53 research outputs found
Anycast Agility: Adaptive Routing to Manage DDoS
IP Anycast is used for services such as DNS and Content Delivery Networks to
provide the capacity to handle Distributed Denial-of-Service (DDoS) attacks.
During a DDoS attack service operators may wish to redistribute traffic between
anycast sites to take advantage of sites with unused or greater capacity.
Depending on site traffic and attack size, operators may instead choose to
concentrate attackers in a few sites to preserve operation in others.
Previously service operators have taken these actions during attacks, but how
to do so has not been described publicly. This paper meets that need,
describing methods to use BGP to shift traffic when under DDoS that can build a
"response playbook". Operators can use this playbook, with our new method to
estimate attack size, to respond to attacks. We also explore constraints on
responses seen in an anycast deployment.Comment: 18 pages, 15 figure
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification
In 2018, several malware campaigns targeted and succeed to infect millions of low-cost routers (malwares e.g., VPN-Filter, Navidade, and SonarDNS). These routers were used, then, for all sort of cybercrimes: from DDoS attacks to ransomware. MikroTik routers are a peculiar example of low-cost routers. These routers are used to provide both last mile access to home users and are used in core network infrastructure. Half of the core routers used in one of the biggest Internet exchanges in the world are MikroTik devices. The problem is that vulnerable firmwares (RouterOS) used in homeusers houses are also used in core networks. In this paper, we are the first to quantify the problem that infecting MikroTik devices would pose to the Internet. Based on more than 4 TB of data, we reveal more than 4 million MikroTik devices in the world. Then, we propose an easy-to-deploy MikroTik honeypot and collect more than 17 millions packets, in 45 days, from sensors deployed in Australia, Brazil, China, India, Netherlands, and the United States. Finally, we use the collected data from our honeypots to automatically classify and assess attacks tailored to MikroTik devices. All our source-codes and analysis are publicly available. We believe that our honeypots and our findings in this paper foster security improvements in MikroTik devices worldwide
Characterising attacks targeting low-cost routers: a MikroTik case study (Extended)
Attacks targeting network infrastructure devices pose a threat to the
security of the internet. An attack targeting such devices can affect an entire
autonomous system. In recent years, malware such as VPNFilter, Navidade, and
SonarDNS has been used to compromise low-cost routers and commit all sorts of
cybercrimes from DDoS attacks to ransomware deployments. Routers of the type
concerned are used both to provide last-mile access for home users and to
manage interdomain routing (BGP). MikroTik is a particular brand of low-cost
router. In our previous research, we found more than 4 million MikroTik routers
available on the internet. We have shown that these devices are also popular in
Internet Exchange infrastructures. Despite their popularity, these devices are
known to have numerous vulnerabilities. In this paper, we extend our previous
analysis by presenting a long-term investigation of MikroTik-targeted attacks.
By using a highly interactive honeypot that we developed, we collected more
than 44 million packets over 120 days, from sensors deployed in Australia,
Brazil, China, India, the Netherlands, and the United States. The incoming
traffic was classified on the basis of Common Vulnerabilities and Exposures to
detect attacks targeting MikroTik devices. That enabled us to identify a wide
range of activities on the system, such as cryptocurrency mining, DNS server
redirection, and more than 3,000 successfully established tunnels used for
eavesdropping. Although this research focuses on Mikrotik devices, both the
methodology and the publicly available scripts can be easily applied to any
other type of network device
Are Darknets All The Same? On Darknet Visibility for Security Monitoring
Darknets are sets of IP addresses that are advertised but do not host any client or server. By passively recording the incoming packets, they assist network monitoring activities. Since packets they receive are unsolicited by definition, darknets help to spot misconfigurations as well as important security events, such as the appearance and spread of botnets, DDoS attacks using spoofed IP address, etc. A number of organizations worldwide deploys darknets, ranging from a few dozens of IP addresses to large/8 networks. We here investigate how similar is the visibility of different darknets. By relying on traffic from three darknets deployed in different contintents, we evaluate their exposure in terms of observed events given their allocated IP addresses. The latter is particularly relevant considering the shortage of IPv4 addresses on the Internet. Our results suggest that some well-known facts about darknet visibility seem invariant across deployments, such as the most commonly contacted ports. However, size and location matter. We find significant differences in the observed traffic from darknets deployed in different IP ranges as well as according to the size of the IP range allocated for the monitoring
Tangled:A Cooperative Anycast Testbed
Anycast routing is an area of studies that has been attracting interest of
several researchers in recent years. Most anycast studies conducted in the past
relied on coarse measurement data, mainly due to the lack of infrastructure
where it is possible to test and collect data at same time. In this paper we
present Tangled, an anycast test environment where researchers can run
experiments and better understand the impacts of their proposals on a global
infrastructure connected to the Internet
Discutindo a educação ambiental no cotidiano escolar: desenvolvimento de projetos na escola formação inicial e continuada de professores
A presente pesquisa buscou discutir como a Educação Ambiental (EA) vem sendo trabalhada, no Ensino Fundamental e como os docentes desta escola compreendem e vem inserindo a EA no cotidiano escolar., em uma escola estadual do município de Tangará da Serra/MT, Brasil. Para tanto, realizou-se entrevistas com os professores que fazem parte de um projeto interdisciplinar de EA na escola pesquisada. Verificou-se que o projeto da escola não vem conseguindo alcançar os objetivos propostos por: desconhecimento do mesmo, pelos professores; formação deficiente dos professores, não entendimento da EA como processo de ensino-aprendizagem, falta de recursos didáticos, planejamento inadequado das atividades. A partir dessa constatação, procurou-se debater a impossibilidade de tratar do tema fora do trabalho interdisciplinar, bem como, e principalmente, a importância de um estudo mais aprofundado de EA, vinculando teoria e prática, tanto na formação docente, como em projetos escolares, a fim de fugir do tradicional vínculo “EA e ecologia, lixo e horta”.Facultad de Humanidades y Ciencias de la Educació
Characterising attacks targeting low-cost routers: a MikroTik case study (Extended)
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An attack targeting such devices can affect an entire autonomous system. In recent years, malware such as VPNFilter, Navidade, and SonarDNS has been used to compromise low-cost routers and commit all sorts of cybercrimes from DDoS attacks to ransomware deployments. Routers of the type concerned are used both to provide last-mile access for home users and to manage interdomain routing (BGP). MikroTik is a particular brand of low-cost router. In our previous research, we found more than 4 million MikroTik routers available on the internet. We have shown that these devices are also popular in Internet Exchange infrastructures. Despite their popularity, these devices are known to have numerous vulnerabilities. In this paper, we extend our previous analysis by presenting a long-term investigation of MikroTik-targeted attacks. By using a highly interactive honeypot that we developed, we collected more than 44 million packets over 120 days, from sensors deployed in Australia, Brazil, China, India, the Netherlands, and the United States. The incoming traffic was classified on the basis of Common Vulnerabilities and Exposures to detect attacks targeting MikroTik devices. That enabled us to identify a wide range of activities on the system, such as cryptocurrency mining, DNS server redirection, and more than 3,000 successfully established tunnels used for eavesdropping. Although this research focuses on Mikrotik devices, both the methodology and the publicly available scripts can be easily applied to any other type of network device
- …