Some Technical Suggestions For Institutions Targeted By Phishers

Some Technical Suggestions For Institutions Targeted By Phishers

Explaining Distributed Denial of Service Attacks to Campus Leaders Internet2 Member Meeting Arlington, Virginia 3-4 PM May 3rd, 2005 Joe St Sauver, Ph.D. ([email protected]) University of Oregon Computing Center The Audience For Today's Talk Unlike many of my previous I2 or Joint Techs talks which have dealt with technically arcane issues or tactical level concerns, this talk is meant to be more strategic, and is

really targeted at the CIOs and Institutional Executive Representatives who are at today's meeting. Hopefully it will spur discussions about distributed denial of service attacks with senior administrators back at your campus, as well as with technical staff within your campus computing and networking organizations. Because some may refer to this talk after the fact, and because we also have both remote netcast participants and audience members for whom English may not be their primary language, I've tried to write this talk in a way that will make it easy for them to follow along. 2

Disclaimer I currently am co-chair of the Educause Security Effective Practices Task Force, I sit on the Internet2 Security at Line Speed (SALSA) working group, and Im one of three senior technical advisors for the carrier Messaging Anti-Abuse Working Group (MAAWG), but my remarks today should not be taken as representing the official position of any of those groups. You should recognize that parts of this talk involve projections about what might (or might not) happen in the future. My crystal ball horizon is usually fairly short, typically running about 6-18 months, so well probably know if I got this one right one way or the other before

too long. Maybe, if were all lucky, I will have gotten this one completely wrong -- if so I couldnt be happier. 3 Campus Leaders Campus leaders have generally come to understand and appreciate the risks associated with security threats such as viruses, spyware, unpatched hosts, unencrypted network traffic, identity theft and insecure physical facilities. But, many chancellor/president/provost-level university executives have had little opportunity to be briefed on the serious risks their campus may face from distributed

denial of service (DDoS) attacks. This talk is designed to encourage you to brief your campus leadership team on the DDoS issue, and to help lay out some of the issues you may want to be prepared to address. 4 Is The DDoS Issue One Which Meets The Threshold For Executive Attention? Senior campus leaders are busy people. They should not be bothered with trivialities or speculation about improbable events. Unfortunately, the DDoS issue is one which is both

decidedly non-trivial, and one which has a demonstrated track record of affecting typical campuses, campuses just like yours and mine, as well as some of the Internets very largest and best run money-is-no-object-class enterprises. We should probably take a minute to explain why the DDoS issue is potentially such a big deal 5 DDoS Attacks Can Impact All of Campus Many common types of DDoS attacks, such as packet flooding attacks, can affect literally everyone on campus

by filling external networks pipes to the point where the the campus network is rendered unusable... Any attack that can affect everyone on campus is unquestionably a big deal. 6 DDoS Attacks Can Last for Some Time DDoS attacks may last for hours or days (or longer), or occur repeatedly over a series of occasions. Any attack which has the potential to result in sustained disruptions, or reoccurring disruptions, is a big deal.

7 DDoS Attacks Can Disrupt Mission Critical University Operations Imagine the impact of a prolonged email outage, or loss of external access to your campus web site, or problems with your teaching and learning system, or having your ERP system be unavailable. There are typically a large number of key university operations which require the campus network and/or wide area network connectivity to be present and usable. If you knock out the campus network (or key hosts), this can be as disruptive as causing a campus wide power or

water service outage. Business stops. Again, unquestionably, this would be a big deal. 8 DDoS Attacks Can Be Expensive The out-of-pocket costs associated with avoiding DDOS attacks (and/or the costs associated with mitigating a DDoS attacks, should one occur) may be substantial, and for most sites would represent a sudden large unplanned-for and unbudgeted-for expense. That makes DDoS attacks potentially a big deal.

9 The Press Will Smell Blood in the Water Because of all the factors just mentioned, and because DDoS attacks often contain an element of David and Goliath (13 year old takes down million dollar network from his tree house with 2nd hand wireless laptop), journalists often find DDoS attacks quite newsworthy. Anytime theres potential media interest about a campus incident, its a big deal. 10

DDoS Attacks May Have Legal Implications Whether your institution is the victim of a distributed denial of service or just has compromised systems that are participating in attacking some other target, theres a high probability that campus legal counsel will end up becoming involved -- Does the university want to investigate the attack and try to have the attacker criminally prosecuted? Would a civil suit be better? Do we want to take any legal action at all? -- Are there legal issues associated with possible DDoS identification strategies and remediation approaches? -- Is the university liable for attacks committed via one

of its compromised systems? Lawyers involved ==> big deal. 11 OK So DDoS Attacks May Be a Big Deal But what would briefing the executive leadership actually accomplish? Well, it may scare the heck out of them, but thats NOT the objective. The top brass need to know what theyre potentially facing so that theyre not blindsided if an incident occurs. Without accurate technical intelligence campus leaders its also impossible for campus leaders to weigh risks,

prioritize issues, and make informed decisions about institutional strategies and exposures. 12 DDoS Attacks Are Not Just An IT Problem If you come out of an IT background, it is only natural to view a technical issue like denial of service attacks as an IT problem. However, for all of the reasons weve already talked about, denial of service attacks are something thats really an organization-wide problem. Senior campus leaders can work with deans and directors and senior executive staffers to insure that a chosen campus strategy for dealing with DDoS attacks

gets translated into an operational plan. A strategy thats articulated from the the top of the institution also carries more weight with campus audiences than one which just comes from within IT. 13 Resources Once senior management has been briefed, they may be also be able to allocate or reallocate staff and financial resources from outside your traditional organization to help as may be required.

14 Timing Your Briefing There's also the issue of timing: when should campus leaders be briefed? -- One approach would be to wait until your campus is actually suffering a distributed denial of service attack, and the administration is in dire need of information about what's going on (obviously at that point you'll have a motivated/interested audience, and theres no risk that youll end up crying wolf). -- An alternative approach is to consider briefing campus leaders now, before your campus is suffering from a

distributed denial of service attack. By doing so, youll have maximum time to pre-plan a coordinated response and to marshall your forces (but you also run the risk that your campus may never actually end up getting hit). A short discussion now, to at least introduce the topic, might be best compromise (only you can judge this). 15 Are DDoS Attacks Really an "Internet2 Issue?" The answer to that question is unequivocally yes. DDoS attacks are an Internet2 issue because: -- one vector that might be used to attack your campus is your connection to Abilene, the Internet2 backbone

-- turning that around, if hacked hosts on your campus are used to attack other schools, the infrastructure you've built out to support Internet2 means that the bad guys will be potentially wielding a formidable weapon -- NPPAC (the Internet2 Network Policy and Planning Committee), SALSA (the Internet2 Security at Line Speed initiative), the Educause Security Task Force and myriad federal agencies including the NSF and the Department of Energy have all made it clear that network security is a top priority, and DDoS attacks tend to be among the most costly of all attacks. 16

DDoS Attack Costs: The 2nd Most Expensive Type of Information Security Incident in 2004 According to the 9th Annual CSI/FBI 2004 Computer Crime and Security Survey (see gocsi/db_area/pdfs/fbi/FBI2004.pdf at page 10): -- viruses were (in aggregate) the single most expensive type of information security incident (costing 269 organizational respondents a total of $55,053,900, or an average of $204,661/organization) -- denial of service attacks were the second most expensive type of information security incident, costing those same respondents $26,064,050 (an average of $96,892 each).

17 A Meaningful, Tough, Problem I would also add that dealing with network denial of service attacks, as an example of a complex, meaningful, tough, real world network problem, is precisely the sort of advanced practical networking challenge that Internet2 member universities should be taking on in the security space. If we don't pay attention to the distributed denial of service issue, we run the risk of jeopardizing Abilene's special interconnectivity with federal mission networks. Internet2 may be one of the few networks where

research on IPv6 and IP multicast DDoS is possible. There are also Internet2 corporate partners/corporate sponsors who are active in the DDOS space, providing additional opportunities for collaboration. 18 Why Are DDoS Attacks An Issue Now? Extensive botnets (literally millions of compromised consumer desktop computers) have been deployed over the last few years for the purpose of delivering spam. Internet Service Providers have recently begun to take steps to block those botted hosts from being easily used

for spamming (e.g., by blocking all port 25 traffic except for officially authorized servers). Less spam! Wonderful! If youre a spammer and youve got 100,000s of zombied hosts that are no longer usable for sending spam, what are you going to do with them? Just forget about them? No Youll look for other ways you can make money with those assets -- such as using them to conduct denial of service attacks against uncooperative extortion targets. Ugh. 19 What Does Your Campus Leadership

Need to Know About DDoS Attacks? Every Executive Is Different We recognize that every executive or campus administrator is different, and some may have dramatically different levels of interest in particular technology issues. For example, some may be technology enthusiasts and passionately interested in knowing all the details of networking security's nuts and bolts, but most will be busy and preoccupied with other concerns and just want the bottom line nutshell message. So let's start with that nutshell message and then

expand from there, recognizing that often simply describing a problem may result in them making collaborative suggestions for potential solutions. 21 The Nutshell Message Using a distributed denial of service (DDoS) attack, determined professional miscreants can take you, or virtually any other networked site, off the Internet for as long as they want -- or at least make you work very hard in order to stay on. Notes: 1) Feel free to publicly dispute this Personally, I dont believe in

taunting hackers or challenging folks to demonstrate that they can take a site down -- Im perfectly willing to just stipulate that they probably can do so, instead, saving us both the trouble of a pointless (and really unnecessary) proof-by-demonstration. 2) Im also willing to stipulate that with substantial effort you might be able to make a given site DDoS resistant, but I dont believe that even five percent of Internet2 sites have done so. 22 Huh? What's A Distributed Denial of Service Attack?" In a distributed denial of service attack, network traffic from thousands of hacked computer systems -- often systems

located all over the Internet -- gets used in a coordinated way to overwhelm a targeted network or computer, thereby preventing it from doing its normal work. For example: -- the institution's connection or connections to the Internet may be made to overflow with unsolicited traffic (a so-called "packet flood") -- web servers may be inundated with hundreds of thousands of malicious repeated requests for web pages -- campus name servers may become so swamped that university computer users have problems visiting either local web sites or web sites on the Internet 23

Resisting the Geek Temptation This is the point where you might be tempted to start explaining about IRC command and control channels, and SYN attacks vs. directed broadcast attacks vs. Resist the temptation. Part of the problem with DDoS is that it really is a family of attacks, rather than a single vulnerability, and it is easy to get tied up in the details. For the executive audience, the key thing is not how distributed denial of service attacks work, but rather what distributed denial of service attacks can do. Stay on message. 24

Effects of a DDoS: The systems and networks that are the target of the distributed denial of service attacks are still there and haven't been hacked or compromised, BUT they are too overloaded to do useful work. An attack that is targeting a single server or desktop can have collateral damage against an entire site, at least to the extent that infrastructure (such as a common Internet connection) is shared. When a denial of service attack stops or is abated, the targeted system or systems are usually able to rapidly resume normal operation; lingering direct

effects should be minimal or non-existent. Regrettably, blocking or abating one DDoS usually will not prevent another one from occurring. 25 By Way Of Analogy Were all familiar with "DoS attacks" in real life -- Vandals may insert foreign material in a keyhole or coin slot, thereby preventing a door from being opened or a vending machine from being used, -- Picketers may temporarily block access to a facility, -- Bomb threats may get called in by a terrorist.

Unfortunately network DDoS attacks tend to be on a whole different scale, are able to be launched from virtually anywhere, and potentially can disrupt far more people, for a far longer period of time. 26 Now, With A Casual Understanding of the Problems, Solutions Often Get Suggested People, including senior administrators, like to make sure that their staff havent missed something obvious as a result, once theyve learned about a problem like DDoS attacks, they may suggest some possible solutions

27 "So What's The Big Deal? Why Don't You Guys Just Block The Problematic Traffic? It's trickier to just block the problematic traffic than you might think for a variety of reasons. For example: -- If your regular Internet (and/or Internet2) connection is being flooded with inbound traffic, you need to block it upstream, BEFORE it can traverse the last network links into your university. If you just try to filter the traffic at your campus border, well, it's too late at that point your inbound network pipe will still be unusably full. Filtering traffic upstream requires the cooperation of your

upstream network service provider (NSP), and some NSPs may have limited engineering staff devoted to dealing with DDoS attack-related issues. 28 " "What's The Big Deal? Why Don't You Guys Just Block The Problematic Traffic?" (cont.) -- The miscreant DDoS'ing you may have an army of tens of thousands (or hundreds of thousands of compromised hosts) and the hosts he's using may constantly change. The sheer mechanics of filtering that many sources can be technically challenging -- for example, some routers and other network hardware may be unable to handle large filter

lists and significant network traffic loads -- You need to separate the "baby from the bathwater:" attack traffic may be indistinguishable from legitimate traffic. -- Attempts to limits particular types of traffic (e.g., total UDP traffic) may break fundamental and/or advanced applications (DNS, IP multicast, etc.) -- Attackers may change their attack mechanism over time, adapting their attack to overcome blocks you put into place. 29 "How About This: What If We Treat It Like A Blizzard, And Just Plan to 'Ride It Out?'" While there is a certain insouciance to the idea of having

"denial-of-service days" (sort of like more traditional "snow days"), executives should understand that denial of service attacks can be sustained for days -- or even weeks or more -- at a time. For example, Spamhaus, a major anti-spam activist organization, was subject to an attempted denial of service attack that lasted for three months. (See ) Taking an entire denial-of-service term off would have material impacts on a university's ongoing operations, and probably would simply be unacceptable. 30

"Let's Just Disconnect For a While" While disconnecting from the Internet would certainly insure that attack traffic coming from the Internet cannot DoS university systems and would allow-intra-campus operations to resume, disconnecting entirely is itself a form of self-imposed denial of service, and would likely not be well received by campus constituents. In the case of inbound DDoS attacks targeting a particular non-mission critical host, disconnecting that single host may be a pragmatically viable strategy Likewise, in cases where compromised hosts are being used to generate outbound flows, disconnecting those compromised hosts will almost always the right thing to

do (unless you're trying to collect live forensic evidence for prosecution) 31 Example of Taking a DDoS Target Offline 32 University of Chicago: An Outgoing DDoS Host Gets Taken Offline 33

"Call the FBI and Let Them Sort It All Out." The FBI and other law enforcement (LE) officials will typically be interested in major DDoS attacks resulting in $50K or more in damages, however their attention will not provide symptomatic relief when a DoS occurs, nor is it a guarantee of a successful investigation and eventual prosecution DDoS cases are hard to put together. You should also understand that many times denial of service attacks are transnational, which raises special investigatory issues, requires LE coordination with foreign counterparts, and can introduce investigative delays. Denial of service attacks committed by individuals

overseas (and attacks made by minors whether here in the US or abroad), if able to be successfully prosecuted, may yield rather abbreviated sentences. That fact may dampen LE enthusiasm for proceeding with a potentially hard-toinvestigate, hard-to-prosecute, low-payoff case. 34 Netherlands: 5 Day DDoS; 38 Day Sentence 35 First Successful US Investigation of a DDoS 36

Dismissed (for now) 37 "Are Internet2 Universities Really at Risk?" Everyone on the Internet is vulnerable to denial of service attacks, which obviously includes Internet2 universities and gigapops. As "proof by example," if you Google around a little, it isn't hard to find examples of Internet2 universities or gigapops that have been hit with denial of service attacks

38 Front Range 39 University of Alaska-Anchorage 40 University of Houston

41 University of Tennessee-Chattanooga 42 Those Sites Are In Pretty Good Company I don't want you to think that being the victim of a denial of service is some sort of evidence of gigapop or campus level issues, because it's not. In fact, those three example universities are in excellent company when it comes to being targeted for denial of service attacks

43 Yahoo, Google, MSN Have Been Hit 44 Internet Advertising Companies Have Been Hit 45 Internet DNS Root Servers Have Been Hit

46 Amazon, CNN, eBay, eTrade, etc. Have Been Hit 47 DDoS Attacks Can Hit Anyone No one is immune from DDoS attacks. That's why it is important to spend some time thinking about this issue now, before you get hit by a denial of service attack. 48

What Motivates DDoS Attacks? Extortion: some sites are hit with DDoS attacks if they refuse to pay "protection money" Direct Action: in other cases, a DDoS may be designed to directly accomplish a particular task, such as rendering a particular internet service unusable (example: a DDoS targeting an anti-spam DNSBL site) Revenge: other sites may DDoS'd as an act of revenge for an actual or perceived slight or act of disrespect Ideology: a site may be targeted for a denial of service because it is associated with particular political, religious, cultural or philosophical beliefs Notoriety: because DDoS's are often very newsworthy,

engaging in a DDoS attack can be one way of attempting to garner publicity or call attention to an cause 49 What Motivates DDoS Attacks? (cont.) Peer Recognition/Social Status some attackers may not care about general publicity, but may be highly motivated by approval and recognition from smaller in groups such as miscreant clans. Design Errors: Some denial-of-service-like attacks are simply the result of design errors in legitimate consumer hardware; this can result in what amounts to a real denial of service attack, albeit an unintentional one.

Simple Problems of Scaling to Internet Size Audiences: Similarly, mere mention of a sufficiently interesting web site on a popular news site such as can be sufficient to "DDoS" some sites Let's briefly consider a couple of those motives 50 DDoS Extortion Rackets 51 Why Would Anyone Pay An Extortionist?

Extortionists may preface their discussions by providing a brief convincing demonstration of their capabilities. Complaining to law enforcement authorities may result in limited immediate symptomatic relief. Inhouse staff and/or upstream providers may demonstrate a limited ability to technically help. The cost of paying the extortionist may be less than the cost of hardening the network and systems to resist the attack, or less than the cost of business lost if the DDoS does occur; they may simply be running the numbers. Obviously, paying up is a really bad idea (if only because extortion is illegal under the Hobbs Act, 18 USC 1951), extortionate demands may continually escalate, and by

paying you may be encouraging/inspiring others to try it)52 Is Higher Education An Attractive Target For DDoS-Enforced Extortion Attempts? Imagine a threatened DDoS attack during a crucial time, such as during a prime window for students to submit applications for admission how many of us now rely on online applications for a significant proportion of our matriculating class? How tight is that window? Do you routinely send out printed backup application materials? Or maybe you have closely defined windows for students to enroll in classes via an online portal -- what would the impact be if your enrollment system was offline for half a

day or a day during peak registration times? Or how long could you continue to function without access to your institutional teaching and learning system? Or your administrative ERP system? I think higher education IS vulnerable to DDoS extortion. 53 Im Skeptical About The Extortion Thing Okay, take the extortion scenario off the table. Are there other reasons why people might want to DDoS you? For example, have you had to deal with student P2P file sharing issues, perhaps as a result of RIAA or MPAA DMCA complaints? Were those students feeling happy?

Or maybe you had to discharge an employee recently -was he or she disgruntled at being terminated? Does your university do scientific testing using animals, or undertake defense-related research work, or do anything else that might serve as a lightning rod for an online act of protest? Heck, sometimes a site may get DoSd accidentally, when something as obscure as a networked university time server ends up getting used in unexpected ways 54 Example of an Unintentional Design Error "DDoS"

55 Reasons Aside, The Outcomes The Same Regardless of the reason for a flood of traffic thats acting as a denial of service -- extortion, revenge, unintentional design error or something else, the outcomes the same: as the target of what is (or what amounts to) a denial of service attack, a university system or network may be rendered unusable. Stay on message, focus on the outcome of a DDoS. 56

That May Be Enough for An Initial Meeting You will have functionally defined the DDoS problem, explaining how a DDoS can affect university operations You will have continued to discuss some of the unique characteristics that make dealing with online denial of service attacks difficult You will have overcome the audience's temptation to go into denial by showing them that real universities are getting hit (as are best-of-breed Internet properties) You will have explored at least a few possible reasons for DDoS attacks (extortion, revenge and simple inadvertent design errors). At the end of that meeting, you might be charged

with an action item: Figure out what we should do about this DDoS thing, and then lets meet again. 57 Figuring Out What Your Campus Should Do Starting With Your Own Staff The agenda for your meeting with your staff probably needs to cover at least four areas: 1) review what was shared with campus senior leaders, 2) talk about how your campus will identify DDoS

attacks, 3) talk about campus strategies for DDoS mitigation, and 4) conclude by talking about opportunities for collaborative action against DDoS attacks including making sure that your own hosts don't participate in DDoS attacks. 59 ==> DDoS Identification Ironically, one of the hardest problems you may initially face is simply identifying and confirming that an attack is going on.

Some institutions may have limited formal network monitoring in place, and as a result the first indication that "something's wrong" may be user complaints. In other cases, you may have monitoring in place, but some outbound attacks may fall below the threshold of materiality for I2 schools with large pipes. You may not notice a couple of Mbps attack, but a business living at the end of a skinny pipe (like a frame relay T1) sure will! In other cases, hopefully in MOST cases, you WILL have formal networking monitoring in place, including an intrusion detection system monitoring network traffic for attack attempts. One clear challenge is avoiding false positives.

60 A Spike In Traffic Isnt Always a DoS Attack Once your staff begins to suspect that something is wrong, differential diagnosis of a DoS attack will require them to first rule out some other possibilities. For example, could it be that systems or networks are simply experiencing higher-than-normal real loads? Particularly in the Internet2 community, remember that substantial effort has been expended on developing high performance networked applications that may fairly-butfully utilize available network capacity. Real apps may *look like* a DOS attack, but you should not reward successful end-to-end performance experiments,

appropriately done by legitimate users, with summary disconnection from the network! 61 Normal Failures You also need to carefully exclude the possibility that systems are unavailable simply because a normal failure has occurred. Systems and interfaces will die from time to time, fiber will accidentally get backhoed, and unprotected power may be interrupted. Obviously none of those failures are DDoS attacks. When you hear hoofbeats, look for horses, not elk, first. Be vigilent, but dont be paranoid. Not everything is a

DDoS attack. 62 Where Was Degraded Performance Seen? -- Was degraded performance seen on a single server? -- A set of servers all running a single particular app? -- One particular subnet? -- Across all of campus? -- Across the entire Internet (or at least across all of Internet2)? See or, for Internet2, see -- On smaller networks, you may be able to informally

localize the affected areas. -- On larger networks, help desk ticketing summaries or real time systematic performance monitoring with tools like Nagios may help you do troubleshooting and problem extent isolation. 63 When Was Traffic Seen? DDoS Timing Can we tell when the DDoS started? Is the DDoS still going on? Is it continuous, or intermittent? Graphical SNMP-based traffic representations produced by tools such as MRTG or RRDtool may help you tease

out attack timing issues. 64 Digging In Now that youve localized where and when the attack occurred, [maybe] your staff can begin to dig in. Is flow-level (Netflow) data available for the relevant part of campus for the intervals of interest? Are current or retrospective packet-level traffic samples (or at least SYNs) available for review? Are staff members seeing IDS event reports? Of course, if you dont have solid network monitoring

infrastructure deployed, it may be hard for you to do some or all of those things. Suggested action item for your staff: review your campus system and network monitoring and IDS infrastructure now, before you need access to this data for DDoS-related purposes. 65 What About Commercial DDoS ID Tools? There are excellent commercial DDoS identification tools that will help to automate the process of identifying and characterizing DDoS attack traffic, however those tools may be prohibitively expensive for ubiquitous

deployment, although obviously prices may change over time, particularly as market demand ramps up and competitive pressures increase. 66 ==> DDoS Mitigation DDOS DEFENSE CHALLENGE :The seriousness of the DDoS problem and the increased frequency, sophistication and strength of attacks have led to the proposal of numerous defense mechanisms. Yet, although many solutions have been developed, the problem is hardly tackled, let alone solved.

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms, Jelena Mirkovic and Peter Reiher, 67 All DDoS Attacks Arent One Single Animal It is important to recognize that there are many different types of DDoS attacks, and mitigating one type of DDoS attack may require completely different steps than would be required for another type. For example, a denial of service attack that targets a vulnerability in a particular operating system or

application may be best handled by insuring that that O/S or application gets suitably patched. Similarly, if you have a host that is participating in an outbound attack on another site, mitigation may be a synonym for disconnecting that host from the network. What, however, can we do about distributed denial of service attacks that are manifested as massive traffic floods? 68 Mitigating Traffic-Flooding DDoS Attacks Mitigating a traffic-flooding distributed denial of service

attack is usually a collaborative process of filtering or diverting that traffic, and will usually involve your institution's networking staff working with your Gigapop or Abilene engineers, your commodity ISP's engineers and security staff, etc. 69 Directly Sinking Attack Traffic Via Blackhole Communities In some cases, provision may be made for downstream customers to self-tag routes with blackhole community values following the process outlined at or as discussed in more detail at This approach allows attack traffic to be blackholed by a targeted site in an efficient fashion, as close to the attack source as possible. If your provider does not support this sort of direct approach, youre looking at spending time on the phone with them to arrange for manual creation of blackhole routes when youre under attack. Thats not so hot. Suggested Action Item For Your Staff: Do our providers support blackhole communities? If so, do you know what values to use if you need them?

70 I2 and Some Gigapops Are Already Doing This, As Are Some Carriers BGP Communities in Abilene Calren BGP Blackhole Communities CalREN%20BGP%20Blackhole%20Comm.pdf SprintLinks BGP Policy UUNet

2004-03/msg00078.html XO dia/features/BGPpolicy.pdf 71 Ingress Filtering Another example of a concrete step that you can take which can help ameliorate at least one class of denial of service attack is ingress filtering, as documented in BCP 38. See: Action item: have your staff verify that your site is

following the best common practices documented in BCP 38. 72 Remember QoS? I dont want to leave you with the impression that blackholing or ingress filtering are the only approach people have suggested for dealing with DDoS attacks. For example, those of you who were really sad when QoS fell off the collective consciousness of Internet2 may take heart -- QoS has come up yet again, this time in the context of mitigating DoS attack traffic. See for

example: Mitigating Network DoS Attacks, Packet, Vol 16 #1, Q1 2004 ( ac253/about_cisco_packet_issue_home.html ) And there are others (but we wont go into them now). 73 ==> Collaborating With Others There are tremendous opportunities for collaborative effort with respect to distributed denial of service attacks. Obviously the process of a carrier blackholing traffic upstream from a target customer is one concrete

example of how collaboration can make a difference, but there are other opportunities where collaboration can help your institution prepare to deal with the DDoS threat. 74 Networking (People, Not Wire, Style) Do your network engineers and security staff know the Abilene engineers (and your commodity ISP's engineers and security staff?) If not, this might be something to work on rectifying BEFORE a DoS attack occurs. Internet2 Joint Tech Meetings tend to provide a natural

forum for meeting and interacting with Internet2 technical staff, and NANOG may be a suitable forum for your engineers to learn who's-who when it comes to operational network security at major commodity network service provider. NANOG presentations often include network security-related topics. Do your technical staff members attend these meetings? Action item: Make sure technical staff gets involved with the operational network security community. 75 If Staff Travel To Meetings Is Impossible If technical staff can't go to Joint Techs or NANOG, you

should at least encourage them to take advantage of mailing lists and talks available free of charge on the Internet. Some excellent DDoS/Bot related talks include: -- Hank Nusbacher's "DDoS: Undeniably a Global Internet Problem Looking for a Global Solution," -- Honeynet's "Know Your Enemy: Tracking Botnets" -- John Kristoff's botnets talk from NANOG 32 -- Peter Moody's botnets talk from the SLC Joint Techs 20050214-Botnets-Moody.pdf

-- Additional resources: 76 Other Opportunities to Collaborate Arbor's DDoS Fingerprint Sharing Alliance ( ) Bleeding Snort ( ) Drone Armies / Botnet Research and Mitigation Mailing List (contact [email protected] or [email protected]) Educause Security Task Force content.asp?SECTION_ID=30

FIRST ( ) InfraGard ( ) Internet2 Security Initiatives ( NSP-SEC (see: ripe-46/presentations/ripe46-nspbof-nsp-sec.pdf ) 77 Looking at Anti-DDoS Vendors Sometimes you'd just like to work with a vendor, buying a commercial solution to help deal with a problem like DDoS attacks. There are many different vendors who will be happy to

collaborate with you in the anti-DDoS space. A couple of them include: -- Arbor Networks (an Internet2 Corporate Sponsor, and long time collaborator with Internet2 on traffic anomaly detection and mitigation) -- Cisco (an Internet2 Corporate Partner, and a company which has recently signaled increased interest in the anti-DDoS space by buying Riverhead for $39M) 78 Making Sure Your Own Hosts Don't Participate in DDoS Attacks A few basic steps include:

-- watch outbound (as well as inbound) traffic for issues -- insure that your hosts are patched up to date, and are running antivirus/antispyware software, and are using a software (or personal hardware) firewall -- consider scanning campus hosts with Nessus, etc. -- install anti-spoofing filters on each subnet and your border router (Cisco has a nice anti-DDoS suggestion page: ) -- make sure your contact information is current for your domain, your IP address block, and your ASN whois information; you should also have both RFC2142required [email protected] and [email protected] contact addresses, and those addresses should be read

79 Thanks For The Chance to Talk Today! Are there any questions? 80

Recently Viewed Presentations

  • Functional Strategies - Texas Tech University

    Functional Strategies - Texas Tech University

    Functional Strategies. ... Qualitative and Quantitative for each functional area. Feedback is essential. What was done vs. what was supposed to be done. What changes need to be made. Google implementing tablet OS to combat iPad. Implementing Strategies.
  • El Verbo IR  IR es el infinitivo  No

    El Verbo IR IR es el infinitivo No

    * El Presente del Verbo IR: (irregular in the present tense) Yo Tú Usted, él, ella Nosotros, nosotras Vosotros, vosotras Ustedes, ellos, ellas voy vas va vamos vais van * El Presente del Verbo IR The verb ir is generally...
  • Intro to Cells

    Intro to Cells

    Arial MS Pゴシック Blank Presentation Microsoft Organization Chart Intro to Cells Cell Theory Overview of Cell Types & Domains/Kingdoms* Prokaryotes, generally Prokaryotic Features/Structures Prokaryotic Structures* & their functions (1 of 2) *=not always present Prokaryotic Structures & their functions (2...

    "Never miss out!" Enabling people to make informed decisions using . reliable user-driven data.
  • General Compliance Briefing University of California Ethical Values

    General Compliance Briefing University of California Ethical Values

    The following scenarios provide an insight into fraud awareness and establish a foundation for fraud management. Utilizing the confidential and anonymous Whistleblower Hotline to report potential instances of fraud, waste and abuse is a key step in preserving UC's resources.
  • Poppies L/O: AO1: Read, understand and respond to

    Poppies L/O: AO1: Read, understand and respond to

    Weir has commented that she likes the adventure of 'cross dressing' in terms of her use of language, often borrowing from the 'language of other genres, be it fashion, art… and so on'. This is apparent in 'Poppies' where the...
  • Prezentace aplikace PowerPoint -

    Prezentace aplikace PowerPoint -

    CHARAKTERISTIKA. Maláskupina savců . Název celého řádu je nepřesný, pásovci mají nejvíce zubů mezi savci - (96 -104) Společným znakem je zvláštní spojení hrudních a bederních obratlů - zkostnatěné vazy, které zpevňují páteř
  • Powerpoint Jeopardy

    Powerpoint Jeopardy

    This makes it seems that the forest is moving. Question 5 - 30 How have Macbeth and Lady Macbeth switched roles from Act I to Act V? Answer 5 - 30 Macbeth was originally driven crazy by guilt after the...