The site is down!┬á These are haunting words for most businesses, and todayÔÇÖs topic: the DDoS (Distributed Denial-of-Service) attack. This particularly nasty type of attack attempts to disrupt the availability of systems by overwhelming servers, saturating bandwidth or through other techniques. ┬áYmy business is most likely heavily reliant upon specific systems and this article provides an overview of the DDoS attack that could potentially take these key systems down and techniques for combating the DDoS.
Understanding the DDoS
DDoS attacks rely on the power of many distributed machines so the first part of a DDoS attack is assembling an army of bots.┬á Using automated tools, attackers scmy the Internet in search of vulnerable machines that are exploited and turned into bots by installing software on them that waits for commands from a command and control server.┬á These bots are used to enslave other bots until a sufficient army is assembled for the attack.
The attacker is now ready to initiate an attack with their bot army.┬á Attacks are initiated automatically or semi-automatically.┬á Automatic attacks already have the target programmed into them by the attacker so the attack takes place as soon as the bot army is assembled.┬á This minimizes interaction the attacker has with the bot army and makes it more difficult for him or her to be identified.┬á In semi-automatic attacks, instructions are sent to the bot army by the attacker through command and control servers once the bot army is assembled.
Some DDoS attacks called protocol attacks target a specific protocol or vulnerability and others use brute-force.┬á Protocol attacks take advantage of a bug in the software or a feature of the communication to tie up resources of the target so that legitimate traffic cannot be serviced.┬á Brute-force attacks bombard the system with otherwise seemingly legitimate transactions. ┬á┬áProtocol attacks would seem like the more advanced method but they can be stopped by altering the system to remove the bug or changing the way the system operates so that the feature cannot be exploited.┬á The brute-force attack is no different from legitimate traffic except for its increased volume so it is more difficult to combat.
So what can you do to prevent or mitigate DDoS?┬á We have selected five practical things you can do to protect against a DDoS attack.
First, consider increasing bandwidth and server performance.┬á DDoS attacks attempt to overwhelm available resources so additional resources will allow you to withstand greater attacks.┬á This involves having more server space or bandwidth than necessary. ┬áSuch over-provisioning addresses the number one problem brought on by a DDoS attack, link and equipment saturation.┬á Unfortunately, it can be difficult to determine how much extra hardware and bandwidth is necessary to sustain an attack as even some of the largest companies have succumbed to DDoS attacks.┬á When attacks fail, attackers often gather a larger bot army and try again.
Consider configuring your firewall or IDS (Intrusion Detection System) to filter DDoS traffic, if the functionality is available, or consider upgrading to a system that does.┬á DDoS traffic filtering devices prevent SYN, TCP Flooding and other types of DDoS attacks.┬á Such devices typically analyze TCP flow control, conduct packet filtering and utilize blacklists and whitelists.
Real Time Monitoring
Another way to protect your data against a DDoS attack is through real-time monitoring. ┬áReal-time monitoring can identify a DDoS attack early.┬á Such a system must be actively monitored so that action can be taken quickly to resolve the situation.┬á DDoS attacks can ramp up quickly so administrators might not have much time to respond once an alert comes in.┬á Integration of site and device monitoring with SIEM can leverage existing technology to protect against this attack.
It should be noted that not all DDoS attacks happen immediately.┬á Some attacks develop slowly so that they will not be noticed as easily.┬á They gradually increase the number of requests made to resources until the resources become unavailable.┬á It is important to have baselines of system performance and expected use so that these can be compared to active data in order to classify traffic as legitimate or a potential DDoS attack.
Consider monitoring log file sizes and growth rates.┬á Some monitoring tools will create a more critical event and alert when a large number of informational events are generated so that administrators can stay on top of problem areas.┬á Informational events might not appear in reports and individually they would not indicate a problem but collectively they could indicate a DDoS attempt or some other hacking activity.
Genuine users and DDoS attacks both log server events and this can cause some services to reject connections if the log fills up.┬á ┬áAs mentioned earlier, log file growth rates and sizes could indicate an attack but in order to prevent a full log from making a system unavailable you can either increase log file sizes, archive logs, or roll the logs over.┬á If systems are set to refuse connections when the log is full you should not implement log rollover because the refusal is a security mechanism meant to prevent unauthorized access.┬á In this case you should either use archiving or larger log files to keep servers available.
Finally, information security departments can work closely with the botnet hunter community. ┬áDDoS attacks rely on bots to perform their work, but if the bots are known about, control of the bots can potentially be wrested out of the attackerÔÇÖs hands. Knowing who to call that can nip the attack in the bud rather than allow it to get too big can save valuable time and effort.┬á Know who to call at your upstream service provider to help filter attacks.┬á Ymy Internet provider might have specialized equipment to help reduce DDoS attacks so put a plan in place to work with them to stop the attack.
The DDoS is an outside invasion, but not one that looks to install or plant something within the company in order to gain information. ┬áInstead, this type of attack constantly hits the server with requests that business is halted.┬á DDoS can cause a lot of damage to organizations that rely on the availability of key information systems. That is why I have outlined the above five activities that can mitigate the effects of an attack.
Sources and Further Reading