Citrix Blogs

Recent DDoS Attacks: How To Protect Yourself and Your Business

October was full of surprises on the cyber security front – including a perennial nuisance – the continual growth and evolution of Distributed Denial of Service (DDoS) attacks.

DDoS is a nuisance that’s affecting big names, and big companies. Recent attacks have shown us that DDoS attacks have, yet again, evolved and are starting to target emerging technologies, which may not have security requirements or standards in place yet. For example, we’re seeing that these attacks are now weaponizing insecure Internet of Things devices, which in turn is making IoT a liability to the Internet. That’s right – Internet-facing devices (soon projected to number in the billions) – thermometers, DVR recorders, webcams and tea kettles are being commandeered and used as “IoT Cannons” to disrupt web sites and services.

Recent Evolution of DDoS Attacks

As Brian Krebs from KrebsonSecurity reports in his investigation, an attack against “a large number of Web sites was launched with the help of hacked ‘Internet of Things’ (IoT) devices, such as CCTV video cameras and digital video recorders, new data suggests.”

In another post, Krebs writes that DDoS is evolving from using a “large robot network, or botnet of hacked computers… to paying a few bucks for a subscription to one of dozens of booter or stresser services.” He goes on to add why these attacks are more effective and can achieve higher volumes of traffic, the target is the victim of spoofing using a “technique called traffic amplification and reflection…In this type of assault, the attacker sends a message to a third party, while spoofing the Internet address of the victim. When the third party replies to the message, the reply is sent to the victim — and the reply is much larger than the original message, thereby amplifying the size of the attack.”

There are many ways to launch an DDoS attack – freely available network stressors and DDoS tools can be configured and controlled in botnets with command and control, as with Low Orbit Ion Cannon (LOIC), an early generation point and click tool used on message boards and IRC. More advanced tools include nation state-backed “Internet Cannons” that weaponize valid Internet user traffic by rewriting HTTP requests to flood targeted websites.

What is the motive behind these attacks?

Perhaps this is a type of active reconnaissance or “recon by fire.” Last month Bruce Schneier warned that someone is learning how to take down the Internet. Schneier describes that “these attacks are significantly larger than the ones they’re used to seeing. They last longer. They’re more sophisticated. And they look like probing… as if the attacker were looking for the exact point of failure… to see what the company’s total defenses are… to demonstrate their defense capabilities for the attacker.”

What can Citrix do to protect against DDoS?

Citrix NetScaler checks client connection and request parameters to prevent flood attacks until a valid application request has been submitted. Jason Samuel has an excellent and comprehensive post on mitigating these attacks. Using NetScaler, we can defend against attacks at multiple layers. From his blog:

Earlier this year we announced a partnership with Webroot to dynamically blacklist malicious IP addresses globally. With NetScaler running build 11.0 or later, you have an IP Reputation subscription, which is included in the Platinum subscription. From the product documentation: “IP Reputation is an extremely effective tool in identifying the IP address that is sending unwanted requests. You can use the IP reputation list to preemptively reject requests that are coming from the IP with the bad reputation. For example, you can use this feature to optimize application firewall performance by filtering out the requests that you do not want to process. You can reset or drop the connection, or you can configure a responder policy to take a specific responder action.” Here are some examples of attacks that you can prevent by using IP Reputation:

Watch this video by Brian Tannous on how to configure and see IP Reputation in use.

https://www.youtube.com/watch?v=WedxwiEVuG4

Whether it’s protecting layers 3 and 4 or defending against logic attacks at the application layer,

NetScaler provides a multilayer approach to DDoS protection coupled with built-in IP Reputation service. To learn more about security best practices and tips, visit our security page: Citrix.com/secure.

Exit mobile version