Rise of the Machines - Institute for Critical Infrastructure Technology

Internet” report, Akamai noted a 71% increase in the number of DDoS attacks from Q3 2015, a. 77% increase in Layer 3 and 4 attacks, and a 138% increase in ...
3MB Sizes 2 Downloads 118 Views
Rise of the Machines: The Dyn Attack Was Just a Practice Run December 2016 Authors James Scott, Sr. Fellow, ICIT Drew Spaniel, Research, ICIT Copyright © 2016 Institute for Critical Infrastructure Technology – All Rights Reserved

Upcoming Event Learn More about the concepts discussed in this publication at the 2017 ICIT Winter Summit.

Registration is Now Open – www.ICITWinterSummit.org

1

Contents Contents ........................................................................................................................................................ 1 Introduction .................................................................................................................................................. 3 A Simplification of the Internet .................................................................................................................... 4 Protocols ....................................................................................................................................................... 5 ISO OSI..................................................................................................................................................... 5 TCP/IP ...................................................................................................................................................... 6 Anatomy of a Distributed Denial of Service Attack ................................................................................. 7 Constructing a Botnet ........................................................................................................................... 7 Conventional Botnets ............................................................................................................................ 9 IoT Botnets.......................................................................................................................................... 10 Launching a DDoS Attack .................................................................................................................. 11 DDoS-as-a-Service ............................................................................................................................. 12 Mirai Incidents ............................................................................................................................................ 13 KrebsonSecurity...................................................................................................................................... 13 OVH ISP ................................................................................................................................................. 14 Dyn.......................................................................................................................................................... 16 Liberia ..................................................................................................................................................... 18 Lappeenranta, Finland............................................................................................................................. 19 Trump/ Clinton Campaigns..................................................................................................................... 21 WikiLeaks ............................................................................................................................................... 22 Russian Banks ......................................................................................................................................... 23 Evolution of IoT Malware .......................................................................................................................... 25 Linux.Darlloz .......................................................................................................................................... 25 Aidra ..................................................................................................