Tuesday, March 3, 2020

The future of DDoS attacks

These attacks ferociously increase in volume and frequency, with a worrying speed.

2 or 3 years ago, Anonymous blocked the website of the US Senate with 20 Mb/s. More recently, Cloudflare has been very perturbed, numerous times, by attacks exceeding 100 Gb/s; attacks using 400 Gb/s have also been seen this year. It is even considered that the Tb/s limit will be reached and exceeded before the end of 2015.

The basic idea is to call a large number of servers (such as the DNS – name server, the NTP – time server, or Quake, CoD – online videogame protocols…) by using a UDP (User Datagram Protocol). This protocol, whose role is to enable the data transmission between two units, is one of the main protocols used by the Internet. Thanks to the UDP, it is possible to use a third person’s IP address to make the packets bounce (fragmentation of the transmitted data) and hide the source of the attack.

The idea is to send, for instance to a game server, a request for the list of current games from the target’s IP and not one’s own. This request will take a few octets and the answer can take several hundreds of Kilo octets, or even Mega octets. The pirate asks the gaming list, from the target’IP (by changing his source IP address), then “invests” a few octets into hundreds of game servers, and the target receives enormous waves of packets and bandwidth from all those servers. The higher the multiplication coefficient (the amplification factor) between the size of the minimal request and the size of the answer, the more efficient the DrDoS.

Beyond the number and volumes of the attacks, they also became a reflex for pirates. With only a few dollars an hour, it is possible to use a network of compromised machines and to make them do a DDoS. From the office computer from which I write this article, with a simple Perl script, I can send a DDoS of many Gb/s in a few minutes.

Although these action can be punished by a strong fine reaching up to 75.000€ and a 3 year prison sentence, the authors are never found (and very hardly findable anyway). DDoS attacks are thus a simple weapon, needing very little technical knowledge and money, and terribly efficient.


More Info: what is a ddos

No comments:

Post a Comment