SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Water Torture:
A Slow Drip DNS DDoS Attack on QTNet
Kei Nishida, Network Center
Kyushu Telecommunication Network Co.,Inc
2
About QTNet
• Company Name
 Kyushu Telecommunication Network Co., Inc. (QTNet, for short)
 Telecommunicasions carrier in Kyushu , Japan
• Services
 Wide-Area Ethernet
 FTTH
 Internet Access,VoIP,TV
Q
3
What is Water Torture?
• A type of Distributed denial-of-service attack to DNS Servers.
• Authoritative DNS servers is the target of this attack.
• However, as a side effect, Cache DNS Server(Internet service
providers DNS server) ‘s load is increased.
• Since January 2014, this attack has been reported around the world.
 Attack is ongoing.
January 2014
bps
Overview of the Attack part 1
4
Open
Resolvers
Cache DNS Server
Authoritative
DNS Server
(example.com)
AttackerBotnets
DNS Query
abcdefg1.example.com
abcdefg2. example.com
abcdefg3. example.com
and so on
1. the Attacker command his botnets.
2. So many bots send to send a small number of random queries to open
resolvers(Customer Broadband routers).
3. Open resolvers send random queries to Cache DNS Server.
4. Cache DNS Servers send random queries to Authoritative DNS Server.
1.
2.
3.
4.
Overview of the Attack part 2
5
• Authoritative DNS servers go down with many DNS
queries which are sent by Cache DNS Servers(Internet
service providers DNS servers)
• Cache DNS Server(Internet Service providers DNS server)
go down with many DNS queries which are sent by Open
resolvers = customer broadband routers.
QTNet Case -Overview
6
• From 29 May. 2014, queries from botnets grown up.
• QTNet Cache DNS Server was effected by these traffic.
 Alarm occurs the system resources of Cache DNS
Server has reached the limit value.
 Some customers informed that they could not access
some web sites by their devices.
• To Block the Attack, we tried some measures.
QTNet Case -Traffic from Botnets
7
29 May 30 1 June31
• The areas which are colored indicate the specific botnet ip address.
• 1/2 traffic was came from non specific botnet ip address.
Traffic of 53 port destination from Internet to QTNet Network
non specific
specific
QTNet Case -Traffic from Botnets
8
• Is a tendency of traffic has changed from June 14.
Traffic of 53 port destination from Internet to QTNet Network
non specific
10 Jun 11 12 13 14 15
QTNet Case –Cache DNS Server
9
QTNet Case –How to Block the Attack 1
10
• We put the zones which is target of attack on Cache DNS Servers. Like this.
$TTL xxxxxx
@ IN SOA localhost. localhost. (
2014052900 ; Serial [yyyymmddhh]
xxh ; Refresh[xxh]
xxh ; Retry [xxh]
xxd ; Expire [xxd]
xxd ) ; Minimum[xxd]
IN NS localhost.
• Cache DNS Server could reply “NXDOMAIN” without contacting to
Authoritative DNS Server. However,…
 The zone of target was changed frequently.
 Our operators had to monitor the attack and put the zones manually
24 hours a day.
QTNet Case –How to Block the Attack 2
11
• We use the iptables module (hashlimit) on Cache DNS Servers.
 The packets to the same authoritative DNS server from the cache DNS Server, setting a
certain threshold by hashlimit.
 The packets which are over the limits are rejected with icmp-port-unreachable message.
So, Cache DNS Server can reply “SERVFAIL” without contacting to Authoritative DNS Server.
Iptables Overview
QTNet Case – Additional measures
12
• The fundamental problems are open resolvers and traffic
from the botnets.
• We are asking customers to update their broadband router’s
firmware(so as not be open resolvers).
QTNet Case – Additional measures
13
• We think IP53B.
 Block the destination port 53(udp) traffic from the
internet to QTNet customer(dynamic ip address only).
Summary
14
• QTNet could block “Water Torture: A Slow Drip DNS DDoS
Attack “ by iptables hashlimit module.
 Operation of "allow list" is necessary.
• The fundamental problems are open resolvers and traffic
from the botnets.
• Some vendors have released the DNS protocol base block
functions, not Layer-3 base block. We are expecting that
these functions goes well.
References
15
• Yasuhiro Orange Morishita@JPRS: About Water Torture
 http://2014.seccon.jp/dns/dns_water_torture.pdf (accessed Jun 7th 2015)
• SECURE64 BLOG -Water Torture: A Slow Drip DNS DDoS Attack
 https://blog.secure64.com/?p=377 (accessed Jun 7th 2015)
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Is unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniquesIs unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniques
Sarthak Patel
 

Was ist angesagt? (20)

DNS exfiltration using sqlmap
DNS exfiltration using sqlmapDNS exfiltration using sqlmap
DNS exfiltration using sqlmap
 
Suricata
SuricataSuricata
Suricata
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 example
 
What is a Rainbow Table?
What is a Rainbow Table?What is a Rainbow Table?
What is a Rainbow Table?
 
A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5
 
Http request smuggling
Http request smugglingHttp request smuggling
Http request smuggling
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
 
pfSense presentation
pfSense presentationpfSense presentation
pfSense presentation
 
Socket programming in python
Socket programming in pythonSocket programming in python
Socket programming in python
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Is unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniquesIs unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniques
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
SQL Injection: complete walkthrough (not only) for PHP developers
SQL Injection: complete walkthrough (not only) for PHP developersSQL Injection: complete walkthrough (not only) for PHP developers
SQL Injection: complete walkthrough (not only) for PHP developers
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking Explained
 
Linux Kernel - Virtual File System
Linux Kernel - Virtual File SystemLinux Kernel - Virtual File System
Linux Kernel - Virtual File System
 
Secure SHell
Secure SHellSecure SHell
Secure SHell
 
Console Menu - pfSense Hangout December 2016
Console Menu - pfSense Hangout December 2016Console Menu - pfSense Hangout December 2016
Console Menu - pfSense Hangout December 2016
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 

Andere mochten auch

Andere mochten auch (16)

Pseudo Random DNS Query Attacks and Resolver Mitigation Approaches
Pseudo Random DNS Query Attacks and Resolver Mitigation ApproachesPseudo Random DNS Query Attacks and Resolver Mitigation Approaches
Pseudo Random DNS Query Attacks and Resolver Mitigation Approaches
 
Состояние сетевой безопасности в 2016 году
Состояние сетевой безопасности в 2016 году Состояние сетевой безопасности в 2016 году
Состояние сетевой безопасности в 2016 году
 
From Policy to Practice: Addressing and Routing in 2014 by Geoff Huston [APRI...
From Policy to Practice: Addressing and Routing in 2014 by Geoff Huston [APRI...From Policy to Practice: Addressing and Routing in 2014 by Geoff Huston [APRI...
From Policy to Practice: Addressing and Routing in 2014 by Geoff Huston [APRI...
 
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
 
Dns Amplification Zafiyeti
Dns Amplification ZafiyetiDns Amplification Zafiyeti
Dns Amplification Zafiyeti
 
2016년 4분기 주요 정보보안 소식 20170101 차민석_공개판
2016년 4분기 주요 정보보안 소식 20170101 차민석_공개판2016년 4분기 주요 정보보안 소식 20170101 차민석_공개판
2016년 4분기 주요 정보보안 소식 20170101 차민석_공개판
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
The DNS Tunneling Blindspot
The DNS Tunneling BlindspotThe DNS Tunneling Blindspot
The DNS Tunneling Blindspot
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
 
Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Mirai botnet
Mirai botnetMirai botnet
Mirai botnet
 
MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 

Ähnlich wie Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2015]

DMMS presentation25
DMMS presentation25DMMS presentation25
DMMS presentation25
Yuri Alimov
 
DMMS presentation29
DMMS presentation29DMMS presentation29
DMMS presentation29
Yuri Alimov
 

Ähnlich wie Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2015] (20)

KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
DMMS presentation25
DMMS presentation25DMMS presentation25
DMMS presentation25
 
Drilling Down Into DNS DDoS
Drilling Down Into DNS DDoSDrilling Down Into DNS DDoS
Drilling Down Into DNS DDoS
 
SFMap (TMA 2015)
SFMap (TMA 2015)SFMap (TMA 2015)
SFMap (TMA 2015)
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam ObszyńskiPLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1
 
ARW03o.ppt
ARW03o.pptARW03o.ppt
ARW03o.ppt
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptx
 
DMMS presentation29
DMMS presentation29DMMS presentation29
DMMS presentation29
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
 
SWIFT: Tango's Infrastructure For Real-Time Video Call Service
SWIFT: Tango's Infrastructure For Real-Time Video Call ServiceSWIFT: Tango's Infrastructure For Real-Time Video Call Service
SWIFT: Tango's Infrastructure For Real-Time Video Call Service
 
DevOops - Lessons Learned from an OpenStack Network Architect
DevOops - Lessons Learned from an OpenStack Network ArchitectDevOops - Lessons Learned from an OpenStack Network Architect
DevOops - Lessons Learned from an OpenStack Network Architect
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austin
 
DDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP InfrastructuresDDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP Infrastructures
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
 
Successes and Challenges of IPv6 Transition at APNIC
Successes and Challenges of IPv6 Transition at APNICSuccesses and Challenges of IPv6 Transition at APNIC
Successes and Challenges of IPv6 Transition at APNIC
 

Mehr von APNIC

Mehr von APNIC (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 

Kürzlich hochgeladen

VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 

Kürzlich hochgeladen (20)

Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 

Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2015]

  • 1. Water Torture: A Slow Drip DNS DDoS Attack on QTNet Kei Nishida, Network Center Kyushu Telecommunication Network Co.,Inc
  • 2. 2 About QTNet • Company Name  Kyushu Telecommunication Network Co., Inc. (QTNet, for short)  Telecommunicasions carrier in Kyushu , Japan • Services  Wide-Area Ethernet  FTTH  Internet Access,VoIP,TV Q
  • 3. 3 What is Water Torture? • A type of Distributed denial-of-service attack to DNS Servers. • Authoritative DNS servers is the target of this attack. • However, as a side effect, Cache DNS Server(Internet service providers DNS server) ‘s load is increased. • Since January 2014, this attack has been reported around the world.  Attack is ongoing. January 2014 bps
  • 4. Overview of the Attack part 1 4 Open Resolvers Cache DNS Server Authoritative DNS Server (example.com) AttackerBotnets DNS Query abcdefg1.example.com abcdefg2. example.com abcdefg3. example.com and so on 1. the Attacker command his botnets. 2. So many bots send to send a small number of random queries to open resolvers(Customer Broadband routers). 3. Open resolvers send random queries to Cache DNS Server. 4. Cache DNS Servers send random queries to Authoritative DNS Server. 1. 2. 3. 4.
  • 5. Overview of the Attack part 2 5 • Authoritative DNS servers go down with many DNS queries which are sent by Cache DNS Servers(Internet service providers DNS servers) • Cache DNS Server(Internet Service providers DNS server) go down with many DNS queries which are sent by Open resolvers = customer broadband routers.
  • 6. QTNet Case -Overview 6 • From 29 May. 2014, queries from botnets grown up. • QTNet Cache DNS Server was effected by these traffic.  Alarm occurs the system resources of Cache DNS Server has reached the limit value.  Some customers informed that they could not access some web sites by their devices. • To Block the Attack, we tried some measures.
  • 7. QTNet Case -Traffic from Botnets 7 29 May 30 1 June31 • The areas which are colored indicate the specific botnet ip address. • 1/2 traffic was came from non specific botnet ip address. Traffic of 53 port destination from Internet to QTNet Network non specific specific
  • 8. QTNet Case -Traffic from Botnets 8 • Is a tendency of traffic has changed from June 14. Traffic of 53 port destination from Internet to QTNet Network non specific 10 Jun 11 12 13 14 15
  • 9. QTNet Case –Cache DNS Server 9
  • 10. QTNet Case –How to Block the Attack 1 10 • We put the zones which is target of attack on Cache DNS Servers. Like this. $TTL xxxxxx @ IN SOA localhost. localhost. ( 2014052900 ; Serial [yyyymmddhh] xxh ; Refresh[xxh] xxh ; Retry [xxh] xxd ; Expire [xxd] xxd ) ; Minimum[xxd] IN NS localhost. • Cache DNS Server could reply “NXDOMAIN” without contacting to Authoritative DNS Server. However,…  The zone of target was changed frequently.  Our operators had to monitor the attack and put the zones manually 24 hours a day.
  • 11. QTNet Case –How to Block the Attack 2 11 • We use the iptables module (hashlimit) on Cache DNS Servers.  The packets to the same authoritative DNS server from the cache DNS Server, setting a certain threshold by hashlimit.  The packets which are over the limits are rejected with icmp-port-unreachable message. So, Cache DNS Server can reply “SERVFAIL” without contacting to Authoritative DNS Server. Iptables Overview
  • 12. QTNet Case – Additional measures 12 • The fundamental problems are open resolvers and traffic from the botnets. • We are asking customers to update their broadband router’s firmware(so as not be open resolvers).
  • 13. QTNet Case – Additional measures 13 • We think IP53B.  Block the destination port 53(udp) traffic from the internet to QTNet customer(dynamic ip address only).
  • 14. Summary 14 • QTNet could block “Water Torture: A Slow Drip DNS DDoS Attack “ by iptables hashlimit module.  Operation of "allow list" is necessary. • The fundamental problems are open resolvers and traffic from the botnets. • Some vendors have released the DNS protocol base block functions, not Layer-3 base block. We are expecting that these functions goes well.
  • 15. References 15 • Yasuhiro Orange Morishita@JPRS: About Water Torture  http://2014.seccon.jp/dns/dns_water_torture.pdf (accessed Jun 7th 2015) • SECURE64 BLOG -Water Torture: A Slow Drip DNS DDoS Attack  https://blog.secure64.com/?p=377 (accessed Jun 7th 2015)