Study on DoS Activity In The Internet 53
Random Walk writes "A group of researchers from the UCSD Supercomputer Center has used a
technique they call "backscatter analysis" to study
the prevalence and targets of DoS attacks. They claim that
their study is
"the only publically available data quantifying
denial-of-service activity in the Internet", and
provide interesting statistics on attack rates, durations, and victims." CT:This is an amazing report.
Re:That's it? (Score:1)
lots of addresses (Score:2)
I found the paper really interesting. The methods and techniques seem reasonably sound for establishing a lower bound for "significant" attacks. But I'm disturbed that in the midst of the IPv4 address-space crunch where getting a /19 out of ARIN is practically impossible, the researchers were allowed to use a /8 network that was totally unutilized (or if that wasn't true, their data are seriously problematic).
They say themselves -- they were monitoring backscatter traffic by observing any traffic sent into an unused network address space comprising 1/256th of the total IPv4 space.
Breaking news! (Score:5)
In what many people are calling a sick twist of fate, the Supercomputer Center was hit with a Denial of Service attack shortly after issuing a study on the prevalence and target of DoS attacks. While details are sparse at this point, that attack is rumored to have been a "Slashdot-effect" attack. The leader of the "Slashdot" group of hackers, CmdrTaco, could not be reached for comment. His partner in crime, Hemos, was quoted as saying, "Ph34r the sl4shd0t 3ff3ct!" More details to follow as they become public..
Why is it... (Score:1)
PDF and postscript are excellent for hardcopies, but they're not distributing hardcopies. They're distributing electronic copies.
I suppose it's just WAY too difficult to run their PDF through a filter to convert it from PDF to HTML or text. Of course, I could do it myself, but I'm a slashdot poster, and I whine, I don't actually do anything proactive.
MS DNS Down Two Days in a row (Score:1)
Microsoft's DNS actually went down two days in a row. The first day was a router misconfiguration. I remember because a lot of my office was having problems with IE loading its default homepage (msn.com). After checking things out it was pretty clear that even with an ip address from whois for their dns servers that traceroutes died at an MS router. i.e. you could get to the DNS router that was doing the round robin for the DNS servers, so it wasn't being DoSed. Go to this Wired article [wired.com] where Microsoft spokespersons admit that it was a router misconfiguration. And we know that Microsoft's PR people are always putting down Microsoft products and services as being the worst.
After the 23 hours it took Microsoft to figure out it had a bad router config, the skript kitties obviously decided that this poor router had to be rebaptised in a stream of packets, a veritable flood of packets. I don't condone it, but the fact that MS took 23 hours to figure out they had a bad router config causing them a DoS and took another few days to decide that they should outsource their DNS to someone who could provide a distributed and reliable service shows a top heavy beast that could not compete without the monopoly (District Court ruling stands until the Milton Friedman acolytes on the Appeals Court hand down a verdict as a resume addendum to Dubya for selection to the Supreme Court.) power that they possess.
Congress report deems FBI supersleuths incompetent (Score:2)
MS-DOS (Score:1)
Microsoft's name server infrastructure was disabled by a similar assault.
No it wasn't. Microsoft just fucked up with the ONE router that had their DNS traffic going through it.
Makes me want to give up reading if it's going to be crap like that.
Bah.
--
Delphis
Re:MS-DOS (Score:1)
No, I have no love for Microsoft either, that's true.
--
Delphis
Re:MS DNS Down Two Days in a row (Score:1)
--
Delphis
Re:Why is it... (Score:1)
Contrariwise, every day I can download a paper in PS or PDF and not in Word is a good day.
Caution: contents may be quarrelsome and meticulous!
Can carpet bombing be justified? (Score:5)
Even if you accept the premise that it's OK to DoS innocent people, a DoS is a piss-poor political statement. No body is going to notice at all. If I find that riaa.org is unreachable, am I going to suddenly telepathetically reach some conclusion about their politics? No. If you want to make a political statement, you have to actual say something. Merely screaming nothing at the top of your lungs accomplishes nothing.
Re:CmdrTaco replaced by Shell Script? (Score:1)
Re:CmdrTaco replaced by Shell Script? (Score:2)
--
Re:Yay, analysis. (Score:1)
English is not my mothers tongue but I have this feeling that an insecure computer would be a form of artificial intelligence.....
Forgot to mention... (Score:1)
I don't understand, they always seem to mention that fact and the fact that the NY Times is a free registration.
--
Why romania? (Score:1)
Why would Romania be on someone's shitlist?
Re:When random. . . isnt'. (Score:2)
Regardless, their study is probably useful at gauging the frequency of attacks that aren't truly massive enough to attract widespread notice. Some of those do seem to reveal more sophistication than this technique would catch. Yahoo attacks and the Microsoft DNS attack seem to have revealed a certain amount of awareness of network structure. But as a technique of measuring attacks that aren't otherwise widely reported, this study is an order of magnitude more interesting than anything I've seen before.
I've personally noticed what I believe to be "backscatter" - large, brief ping floods that are too small or brief to be an actual DoS.
Boss of nothin. Big deal.
Son, go get daddy's hard plastic eyes.
xpdf& (Score:1)
Re:Can DoS be justified? (Score:2)
Its just like any violent protest. Everyone has a breaking point.
I'm not sure if its a very good form of protest, it might get a few lines in a newspaper article but doesn't make for good film at 11.
All Your Backscatter Are Belong To Us (Score:1)
--
Watch Stefan Savage Presentation Online (Score:2)
Sorry, the only format is streaming Windows Media.
-Sverker
Theories in DoS (Score:3)
Nicely written document although they should have focused likewise on posting some methods to circumvent DoS attacks. Many networking, and security admins, know of the problems arising from DoS, yet there are scores of them who know little about protecting their infrastructure from an attack.
Personally I think its a trivial job to halt denials of service attacks, but it can be done, and what someone should create is a framework for ISP's, Colleges, whoever has a networking propagating info out, to follow that shows them how to enable engress filtering so no attacks come out of their network, and an equally likewise doc that shows preventive measures.
Everyone, and their BOFH mother thats on the net, knows the effects of a DoS attacks, or what a DoS attack is, but a fraction of them know what to do about it.
Anyways for some of those admins, I have a doc called Stopping DoS [antioffline.com] which is a die hard "this-is-what-you-do-on-this-hadware" to limit DoS attacks, as well as a s(emi)tudy paper called "Theories in DoS [antioffline.com]" which is a higher protocol level look at Denials of Service, which provides a framework look into future avoidances of them.
P.S. These are docs I wrote out of spare time, etc. nothing more, so don't expect any RFC based documents such as this paper thats linked.
Re:Yay, analysis. (Score:2)
This is something that is bugging me right now. I got myself cracked on New Year's Eve. It was my own stupid fault, I had forgotten to patch ftpd and some little wiener had installed a root kit through it. As luck would have it I was in bed with the flu and happened to notice the flashing lights on my cable modem so I got the machine unplugged right away.
Here's the thing that's bothers me. If I hadn't noticed for a day or two and the script kiddie had gone and used my machine as a place to crack from or if he used it as a node is a DDOS attack how responsible am I. It is partialy my fault the machine got comprimised but how much trouble could I get in when the federales came and busted down my door. I honestly belive that if some subsequent attack had been traced back to my box and the feds found out it ws owned by a mid 20s UNIX geek type guy I could really been in for some grief. I would at least get all my machines confiscated for "evidence".
Something to think about anyways.
Perfect distributed app (Score:2)
What someone should really do is set up a kernel module and/or userspace app that reports unusual packets back to a data-gathering server. Because the reporting machines would be scattered all over the place there's no practical way to avoid them, and they'd get a good pool of backscatter.
Of course, the data-gathering server would probably get DoSed in short order...
--
Re:Can carpet bombing be justified? (Score:1)
I love that observation of what a DoS attack is. The image it brought to mind was of a teacher/parent overwhelmed by a group of three year olds. This is appropriate since this is the typical maturity level of the individuals who launch these attacks.
Re:lots of addresses (Score:2)
my plan [gospelcom.net]
My bad-- AMPR is _at_ UCSD (Score:2)
my plan [gospelcom.net]
Re:Can DoS be justified? (Score:2)
Backscatter analysis (Score:2)
Analyzing the backscatter traffic from attacks is actually a very well-known technique among firewall admins and other security practitioners.
lcamtuf's wtfs project [coredump.cx], for instance, has successfully used this kind of distributed monitoring to discover many interesting probes, including Hotmail's stealthy reverse tracerouting, strange behaviour from f5 load balancers, as well as many actual attacks and scans, by monitoring unused /16s and random hosts across the net.
Re:Yay, analysis. (Score:1)
The key is to go after the zombies but also go affter the traffic. I was not shocked by the findings of the report but I've gotta wonder how much of this DoS tarffic is eating up bandwith that I've gotta pay for.
Yes, DoS can be justified... (Score:2)
So I guess there are even non-political, ethical justifications for DoS attacks.
Moreso, isn't DoS precisely what companies like Mercury Interactive [mercuryinteractive.com] and Keynote [keynote.com] do when they try to slam your webserver so you know whether you need to buy more server processing power, etc.?
--
Back Scatter, heh (Score:1)
Re:CmdrTaco replaced by Shell Script? (Score:3)
--
Slashdot effect count? (Score:1)
CmdrTaco replaced by Shell Script? (Score:1)
That's it? (Score:1)
Re:xpdf& (Score:1)
Romania is a hotbed for (h|cr)acking (Score:3)
I get more problems from Romania than I do from Russia. For a country with such a "poor networking infrastructure," they have no shortage of crackers and carders. And it doesn't surprise me in the least that they're getting their punk asses DoS'd!
Shaun
Re:Can DoS be justified? (Score:1)
Re:CmdrTaco replaced by Shell Script? (Score:1)
The perl script just needs some debugging.
Good science? Or not? (Score:2)
This report sounds similar to the "Resiliance of the Internet to Random Breakdowns" report that was on Slashdot a while ago, from the Online Journal Publishing Service (Physical Review Letters, or something). While, yes, in theory, the Internet could still operate with 99% of its nodes nonfunctional, most of the content of the Internet would be lost in the 99% that went down.
It seems like it would be similar here. I will state right off that I have not had the time to read the article yet, since I'm writing this message from on the job, but it sounds to me like it's just looking at raw numbers, and not the implications of those numbers. The sites that were attacked were high-profile sites, such as Amazon.com, yahoo.com, ebay.com, microsoft.com, and such - sites that the orchestrators were trying to make a point by attacking. If you look at the number of machines used, etc... you get an idea of the attacker's technical savvy, but not necessarely their motives.
Anaylizing raw data is good, but when it comes to humans, it is very hard to reduce human behavior down to a series of numbers in a table. Of course, my conclusion may change on reading the paper in more detail later this afternoon.
Seven out of ten statisticians say that all statistics are meaningless.
Yay, analysis. (Score:3)
1) Right now, any insecure computer can be cracked for use in a DoS attack, thereby indirectly implicating an innocent person. Anyone can get hijacked in this way and framed for another attack, particularly if the investigators choose not to trace back to the original source.
2) DoS and other infowar techniques have been used by the political opponents of Indymedia [indymedia.org] and other "subversive" websites. I am not referring to the Indymedia subpoena related to the Quebec protests, which was referred to earlier on this site, but to the simple denial of service that crashes these things when they are needed most.
3) Lets say that there is, hypothetically, some politically motivated DoS going on. If so, it;s quite silly and wasteful. The sites that are being DoS'ed are usually those prominent targets, big corporations and government sites which are sometimes capable of holding off attack but are always capable of sending many goons after you. Might I suggest that there are more effective ways of using technology as a political tool.
Lower bounds? (Score:2)
Re:CmdrTaco replaced by Shell Script? (Score:1)
Re:When random. . . isnt'. (Score:1)
Most networks have a single route to the rest of the internet. directing traffic through this router is a lot more likely to cause problems than packets that are handled within the network.
A limitation that makes more sense is "valid" ip addresses only. And it's simple to do - just pick a class A like 198.* that way you eliminate 10.* and 255.* which are might be filtered before they reach the main router. Since most IP's are valid (in that they get routed somewhere) this only makes a tiny difference in attack performance, but hey - every little bit hurts.
The statements above do not necessarily reflect the authors opinion.
Re:Can DoS be justified? (Score:1)
The concept would be something akin to Spiderman: wisecracking hero, hated and pursued by cops, but who does manage to give the bad guys their just desserts (tangling with a web, appropriately enough...)
The first chapter would involve our hero, on the anniversary of the Halloween memo incident, anonymously bringing to light hundreds of incriminating documents that he has "liberated" from some of M$'s most private servers....
What do you think? Do you think it has potential?
Apparently, you were. (Score:1)
What a coincidence (Score:2)
Re:DOS activity on the internet? (Score:1)
When random. . . isnt'. (Score:5)
*begin quote*
3.3 Analysis limitations
There are three assumptions that underly our analysis:
* Address uniformity: attackers spoof source addresses at random.
*end quote*
This seems to me to be a currently acceptable assumption IFF the attacks are of an unsophisticated/sophomoric nature; however, if the attackers are attempting to cause maximum utilization of the target network's resources, the attackers most likely will not use a randomly distributed source address. In fact, the optimal employment of spoofed addresses will likely be some subset of the addresses employed by the target's network.
It seems likely in light of this that the "backscatter technique" outlined here, while useful, may not record the attacks engineered by more sophisticated attackers.
Nietzsche on Diku:
sn; at god ba g
:Backstab >KILLS< god.
Can DoS be justified? (Score:2)
Re:MS-DOS (Score:1)
-------------------------------------------------
Re:When random. . . isnt'. (Score:2)
Without widespread monitoring its impossible to know for sure how many attacks have the address uniformity property (that the victim sees an attack with source addresses uniformly distributed across all 2^32 address). In addition to the targeted spoofing you mention, ingress/egress filtering and reflector attacks also have the property that the source address profile is restricted and will not generate backscatter seen by us. While one could potentially produce a more complete estimate by extrapolating from data about how often such attacks are seen at a few monitored sites, the Internet is so diverse and varied that we had little faith in the quality of results derived in that way. Instead, we preferred to produce an underestimate that we were confident in.
Frankly, most people we've shown our data to are surprised (as we were) at the level of DoS activity we found. That the true numbers may be significantly higher still only reinforces that feeling. Undoubtedly, some people had different expectations :-)