170 likes | 183 Views
This paper presents a comprehensive overview of DDoS attacks in Korea, including trends, targets, and the impact of major incidents. It discusses the challenges in detecting and mitigating application-layer attacks and emphasizes the importance of endpoint security. Lessons learned from a significant DDoS attack in 2009 are shared, along with recommendations for effective countermeasures, such as DNS Sinkhole Servers and a proposed Prevention Law to combat the spread of Zombie PCs. The importance of information sharing between government and private sectors, as well as cross-border collaboration, is highlighted. The need for a Control Tower for a coordinated national response to large-scale attacks is emphasized. The document also outlines initiatives for ISP research and development to enhance botnet detection and response capabilities.
E N D
Experience with DDoS 2010. 5. Jeong, Hyun-Cheol
DDoS Attacks in Korea Countermeasures against DDoS Attacks in Korea Conclusion 1 2 3 Contents
DDoS Attacks in Korea 1 • DDoS Attack Trends • 7.7 DDoS Attack and Lessons
Status of the IP Network in Korea Population of S.Korea: 49 M 1st domain : 1.8 M - .kr : 1M - GTLD(.com, .net, …) : 0.8 M Host : 8.7 M ISP : 154 IDC : 60 VoIP User : 7.1 M Mobile Phone User : 46 M High-speed Internet User : 15.7 M IP TV User : 1 M Internet User : 36 M 1 M : 1,000,000
Status & Trends DDoS Attack In Korea DDoS Attacks in Korea Risk Portal, Public Site • First DDoS attack is occurred in 2006 • Increase of target systems • - Small Websites Major Websites(Bank, Portal, …) • Increase of a ransom DDoS • Increase of Application-layer DDos attack (Above 50%) • - HTTP Get flooding, Slowloris, SIP flooding • - Network Bandwidth Consumption System Resource Consumption • Hard to detect and block App.-layer DDos attack • - Because Each Zombie PC generates small traffic, Hard to detect • by legacy security solution. Bank, Shopping, Game Site On-line Game Site Chat, Gamble Site DNS, Private IP targeted DDoS Web Server targeted DDoS 2006 2007 2008 2009
7.7 DDoS Attack (1/3) • Attack Time : Every 6 p.m. July 6. 2009 ~ July 9. 2009 • Attack Targets : 22 Korean sites, 14 U.S sites • - Korean sites : the Blue House, National Assembly, major portal & banking sites, … • Estimated Damage : 3,300 ~ 4,950 million dollars (Src. : Hyundai Research Institute) 1st Day Attack 6 PM, July 7 After DDoS Destruct Hard disk 0 AM, July 10 2nd Day Attack 6 PM, July 8 3rd Day Attack 6 PM, July 9
7.7 DDoS Attack (2/3) - Characteristics • Very Large scale and Organized Attack • - Zombies were infected from the famous Korean Web hard site • which had been exploited • - Lots of Zombie PCs (about 115,000) were used in attack • - Lots of Servers(about 400) were used in control the zombies • Premeditated and Intelligent Attack • - Attack started 6 PM that was coded in Malware(Logic Bomb) • - Zombie’s Hard disk were destructed after DDoS erase the attack evidence • We could not know who the attacker were and why their intention were
More attention to Endpoint Security Expand Information Sharing Need of Control Tower 7.7 DDoS Attack (3/3) - Lessons Network Defense Ex) Blocking of C&C Channel, Filtering the DDoS Traffic • In Korea, DDoS Defense was primarily focused on • network security such as blocking C&C Channel, filtering traffics. • - But, 7.7 DDoS Attack was rarely used C&C Server • We should more attention to endpoint security! • - But, It is not easy. C&C Zombie PC Zombie PC Zombie PC End point Defense Ex) Detection/Removal of Malicious code from zombie PCs • Information Sharing of Government and Private Sector • - Cooperation between Government, ISP, Anti-Virus vendor, and DDoS vitim • - Sharing of Malicious Code Samples, Attack Logs, and the result of analysis • Cross-border Information Sharing • - US was also attacked 2 days before 7.7 DDoS (2009/7/5) • - Zombies and Servers used in 7.7 DDoS were distributed in about 60 contries • Control Tower is need for the effective national response to large-scale attack 8
Countermeasures against DDoS Attacks in Korea 2 • Operation of DNS Sinkhole Server • Improvement of Legal Framework • Development of Technologies
Operation of DNS Sinkhole Server Before DNS sinkhole operation After DNS sinkhole operation Bot C&C Bot C&C KISASinkhole server ④ Sending command Target Sites ③ Connect C&C Bot infected PC’s information ③ Connect SinkholeBot infected PCs out of control from botmaster ⑤ DDoS Attack ② Return C&C IP address ② Return Sinkhole IP address ① C&C DNS query ① C&C DNS query ISP DNS server ISP DNS server Bot infected PCs Bot infected PCs
Zombie PC Prevention Law (Draft) Objective • Prevent spread of Zombie PCs • - strengthen the online security requirements for both individuals and companies • Rapid response by information sharing Major Contents • Request Improvement of SW Vulnerabilities to SW developer • Order to remove malware from web sites • Limit Zombie PCs internet connection in an emergency • Able to Access to zombie PCs for Incident Analysis Issues • Excessive and may compromise liberty in Internet usage http://www.koreatimes.co.kr/www/news/biz/2010/04/123_51509.html
Objective ISP R&D - Botnet Detection and Response • Detection and Blocking the botnet abused in various cyber crime • Identifying Bot C&C and zombie PC lists and monitoring their behaviors Host based Bot Detection & Response Technology User PC (1) Spybot based real time botnet monitoring system (2) Bot Collecting, Detecting, Analyzing Server (3) Host based Botnet Traffic Filtering Agent Real-time botnet behavior data Web Firewall Spam trap system Web server Distributed botnet 명령/제어 서버 DNS Server Centralized botnet Response Policy/Rule(DNS Sinkhole, BGP Feeding, Web firewall rule,,, Router Botnet traffic Collecting Sensor Security Appliance (A) Network Behavior based Botnet Detection System Botnet information (B) Botnet Monitoring / Response System Detection event Botnet Monitoring system Network based Botnet Detection & Response Technology
Objective R&D – Automatic Malware Collection/Analysis/Response • Automation of the Life Cycle of an Incident Response • - Collection Malware Analysis Blocking traffic Removal Malware from Zombies [Malware propagation method] [Malware distributing site] System vulnerability, Web, Spam, IM Malware Collection Detecting malicious site [Malware] .ppt .doc .xls Malware AutoCollection System Malware Distribution site Detection System .EXE .EXE .DLL Flash Executable binary code Malware AutoAnalysis System [Prevent malware spread/response] .pdf • Malware DNA & response Signature Management • Zombie PC Internet Access Blocking • Malware distribution site Management • Malware classification & history Management [Malware Infected PC] Malware Information Conficker Malware spreading Prevention and malware management system Malware Infected PC Auto-Analysis system Palevo
Objective R&D - DDoS Attack Detection and Defense • 40 Gbit DDoS Attack Defense System and Secure NIC Development • Advanced Application-Layer DDoS Attack Defense System targeted on Web Services - 40G DDoS Attack Defense System - Behavior based Attack Detection - Malicious Code Detection and Management - Infected System Management 40G DDoS Attack Defense System Server Farm Web Servers Application-Layer DDoS Attack Defense System Internet - Complex, Advanced DDoS Attack Defense Technology target on Web Service - Challenge/Behavior based Defense - Policy based Management Server Farm Normal Users Secure NIC Development Attackers - Server/Host based 2G Security Offload Engine Technology - Malicious Code Detection
Objective R&D - Cooperative Security Control • Automatic Information Exchange & Cooperative Response Framework • Cyber-Attack Forecast & Alarm Technology • Auto-Response & Traceback against Cyber-Attack Attack Traceback Predicted Attack Pattern Analysis Hacker Forget Packet Detection Attack ScenarioAuto-Generation Malware Distribution Site Response Policy Generation & exchange Real-time Information Exchange & Cooperative Response Vulnerable WebServer Internet Service Provider Antivirus software companies Information exchange Entiry DDoS Target Site BlackListMonitoring Threat Attack Analysis Information exchange Entiry Malware Malware Information exchange & cooperative response Malware Single packet attaack Cyber AttackForecast/Alarm Zombie PC DDos attack National CSIRT/CERT/KISC Internet Service Provider
Information Sharing International Cooperation Awareness Conclusion • Information Sharing is the most important factor for success of effective • prevention and response the incident. • - For this purpose, We are improving the legal system and developing technology • in Korea • Cyber attacks occur in cross-border • It is need that the consensus for • - monitoring, keeping logs, information sharing, and cooperation against • cross-border incidents • It is the most difficult thing, but it is the most important for end-point security. • We should improve not only the legal framework but also awareness.