Rise of the Machines - Institute for Critical Infrastructure Technology

The cost of a DDoS-for-hire service varies based on the size of the botnet, the type of attack, the .... Akamai is the largest CDN, and it may operate the most ...
3MB Sizes 0 Downloads 115 Views
Rise of the Machines: The Dyn Attack Was Just a Practice Run December 2016 Authors James Scott, Sr. Fellow, ICIT Drew Spaniel, Research, ICIT Copyright © 2016 Institute for Critical Infrastructure Technology – All Rights Reserved

Upcoming Event Learn More about the concepts discussed in this publication at the 2017 ICIT Winter Summit.

Registration is Now Open – www.ICITWinterSummit.org

1

Contents Contents ........................................................................................................................................................ 1 Introduction .................................................................................................................................................. 3 A Simplification of the Internet .................................................................................................................... 4 Protocols ....................................................................................................................................................... 5 ISO OSI..................................................................................................................................................... 5 TCP/IP ...................................................................................................................................................... 6 Anatomy of a Distributed Denial of Service Attack ................................................................................. 7 Constructing a Botnet ........................................................................................................................... 7 Conventional Botnets ............................................................................................................................ 9 IoT Botnets.......................................................................................................................................... 10 Launching a DDoS Attack .................................................................................................................. 11 DDoS-as-a-Service ............................................................................................................................. 12 Mirai Incidents ............................................................................................................................................ 13 KrebsonSecurity...................................................................................................................................... 13 OVH ISP ................................................................................................................................................. 14 Dyn.......................................................................................................................................................... 16 Liberia ..................................................................................................................................................... 18 Lappeenranta, Finland............................................................................................................................. 19 Trump/ Clinton Campaigns..................................................................................................................... 21 WikiLeaks ............................................................................................................................................... 22 Russian Banks ......................................................................................................................................... 23 Evolution of IoT Malware .......................................................................................................................... 25 Linux.Darlloz .......................................................................................................................................... 25 Aidra ..................................................................................................