45.45 CIDR: 130.211.0.0/16 NetName: GOOGLE-CLOUD
  • 13. DDoS Attacks – IPv6 Source: Arbor 2016 Worldwide Infrastructure Security Report • 354 Service Providers interviewed • 70% answered that have IPv6 deployed 2015 – 2% at least 1 DDoS attack 2016 – 9% Biggest volumetry - 6Gbps
  • 14. Mitigation – Team Cymru UTRS BGP Peering x.x.x.x/32 announce • UTRS - Unwanted Traffic Removal Service • Destination RTBH multihop – BGP • AS victim annouces the ip under attack • Authenticity verified – whois and peering db • The attack is blocked in the source AS • Restricted to /32 prefixes • More participants, more efficacy Recommended • Internet service providers for home users One or more user will lost the connectivity, but the provider remains up Maybe recommended.... ISPs, Content Providers, Hosting Providers Client Services unavailable (news home, e-commerce basket, bakline page) UTRS AS 1234 Network Under Attack Destination: x.x.x.x/32 Upstream 1 Upstream 2 AS YYYY route x.x.x.x/32 null0 AS XXXX route x.x.x.x/32 null0 BGP update BGP update Attack Traffic
  • 15. Mitigation – Clean Pipe IP Transit Providers PE Provider CPE Client Cleaning Center • Normal Traffic • Attack Traffic • Cleaned Traffic • Detection via Netflow • Start a more specific announce of ip/prefix under attack • The traffic will be “cleaned” using: - Syn cookies / Syn Auth - Static filters : drop proto udp and src port 1900 drop proto udp and src port 123 - Rate Limit per src/dst prefix and ports - Protocol Authentication - Payload regular expressions - TCP connection limit - Rate limit or drops using GeoIP
  • 16. Mitigation – Cloud DDoS Mitigation Service Providers PE Provider CPE Client • Normal Traffic • Attack Traffic • Cleaned Traffic • GRE tunnel between client and provider • BGP session under gre tunnel • Detection via Netflow • Start a more specific announce of ip/prefix under attack • Cloud Provider annouce to your upstreams • All the input traffic will be via Cloud Provider Network • Block of layer 3 and 4 attacks • Additionaly, WAF services Cloud Provider Network BGP GRE GRE Pros • Capacity of mitigation – Tbps • Easy implementation, without changes in the client network Cons • Latency • GRE and MSS –MSS, TCP DF bit setted Inbound traffic Outbound traffic
  • 17. Mitigation Layer 7 – Load Balancers • L7 HTTP/HTTPS Floods - Rate limit client IP, destination URL, destination URI - HTTP header analisys Check of User Agent Check of Referer Validation if client is a browser: - Cookie insertion - JS insertion Validation if client is a human: - Captcha insertion
  • 18. Mitigation – Home Made • Iptables SynProxy Kernel 3.13, Red Hat 7 iptables -t raw -I PREROUTING -p tcp -m tcp --syn -j CT –notrack iptables -I INPUT -p tcp -m tcp -m conntrack –ctstate UNTRACKED -j SYNPROXY --sack-perm --timestamp --wscale 7 --mss 1460
  • 19. Mitigation – Home Made • Mod Evasive Rate limit client IP, destination URL, destination URI DOSPageCount 2 DOSSiteCount 50 DOSPageInterval 1 DOSSiteInterval 1 DOSBlockingPeriod 60 DOSEmailNotify admin@example.org
  • 20. Mitigation – Home Made • Mod Security WAF – Monitoring, Log and Block OWASP Core rules - https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project Protocol violation RBL Block of floods e slow attacks Bot, crowler and scan detection
  • 21. Mitigation – General Recomendations • Use Hybrid strategy Block l3/l4 attacks os the service provider Block l7 attacks using on-premisse solutions • Monitoring systems focused on DDoS detection • Configure Control Plane Policy. Use filters to block traffic to control plane of network devices • Don’t use the same prefixes to infrastructure and clients • Keep the mitigation easy – WEB Servers separated of DNS Servers, etc.... • Use anycast as possible – our old and good friend  • Get away of statefull controls on the edge (Firewalls, IPS, etc). Use only where is necessary.
  • 22. References • CERT.BR - Recomendações para Melhorar o Cenário de Ataques Distribuídos de Negação de Serviço (DDoS) http://www.cert.br/docs/whitepapers/ddos/ • Mod Evasive - http://www.zdziarski.com/blog/?page_id=442 • Mod Security - https://www.modsecurity.org/ • Iptables SynProxy - http://rhelblog.redhat.com/2014/04/11/mitigate-tcp-syn-flood-attacks-with-red-hat- enterprise-linux-7-beta/ • UTRS - https://www.cymru.com/jtk/misc/utrs.html • Google Project Shield - https://projectshield.withgoogle.com/public