How Can We Improve Security Against Ddos Attacks?
Total Page:16
File Type:pdf, Size:1020Kb
How can we improve security against DDoS attacks? A case study: The DyN Attack in 2016 ∗ Josué Magaña César Iván Olvera Pernille Lous, Moreno, Espinosa, 755737 754822 754806 Aalto University Espoo, Finland Aalto University Aalto University Espoo, Finland Espoo, Finland [email protected] [email protected] [email protected] ABSTRACT of cyberattacks. The DDoS cyberattack targeted to Dyn in 2016 has been one of the biggest distributed denial of service In this paper we aim to investigate the DyN attack attacks ever launched which affected the availability of and use the case study in order to research possible the most important internet services including social strategies and improvement to prevent these type of networks, streaming, online banks, online stores, etc. attacks; additionally the suggestions to cope with In- making almost impossible to share and analyse what dustrial Internet of Things and Internet of Things, IIoT was happening at the moment. and IoT. It was launched by taking advantage of the vulnera- KEYWORDS ble and insecure Internet of Things (IOT) devices. This Cybersecurity, DDoS attack, Internet of things, DyN attack also used a strategy of sending different kind attack, Industrial Internet of Things of attacks at the same time by using between 50 thou- ACM Reference Format: sand and 100 thousand of source devices. Nowadays, Josué Magaña Moreno, 754822, César Iván Olvera Espinosa, there are many types of mechanisms against this kind 754806, and Pernille Lous, 755737 . 2019. How can we improve of attacks. However, these are difficult to implement security against DDoS attacks? A case study: The DyN Attack and that is why we need to offer a protection plan that in 2016: . In Proceedings of 2019. ACM, New York, NY, USA, considers security measures before and after this kind Article 4, 12 pages. https://doi.org/10.475/123_4 ∗The full version of the author’s guide is available as acmart.pdf 1 INTRODUCTION document Today, cybersecurity is one of the most discussed topic Permission to make digital or hard copies of part or all of this around the world. Even we hear about cyber attacks, work for personal or classroom use is granted without fee provided importance of good passwords and leaks of informa- that copies are not made or distributed for profit or commercial tion; yet many people ignore the serious harm that lack advantage and that copies bear this notice and the full citation on of security can cause to them [13]. Attack against indus- the first page. Copyrights for third-party components of this work trial control systems together with Industrial Internet of must be honored. For all other uses, contact the owner/author(s). 2019, Case study: , Things (IIoT) and Internet of Things (IoT) — also called © 2019 Copyright held by the owner/author(s). ubiquitous computing — represents a great threat [18] ACM ISBN 123-4567-24-567/08/06. and these attacks are increasing heavily [4]. Devices in https://doi.org/10.475/123_4 both the heal care sector, oil platforms and much more 2019, Case study: , Cybersecurity are all connected to the Internet are vulnerable to cyber stopping the DDoS attack. attacks. Distributed denial of service (DDoS) attacks are on the increase and is a major danger towards both • Politicians. Others, on the other hand, have been IIoT and IoT [15], made for these purposes. Examples of this are the threats and attacks of the hacktivist group Anony- The main objective of a DDoS attack is to saturate a mous. One of his appearances was at the end of web server, making real users cannot enter because the April 2018, when they saturated the information server can not cope with so many requests for infor- site of Nicaragua’s Government as a demonstra- mation. The most frustrating thing is that usually the tion of support for the demonstrations that the attacker does not win anything, but the big problem opposition was carrying out in that Central Amer- with DDoS attacks is the overwhelming burden associ- ican country. ated with them. • The sensation of power and fun. For others, these The servers can be protected against these attacks with are its main motivations. An example is the case filters that reject badly formed or modified packages of Mafiaboy, a 16-year-old boy who in the year with false IPs so that only legitimate packages arrive 2000 set out to affect the availability of the CNN at the server. The measures are not infallible and the site. It could also impact Amazon, Yahoo, eBay, server can always end up saturated if the attack is suf- among other companies. ficiently massive and well prepared. In addition, over the years there are more vulnera- To give us an idea of the magnitude necessary for a bilities and different ways of committing the attacks, DDoS to be effective, we can observe the traffic ofa causing a greater impact than the one suffered in Oc- server over time. Traffic during the attack (in green) is tober 2016 to Dyn. For example, on February 28, the so large that normal server traffic is barely visible. collaborative development platform GitHub suffered what was at the time the largest DDoS attack in history (1.35 terabits per second), and four days later, on March 4 this year, A website in the United States, whose name was not revealed, received an even larger attack (1.7 terabits per second). Figure 1: The traffic of a server In this paper we aim to analyse a case study of The Dyn Attack from 2016 which is a DDoS attack again Basically, a DDoS attack can only cause the fall of a domain name system (DNS) provider. The goal is the web, but depending on the kind of webpage and to present and analyse the case, do a minor literature this can be a catastrophe of great losses or not so many. study and hereby be able to answer the two following If the web page is simply informative, it will not be so research questions: affected, but if the web generates money (online stores, • What solutions can we use to prevent attacks like advertising), the owner stops making money while it the Dyn Attack? falls. • How can we improve against DDoS attacks? 1.1 Reason for the attacks We aim to use the published news in order to un- derstand the case of the DyN attack; afterwards, we During the last 20 years, distributed denial of service will investigate the issues using the existing academic attacks have been used for different purposes: literature. • Financial. The attackers extort the companies to The paper is structured as follows: First we present pay ransoms in exchange for not executing or the case study, the DyN Attack and the concept of the 2019, Case study: , How can we improve security against DDoS attacks? A case study: The DyN Attack in 2016 attack, then Section III briefly describes how this study For example, blog.kaspersky.com lives at the IP address was conducted, Section IV presents Related Work, Sec- 161.47.21.156. [17] tion V contains the Discussion in which improvements 2.1.3 Distributed denial-of-service (DDoS) attack. Other and prevention are presented. In Section VI we discuss important concept that needs to be developed is a DDoS the validity of the paper briefly, before we conclude the attack, which is an attempt made by cybercriminals to paper in Section VII. halt the normal traffic in a service, server or a network by overwhelming the target or its structure with a flood 2 CASE STUDY, THE DYN ATTACK of internet traffic. The Dyn Cyberattack was an attack that occured on October 21, 2016 that was done by a series of denial-of- These attacks are effective because they use a lot of service attacks (DDoS attacks), which targeted systems computer systems and IoT devices, principally, as their operated by the Domain Name System (DNS) provider sources to attack, which gives the possibility to affect 1 called Dyn. more in less time. [5] The attack itself caused a lot of services and internet From a high level, a DDoS attack can be imagined as platforms to be unavailable for a lot of users in North a traffic jam that is disturbing regular traffic from arriv- America (USA and Mexico) as well as in some parts ing at its desire destination. of Europe, where the groups new world hackers and anonymous claimed responsibility for the attack, but 2.2 Timeline and Impact there wasn’t too much provided evidence. [2] 2.2.1 Timeline. The attack happened in three waves according to Dyn; the first DDoS attack began at 11:10 2.1 Related concepts (UTC)2 and was resolved by 13:20. The second occurred Before going deeper on the Dyn cyberattack it is im- between 15:50 and 17:00 UTC and internet users started portant to describe some concepts referred in the case to report difficulties accessing websites. A third attack description which are: The Domain Name System and began in the night 20:00; at 22:11, Dyn reported that the DDoS attack and Mirai Malware. they had resolved the issue. 2.1.1 Mirai Malware. Mirai is malware that infects 2.2.2 Impact. The first wave affected the East Coast. smart devices that run on ARC processors, turning them The second one affected users in California and the Mid- into a network of remotely controlled bots or zombies. west, as well as Europe. The third wave was mitigated This network of bots, called a botnet, is often used by the efforts of Dyn.