DDoS Attack
A distributed denial of service or DDoS attack can be described as a malicious attempt that aims in disrupting the normal traffic of a particular network, server of its surrounding infrastructure. A DDoS attack floods the surrounding network infrastructure with a flooded internet traffic that disrupts the normal operation of that network or server. Effectiveness in DDos attack is generally achieved by the making use of a number of compromised systems as a source of attack traffic (Moustis & Kotzanikolaou, 2013). A high level DDoS attack can be related to a traffic jam that prevents the regular movements of traffic. An attacker will need to gain a complete control of a network to enforce a DDoS attack. The report will be discussing the concepts of DDoS attack and will give an overview of the Melbourne IT attack that took place in April 2017. The outcome and the impact of the Melbourne IT attack will be discussed in the following sections.
Distributed denial of service attack is a primary concern associated with the use of internet. It can be described as a cyber attack that is being attempted with an aim of compromising the network traffic of an organization (Wang et al., 2015). The distributed denial of service attack is a subclass of the denial of service attack and it involves a number of multiple connected and online devices which is collectively known as botnet.
For enforcing a DDoS attack, the attacker needs to gain a complete control of a network associated with online machines (Wong & Tan, 2014). After establishing the botnet, the attacker gains a control on the machines associated with the server thus jamming the entire network. The botnet that is created targets the IP address of the victim computer and sends out continuous requests thus overflowing the network capacity. This leads to the creation of the denial of service attack (Darwish, Ouda & Capretz, 2013). Thus a DDoS attack can be best described as traffic jam that prevents the normal or the regular traffic in arriving to its desired destination. The DDoS attack mainly targets the application layer. The picture below represents the diagrammatic representation of a DDoS attack.
Figure 1: Representing the DDOS attack (type: HTTP flood)
(Source: Created by author using MS Visio)
The HTTP flood is quite similar to refreshing the web browsers from a number of computers simultaneously (Lonea, Popescu & Tianfield, 2013). A large number of HTTP requests floods the servers thus resulting in a distributed denial of service attack.
Melbourne IT DDoS attack
Another type of DDoS attack is SYN flood. In this attack, a worker receives a request and goes to get the packet followed by which it waits for the confirmation. Similar requests are piled up in the network until the network becomes overwhelmed and the requests start getting unanswered.
This attack does not enable the attacker to gain any confidential or private that but surely makes a particular network or server of a company completely ineffective (Kotenko & Ulanov, 2014). This can however, lead wastage of time and resources (Mousavi & St-Hilaire, 2015). The main problem behind mitigation of a DDoS attack or eliminate the chances of occurrence of a DDoS attack is that it is very difficult to differentiate between a normal traffic and a DDoS attack. A distributed denial of service attack comes in a number of forms such as a single source attack or a multiple vector attack. In a multiple vector attack, the DDoS attack makes use of multiple attack pathways in overwhelming a target in a number of ways thus distracting the mitigation efforts of the network and the servers (Santanna et al., 2015). Therefore, mitigation of DDoS attack from a multiple vectors requires a variety of strategies. There are a number of process by which a DDoS attack can be mitigated. These are as follows-
- One of the approaches for mitigation of the DDoS attack includes blackhole routing. In this process the network traffic is funneled into a single route (Wang et al., 2014). However, in this approach, the both legitimate and the malicious network traffic is routed to null route and dropped from a network in case of traffic overflow.
- Limiting the number of requests that can be accepted by a network over a certain time is another approach that is used to mitigate a DDoS attack (Zargar, Joshi & Tipper, 2013).
- Rate limiting is another approach for limiting the occurrence of DDoS attack.
A real life DDoS attack, the Melbourne IT DDoS attack, is discussed in the following section.
The Melbourne IT DDoS attack that made thousands of website inaccessible, occurred on April 1, 2017 at 10am AEST. The attack was not given any specific name and is commonly known as the Melbourne IT attack. The attack was severe that made almost 500,000 Australian website almost inaccessible for near about 90 minutes.
The distributed denial of service attack impacted a large number of customers as the DDoS attack was on the DNS servers that disrupted the web hosting, email and blocked the access to the administrative portal of a company this impacting a large number of customers (Coyne & Coyne, 2018). The incident proved that even the most secure systems can be compromised.
The DNS outage caused by the DDoS attack had a huge impact on the Melbourne IT and subsidiaries Netregistry. Melbourne IT has experienced this severe denial of service attack on its DNS servers that mainly disrupted the web hosting, email platform and in accessing the company’s administration portal. The attack started in around 10 am that affected a number of business websites.
Conclusion
However, with the identification of the DDoS attack, all the companies started working on bringing the services back to normal. In the response to the implemented DDoS attack, the companies implemented the international traffic management measures in controlling the DDoS attack. There was no such major impact of this DDoS attack as the authorities were quick enough to bring back the normal operation of the website.
This attack is a proof that the incident breached the basic security requirements of a network and the servers affecting a huge number of websites. It has been observed that Melbourne IT suffers some form of denial of service attack nearly every day but what it observed in April 13, 2017 is more than a general attack.
In order to control the attack, the organization made use of international traffic management protocols to take down the attack. Then also, it took 90 minutes to restore the websites back to normal. It was identified that almost all the attack vectors associated with the attack was from offshore and therefore the authorities planned to block the international traffics as a mitigation approach to the problem (Coyne & Coyne, 2018). Thus the domestic visitors to the website hosted by the Melbourne IT traffic had a little chance of accessing the compromised websites between 10 am and 10.45 am (Somani et al., 2017). However, after blocking the international traffic, the access to the website for the domestic visitors improved. This could have been possible only after the attack vector that was blocking the website fell below 1 gigabyte per second on around 11.30 am. After the attack was in control and the normal operation of the website could be regained, the offshore traffic of the website, which was earlier blocked, was unblocked as well. After the issues were resolved, the companies officially declared that the issues have been resolved at around 12.30 pm. The magnitude of the DDoS attack had considerably increased over the years and specially in 2016, its magnitude have increased.
As an effect of the attack, as many as 500,000 Australian websites were made inaccessible for about 90 minutes. Melbourne IT DDoS attack is considered to be serious outage as it surpassed the average waiting time of a particular traffic (Coyne & Coyne, 2018). The authorities although directed all the network engineers to work on the problem as a priority, the issue could be solved only after one and half hour. The mitigation services that have been implemented tracked down the operation and the origin of the attack, on which the international traffic management measures were implemented to eliminate the problem.
Conclusion
The report discusses the concept of distributed denial of service attack and illustrates its working principle. The DDoS attacks are implemented with an aim of making the network resources or network servers of company inaccessible for the legitimate users. The DDoS attack although does not incorporate any malicious agent compromising any confidential data of the company, it surely leads to the wastage of resources and time. It is a bit difficult to control a DDoS attack mainly because it is very difficult to identify a legitimate request or a spam request. The report discusses three most commonly methods of mitigation of DDoS attack. The report further discusses a real example of DDoS attack that took place in April 13, 2016 and is known as Melbourne IT attack. This attack compromised a number of systems and suspended the number of Australian website for good 90 minutes. The attack was however mitigated by the enforcing an international traffic management plan. The report discusses the issues associated with the Melbourne IT attack.
References
Coyne, A., & Coyne, A. (2018). Melbourne IT’s DNS falls over in ‘major outage’. Retrieved from https://www.itnews.com.au/news/melbourne-its-dns-falls-over-in-major-outage-458235
Darwish, M., Ouda, A., & Capretz, L. F. (2013, June). Cloud-based DDoS attacks and defenses. In Information Society (i-Society), 2013 International Conference on (pp. 67-71). IEEE.
Kotenko, I., & Ulanov, A. (2014). Agent-based simulation of DDOS attacks and defense mechanisms. International Journal of Computing, 4(2), 113-123.
Lonea, A. M., Popescu, D. E., & Tianfield, H. (2013). Detecting DDoS attacks in cloud computing environment. International Journal of Computers Communications & Control, 8(1), 70-78.
Mousavi, S. M., & St-Hilaire, M. (2015, February). Early detection of DDoS attacks against SDN controllers. In Computing, Networking and Communications (ICNC), 2015 International Conference on (pp. 77-81). IEEE.
Moustis, D., & Kotzanikolaou, P. (2013, July). Evaluating security controls against HTTP-based DDoS attacks. In Information, intelligence, systems and applications (IISA), 2013 fourth international conference on (pp. 1-6). IEEE.
Santanna, J. J., van Rijswijk-Deij, R., Hofstede, R., Sperotto, A., Wierbosch, M., Granville, L. Z., & Pras, A. (2015, May). Booters—An analysis of DDoS-as-a-service attacks. In Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on (pp. 243-251). IEEE.
Somani, G., Gaur, M. S., Sanghi, D., Conti, M., Rajarajan, M., & Buyya, R. (2017). Combating DDoS attacks in the cloud: requirements, trends, and future directions. IEEE Cloud Computing, 4(1), 22-32.
Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks, 81, 308-319.
Wang, H., Jia, Q., Fleck, D., Powell, W., Li, F., & Stavrou, A. (2014). A moving target DDoS defense mechanism. Computer Communications, 46, 10-21.
Wong, F., & Tan, C. X. (2014). A survey of trends in massive DDoS attacks and cloud-based mitigations. International Journal of Network Security & Its Applications, 6(3), 57.
Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE communications surveys & tutorials, 15(4), 2046-2069.