41
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks Karim El Defrawy, Minas Gjoka, Athina Markopoulou UC Irvine

BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

  • Upload
    wilma

  • View
    47

  • Download
    2

Embed Size (px)

DESCRIPTION

BotTorrent: Misusing BitTorrent to Launch DDoS Attacks. Karim El Defrawy, Minas Gjoka, Athina Markopoulou UC Irvine. Outline. Introduction How BitTorrent works Using BitTorrent to launch DDoS attacks Experiment details and results Can we fix BitTorrent to prevent such attacks? - PowerPoint PPT Presentation

Citation preview

Page 1: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Karim El Defrawy, Minas Gjoka, Athina Markopoulou

UC Irvine

Page 2: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 3: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Introduction

o In 2006, 60% of Internet traffic was due to peer-to-peer (P2P) protocols (Cache Logic)

o BitTorrent is more than 35% by end of 2006 (Cache Logic)

o Mininova torrent search engine hit 2 billion downloads (Mininova - June 13th 2007)

Page 4: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
Page 5: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

P2P traffic is rising

Page 6: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
Page 7: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

BitTorrent is responsible for a significant amount of P2P traffic

Page 8: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

P2P based DDoS attacks recently observed

o announced on May 14th 2007 observing an increase in P2P based DDoS attackso Attack based on the direct connect (DC) P2P systemo Attack involved over 300 000 IPso http://www.prolexic.com/news/20070514-alert.php

Page 9: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

P2P based DDoS attacks recently observed

o announced on May 14th 2007 observing an increase in P2P based DDoS attackso Attack based on the direct connect (DC) P2P systemo Attack involved over 300 000 IPso http://www.prolexic.com/news/20070514-alert.php

P2P DDoS is already happening !

Page 10: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 11: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How BitTorrent works?- User publishes torrents

- Set up a tracker to coordinate the download

Page 12: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How BitTorrent works?- User publishes torrents

- Set up a tracker to coordinate the download

1- Users download torrents

Page 13: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How BitTorrent works?- User publishes torrents

- Set up a tracker to coordinate the download

1- Users download torrents

2- Users’ clients contact tracker to join swarm and get list of peers in swarm

Page 14: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How BitTorrent works?- User publishes torrents

- Set up a tracker to coordinate the download

1- Users download torrents

2- Users’ clients contact tracker to join swarm and get list of peers in swarm

3- Download different parts of file from different peers

Page 15: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 16: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Different attacks

Entity Faked BT Mode Requirements

Report Fake Peer Centralized Tracker Mode

Send a spoofed message to tracker announcing victim as peer

Report Fake Tracker Centralized Tracker Mode

Publish torrents pointing to victim as a tracker

(multi-tracker)

Report Fake Peer DHT Mode Send fake BT PING message to DHT network spoofing source address of victim

Page 17: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Different attacks

Entity Faked BT Mode Requirements

Report Fake Peer Centralized Tracker Mode

Send a spoofed message to tracker announcing victim as peer

Report Fake Tracker Centralized Tracker Mode

Publish torrents pointing to victim as a tracker

(multi-tracker)

Report Fake Peer DHT Mode Send fake BT PING message to DHT network spoofing source address of victim

Page 18: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How an attack faking tracker works?

- Attacker publishes fake torrents with multiple tracker entries (or single)

- Set up a tracker to report high number of seeders and leechers for these torrents

Page 19: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How an attack faking tracker works?

- Attacker publishes fake torrents with multiple tracker entries (or single)

- Set up a tracker to report high number of seeders and leechers for these torrents

1- Users download torrents with fake trackers pointing to victim

Page 20: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How an attack faking tracker works?

- Attacker publishes fake torrents with multiple tracker entries (or single)

- Set up a tracker to report high number of seeders and leechers for these torrents

1- Users download torrents with fake trackers pointing to victim

2- Clients contact victim in hope of starting the download

Page 21: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

How an attack faking tracker works?

- Attacker publishes fake torrents with multiple tracker entries (or single)

- Set up a tracker to report high number of seeders and leechers for these torrents

1- Users download torrents with fake trackers pointing to victim

2- Clients contact victim in hope of starting the download

….

Page 22: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 23: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Experiment Setup

o Victim machine: Pentium 2, 512 Mbps RAM, Debian Linux, 100Mbps Ethernet, running a light HTTP server

o Modified tracker reports a fake (high) number of seeders and leechers to search engine

o Publish fake torrents on search engines

o Wait ….

Page 24: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Proof of concept attack results

Exp. #

# Torrents

Ports Attacked Throughput (Kbps) Total Unique #

Hosts

TCP Conn. Avg/sec

New Host Interarrival Time (sec)

Open (Freq) Closed Avga Maxa

I 10 1 (1) 6 62.77 127.2 25331 753.93 7.89

II 25 1 (10) 10 137.78 520.4 55127 1400.74 3.62

III 25 1 (1) 501 132.97 380.3 86320 1580.88 2.31

IV 25 1 (50) + 1 (1) 49+201 176.69 482.8 58046 1440.17 3.44

a Excluding the initial transient period (6 hours) of the experiment

Page 25: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Number of TCP connections per second

Page 26: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Attack throughput

Page 27: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Amount of traffic from clients

Page 28: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Distribution of sources in the IP address space

Page 29: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

o Attack sources in 2433 ASs on the Internet

o Attack sources in 12424 announced BGP

prefixes

Mapping attack sources to ASs and BGP prefixes

Page 30: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Attack ports

Page 31: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Related Work

o Attack using Overnet : poison around 7000 files to be effective (Naoumov - 2006)

o Attack faking client: poison swarms of 1119 torrents to generate several thousand TCP connections (Cheung Sia - 2006)

o Attack faking tracker is more effective: tracker is a central point in the architecture

Page 32: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 33: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

We contacted:

o BitTorrent and Bram Cohen

o Search Engines: Mininova, Pirate Bay,

BitTorrent Monster

o Clients developers: Azureus, Bitcomet

o Prolexic

o Response from Azureus developers only

Reporting the problem

Page 34: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Solutions

o Handshake between clients and trackers similar to the one between clients.

o Clients exchange view of trackers similar to exchanging view of peers.

o Mechanism to identify and trace the seeders of the fake torrents (based on hashes).

Page 35: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Outline

o Introductiono How BitTorrent workso Using BitTorrent to launch DDoS attackso Experiment details and resultso Can we fix BitTorrent to prevent such attacks?o Summary

Page 36: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Summary

o Presented misusing BitTorrent to launch DDoS attacks

o Proof of concept attack implementationo Analyzed characteristics of the attacko Proposed fixes to BitTorrent to detect and

prevent such attackso Currently implementing fixes

Page 37: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Questions ?

Page 39: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

100

101

102

103

104

105

0

0.002

0.004

0.006

0.008

0.01

0.012

0.014

B G P P refix Rank

Fra

cti

on

of

IPs

th

at

we

re i

n A

tta

ck

Distribution of IPs on BGP Prefixes

Page 40: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

100

101

102

103

104

0

0.005

0.01

0.015

0.02

0.025

0.03

0.035

0.04

A S Rank

Fra

cti

on

of

IPs

in

AS

th

at

we

re i

n A

tta

ck

Distribution of IPs on ASs

Page 41: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

Unique hosts per second