Telco Transformation: enable you to deploy and offer DDoS mitigation-as-a-service at a low CapEx and a low OpEx.
Read more
Run Bastions Services on premises for a truly consistent and seamless hybrid experience
Learn more
TAP the lucrative market for DDoS Protection.
Be Our Partner
The Capture The Flag challenge: Get on the top of the scoreboard and win an Pentester Expert Coin !
Enroll now
In the first half of 2022, the total attack count and average attack size increased by 75.60% and decreased by 55.97% respectively compared to the figures recorded in the second half of 2021. Learn More
Cybersecurity best practices and DDoS defence strategies
While the ongoing implementation of DNSSEC (Domain Name System Security Extensions) continued to drive the growth of DNS Amplification attacks in 3Q 2019, the sharp rise in TCP SYN flood attacks is also worthy of considerable attention. TCP SYN flood isn’t new, but our findings suggest that the techniques behind the latest round of attacks have become ever-more sophisticated.
To start, let’s review how TCP SYN flood attacks work: In order to establish a TCP connection, the three-way TCP handshake must be completed. It begins with the client requesting a connection by sending a SYN message to the server. Then, the server acknowledges by replying with a SYN-ACK message to the client. Finally, the client responds with an ACK message to establish the connection.
During an attack, an attacker sends repeated SYN packets to every port on a targeted server, often using a spoofed IP address. The server, unaware of the attack, receives multiple, apparently legitimate requests to establish communication. It responds to each request with a SYN-ACK packet from each open port.
The malicious client doesn’t send the expected ACK, or, if the IP address is spoofed, never receives the SYN-ACK. Either way, the server under attack will wait for acknowledgement of its SYN-ACK packet. While waiting, the server cannot close down the connection by sending an RST packet. Therefore, the connection remains open. Before the connection times out, another SYN packet comes in. Over time, a large number of half-open connections accumulate until they overflow, denying legitimate clients the ability to establish connections.
In Type 1 (56.36% of SYN flood attacks in Q3), an attacker mobilizes a huge number of random, spoofed IP addresses to send an enormous volume of SYN requests to a single IP, causing the victim server to respond with SYN-ACK packets to voluminous malicious requests. Type 1 attacks are easy to mitigate, since most source IPs are only used a few times, but they all target the same destination. Because of this pattern, a TCP authentication filter can easily flag and drop malicious SYN packets from spoofed source IPs. Also, ISPs deploying preemptive measures are likely to drop malicious source IPs that do not belong to them.
In Type 2 (33.24% of SYN flood attacks in Q3), an attacker leverages a large, fixed pool of real IP addresses (e.g., servers, routers, IoT devices) to generate malicious SYN packets to hit one destination IP per attack. Most Type 2 attacks were smaller than 1Mbps, but in some cases attack sizes were 100Mbps. One extreme case where traffic was diverted from a cloud service provider reached 424.2Mbps.
When targeting an Internet host, an attacker typically prefers to maintain anonymity by spoofing the source IP address. But using real IP addresses of hijacked machines or devices offers certain advantages. Here are the reasons Nexusguard believes that real IP addresses were used in some of the SYN flood attacks we observed:
If malicious SYN traffic threatens to break the defence and hit the target server directly, SYN cookie, a technique used to resist IP spoofing attacks, can be the second layer of defence, which is more effective in mitigating Type 1 attacks. But it is much less so in mitigating Type 2 attacks due to a high volume of malicious traffic.
In Type 3 (10.40% of SYN flood attacks in Q3), multiple, fixed spoofed-source IPs are used to abuse two destination IPs. After tracking their sources Nexusguard found that most source IP addresses were valid, leading us to believe that such attacks were Distributed Reflection Denial of Service (DRDoS) attacks. Here, an attacker sends a spoofed SYN packet with the original source IP replaced by the victim’s IP address to random or pre-selected reflection IP addresses.
The service ports at the reflection addresses reply with a SYN-ACK packet to the victim of the spoofed attack. When the victim does not respond with the last ACK packet, the reflection service will continue to retransmit the SYN-ACK packet, resulting in continued reflection.
When the attack is distributed through multiple reflectors, the attack vector is called a distributed reflection denial-of-service (DRDoS) attack. From the attacker’s perspective, this DRDoS is an extremely cost-effective way to launch denial-of-service attacks to the victim by taking advantage of a wide range of innocent addresses to reflect attack traffic. Any server with an open TCP port, which are widely available and accessible, can be leveraged as reflectors, making DRDoS attacks difficult to mitigate.Download the Q3 2019 Threat Report here.
Thank You!
We will get back to you shortly.
TCP SYN flood as a type of network-layer attack isn’t new, but our Q3 2019 research findings suggest that the techniques behind the latest round of TCP SYN flood attacks have become ever-more sophisticated.
© 2023 Nexusguard - All Rights Reserved. Read Our Privacy Policy.