In this article, I will cover the main DoS techniques and how they look in the logs. I will also cover some main mitigation techniques.
ICMP Flooding (flood ping)
An example of tcpdump for DDoS flood ping:
Note different source IP addresses (indicative of an army of botnets performing a DDoS attack).
LAND
⛔️ Outdated.
The system sends packets are sent to itself in a loop.
Smurf
- Multiple ICMP requests from several machines (one is seen in the dump).
- Frequent requests
B
in the requests stands for Broadcast, which makes it different from theping
dump.
Fraggle
Similar to the Smurf attack but uses UDP instead.
B
in the requests stands for Broadcast, which makes it different from theping
dump.- Multiple UDP requests from several machines.
- Frequent.
- Usually, the destination port is
7
(echo
).
UDP-Storm or Echo-Chargen
- Port
19
(chargen
) > port7
(echo
) OR13
(daytime
) OR37
(time
). Instead ofecho
one could use any other port that automatically replies to a request. - This creates a loop because both are configured to reply automatically.
❗️ This problem was eliminated on newer systems. Such ports as
echo
ortime
do not respond to requests sent from ports < 1024 or of a broadcast type.
Ping of Death
- Start with ICMP of a larger size.
- Following fragments of unusual size, some systems fail to reassemble and crash/hang.
SYN Flood Attack
- A lot of
SYN
packets are sent in a short period. - Same destination port.
Mitigation
SYN cookies
They are used to protect against SYN flood attacks. Shifts the responsibility of keeping the connection state info to the client.
Steps
Construct a unique sequence number.
time()>>6 max segm size Enc(k,t, serverIP, serverPort, clientIP, clientPort)
time()>>6
- 5 bits.max_segm_size
- 3 bits.Enc(k,t, serverIP, serverPort, clientIP, clientPort)
- 24 bits.
Micro blocks
16 bytes of data instead of full connection objects allocated on the server.
RST cookies
Return an error for each client upon connection initiation. It generates and sends RST cookies along. If the client returns with the same cookie - proceed with the connection.
Stack Tweaking
Selectively drop the connection and timeout for individual connections.
DNS Aplification
Use a public DNS server to flood the victim with DNS replies. Requires a botnet, each bot sending a DNS request with a spoofed IP (the victim’s IP).
nmap -sU -p53 -sV --script=dns-recursion.nse IP
Weird Scan
SYN
andFIN
flag together (not normal). Many additional flags have weird orders of requests, likeSYN
followed bySYN+FIN
etc.- It Could be used to determine the OS type + circumvent the port scanning rules.
SLOWRIS
- The attacker initiates multiple connections to the targeted web server, often using low bandwidth or low computational power.
- The attacker sends partial HTTP requests to the server, but deliberately keeps the connections open without completing the requests.
- The attacker periodically sends small, incomplete requests, and ensures that each connection is kept alive by periodically sending additional headers or data.
- The server’s resources become tied up as it keeps waiting for the open connections to complete the requests.
- Eventually, the server reaches its maximum connection limit, and legitimate users are unable to establish new connections or access the server’s resources.
Mitigations
- Setting up load balancers or reverse proxies: These can help distribute and manage connections, reducing the impact of slow or malicious clients.
- Configuring web server settings: For example, reducing the maximum connection timeout or limiting the number of concurrent connections from a single IP address.
- Implementing application-level protections: This can involve monitoring and detecting slow or incomplete requests, and terminating connections that show suspicious behavior.
- Employing rate-limiting techniques: Applying restrictions on the number of connections allowed per client or implementing connection rate limits.
General Mitigation Techniques
- Traffic filtering (block ICMP/UDP flood, ACLs etc).
- Rate limiting for a given IP.
- IDP/IPS.
- Load Balancing.
- Traffic analysis and anomaly detection.
- Cloud-based protection services.