Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and...

56
Copyright © Hitachi Incident Response Team. 2009, All rights reserved. Feasibility Study of DoS attack by P2P network. Hitachi Incident Response Team Masato Terada http://www.hitachi.com/hirt/ 2009/01/20

Transcript of Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and...

Page 1: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Feasibility Study of DoS attackby P2P network.

Hitachi Incident Response TeamMasato Terada

http://www.hitachi.com/hirt/

2009/01/20

Page 2: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Opening

P2P file exchange software are spreading on the Internet. The requirements of investigation reports such as threats about P2P network are increasing.

In this presentation, we show some experiment results about P2P network enforced in StarBED which is a Large Scale Network Experiment Environment.- DoS attack by P2P network- Disable P2P network by P2P own protocol

Page 3: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Contents

1. Problems of P2P network2. Our activity against the problems3. About P2P file exchange software "Winny" & "Share“4. About StarBED5. DoS attack by P2P network6. Disable P2P network by P2P own protocol operation7. Recovery capability of P2P network

This presentation shows a solution approach against problems in PURE P2P network.

Page 4: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

3Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

P2P file exchange softwareA popular technology for file exchange/sharing.An alternative to client-server network design.

Hybrid typeCentral server has file and node lists.Ex. Napster etc.

Pure type (Unstructured type)Without the need for special server devices.Ex. Winny, Share, Gnutella etc.

1. Problems of P2P network

Page 5: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

4Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

What are the problems of PURE type P2P network ?We should have good understanding of the problems of PURE type P2P network.

Distribution of files of copyright violationP2P user downloads computer software, music and movie files etc.

Spread of malwareMalware is trigger to leak information, delete files and do DDoS etc.

1. Problems of P2P network

Anonymity of PURE type P2P seems to cause these problems.

Page 6: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

5Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Distribution of files of copyright violationP2P user downloads software applications, music and movies files etc.

1. Problems of P2P network -1-

The cost of damage by "Winny"

Page 7: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

6Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Distribution of files of copyright violationP2P user downloads software applications, music and movies files etc.

1. Problems of P2P network -1-

November 28, 2006The cost of damage by "Winny"

Music: about 4.4 million dollars (¥440,000,000).Computer software: about 95 million dollars (¥9,500,000,000).Total: about 1 billion dollars (¥10,000,000,000).

Page 8: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

7Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Spread of malwareMalware is trigger to leak information, delete files and do DDoS etc. JPCERT/CC reported this problem at 18th FIRST Annual Conference (June 2006).

1. Problems of P2P network -2-

Page 9: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

8Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Spread of malwareMalware is trigger to leak information, delete files and do DDoS etc. Antinny spreads via Winny network and is included in ZIP file etc.

1. Problems of P2P network -2-

Page 10: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Contents

1. Problems of P2P network2. Our activity against the problems3. About P2P file exchange software "Winny" & "Share“4. About StarBED5. DoS attack by P2P network6. Disable P2P network by P2P own protocol operation7. Recovery capability of P2P network

This presentation shows a solution approach against problems in PURE P2P network.

Page 11: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

10Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Some organizations have started to cooperate, to solve these problems since summer of 2006.

1st step (2006-2007)Feasibility study of Winny & Share P2P network observation 2nd step (2008-)Encouragement of malware incident prevention on P2P network

2. Our activity against the problems

Page 12: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

11Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

1st stepFeasibility study of Winny & Share P2P network observation

How many nodes exist over Winny and Share network ?

2. Our activity against the problems

Winny180,000 nodes/day

Share200,000 nodes/day

Page 13: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

12Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

2nd stepEncouragement of malware incident prevention on P2P network.

Malware spread and information leakage problems exist in the overlay network such as P2P network including Winny. Recently, there is many observation data of nodes/files, but there is not quality data about the threat such as DoS of the P2P network (overlay network) itself. We examine the control possibility of P2P network (overlay network) by P2P network (overlay network) in this experiment.

2. Our activity against the problems

Page 14: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

13Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

2nd stepEncouragement of malware incident prevention on P2P network.

Experiment ONEWinny: Index poisoning DDoS AttacksExperiment TWOWinny: Disable P2P network by P2P own protocol operation

Sending many close connection requestsSending one message with exploit the vulnerability (JVN#74294680)

Experiment THREEWinny: Recovery capability of P2P network

2. Our activity against the problems

Page 15: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Contents

1. Problems of P2P network2. Our activity against the problems3. About P2P file exchange software "Winny" & "Share“4. About StarBED5. DoS attack by P2P network6. Disable P2P network by P2P own protocol operation7. Recovery capability of P2P network

This presentation shows a solution approach against problems in PURE P2P network.

Page 16: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

15Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Characteristics of Winny and SharePURE P2P typeNo index/central server to manage the networkSimple GUIWord Search and Search resultsAnonymityMulti-hop proxies or re-publish of cached contentsEncrypted communication channel

3. About P2P file exchange software "Winny" & "Share"

Page 17: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

16Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Characteristics of Winny and SharePURE P2P typeNo index/central server to manage the networkSimple GUI

3. About P2P file exchange software "Winny" & "Share"

Word Search Word Search

Search results Search results

Winny Share

Page 18: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

17Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Characteristics of Winny and SharePURE P2P typeNo index/central server to manage the networkSimple GUI

3. About P2P file exchange software "Winny" & "Share"

Word Search Word Search

Search results Search results

Winny Share

Page 19: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

18Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

P2P mechanism of Winny to accomplish anonymity

3. About P2P file exchange software "Winny" & "Share"

Winny02File downloader

Winny04File up loader

Winny06

Winny07(2) Request for FileX

to Winny07

FileX

Relay node (1) Forwarding of FileX location profile

(3) Request for FileX to Winny04

(4) Download FileX from Winny04

(5) Making FileX cache

(6) Download FileX from Winny07

Page 20: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Contents

1. Problems of P2P network2. Our activity against the problems3. About P2P file exchange software "Winny" & "Share“4. About StarBED5. DoS attack by P2P network6. Disable P2P network by P2P own protocol operation7. Recovery capability of P2P network

This presentation shows a solution approach against problems in PURE P2P network.

Page 21: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

20Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

StarBED --- A Large Scale Network Experiment EnvironmentIn StarBED, there are many actual computers, and switches which connect these computers. There are 680 actual PCs in StarBED, in order to realize a large-scale topology. Furthermore, each node on StarBED can run 10 virtual machines with VMware, which enables constructing a large-scale experiment topology.

http://www.starbed.org/

4. About StarBED

Tokyo

Kanazawa

Page 22: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

21Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

4. About StarBED

StarBED --- A Large Scale Network Experiment Environment

Page 23: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

22Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Controlnetwork

172.17.0.0/16

Group F 150 nodes(Memory 8GB, Pentium4 3.2GHz, HDD80GBx2)

8 VM nodes/physical node by VMware ESXiWindows + Winny2.0 b7.1/VM node

Winny network

20.0.0.0/8

Number of total Winny nodes

1200

4. Experiment Environment on StarBED

Page 24: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

23Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Winny Commander and ServerIt talks about the Winny protocol, and communicates with the actual Winny nodes.

Winny Process monitorIt is a real time monitor which outputs a status of Winny.

4. Tools for experiment of P2P network

Winny node

Monitor of connected Winny node Winny

Dummy Server

WinnyDummy Client

Winny ServerWinny Server

Send IndexSend Index

SearchSearch

Send IndexSend Index

Winny network

Connect to Winny node and send control

command.

Winny CommanderWinny Commander

Monitor of Winny process

Winny Process MonitorWinny Process Monitor

Communication by normal node

Communication by dummy node

Index includes identifiers, IP addresses and port numbers for file download.

Page 25: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

24Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

WinnyCommander and

Server

ConnectedWinnynode

WinnyCommander

WinnyServer

WinnyConnector

IP&Port Node data Version Status Cluster word

他のWinnyノード

他のWinnyノード

OtherWinnynodes

[ Command 3 ] Notify own node Node data

Node data[ Command 4 ] Notify other node

[ Command 10 ] Query Request

[ Command 12 ] Forward Req. File Trip Query ID

[ Command 13 ] Send Query Flag Via nodeKeywordQuery ID Trip

[ Command 31 ] Closing Request

[ Command 33,35,37 ] Abort Req.

Establishment of Winny connection

Connect to Winny node and send control command.

Monitor of connected Winny node

4. Tools for experiment of P2P networkWinny Commander and Server

Page 26: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

25Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Node

TaskIndex U

p/Dow

n Link

Winny node Winny.exe

MemoryWinnyProcessMonitor

Task list

Index list

Node list

Up/Down Link list

Main controlroutine

STDOUT

4. Tools for experiment of P2P networkWinny Process monitor

Page 27: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

26Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Node

TaskIndex U

p/Dow

n Link

Winny node Winny.exe

MemoryWinnyProcessMonitor

Task list

Index list

Node list

Up/Down Link list

Main controlroutine

STDOUT

4. Tools for experiment of P2P networkWinny Process monitor

Monitor data of each List

IP portidentifier

Page 28: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Contents

1. Problems of P2P network2. Our activity against the problems3. About P2P file exchange software "Winny" & "Share“4. About StarBED5. DoS attack by P2P network6. Disable P2P network by P2P own protocol operation7. Recovery capability of P2P network

This presentation shows a solution approach against problems in PURE P2P network.

Page 29: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

28Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Index poisoning AttackThe attacker inserts massive numbers of bogus records into the index for a set of targeted titles. As a result, when auser searches for a targeted title, the index returns bogus results, such as bogus identifiers, bogus IP addresses, or bogus port numbers.

Related worksXiaosong Lou, et.al: "Prevention of Index-Poisoning DDoS Attacks in Peer-to-Peer File-Sharing Networks", IEEE Transactions on Multimedia, special issue on Content Storage and Delivery in P2P Networks, Nov.9, 2006.J. Liang, N. Naoumov, and K. W. Ross, "The Index Poisoning Attack in P2p File-Sharing Systems," Infocom, 2006.N. Naoumov and K. W. Ross, "Exploiting P2p Systems for Ddos Attacks," International Workshop on Peer-to-Peer Information Management (keynote address), Hong Kong, May 2006.

5. DoS attack by P2P network

Page 30: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

29Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Index poisoning DDoS AttackThe attacker inserts massive numbers of bogus records into the index for a set of targeted titles. As a result, when auser searches for a targeted title, the index returns result,such as bogus identifier, IP address of targeted Web server,and port number 80/TCP.

5. DoS attack by P2P network

Winny CommanderWinny CommanderWinny Commander

Dummy Index

WinnyWinnyWinny

WinnyWinnyWinny

WinnyWinnyWinny

WinnyWinnyWinny WinnyWinnyWinnyTargeted Web Server

Dummy Index includes IP address of targeted Web server

and port number 80/TCP.

Page 31: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

30Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Experiment procedures1200 Winny nodes are started, and P2P network for Winny is constructed.Make an index which includes IP address of targeted Web server.The index is poured into one Winny node in P2P network for Winny from one Winny Commander node.

5. DoS attack by P2P network

Page 32: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

31Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

5. DoS attack by P2P networkResult from experiment

No DDoS Attack by Winny

Send one index to one Winny node

Elapsed time(min)

Elapsed time(min)

Traffic(kbps)

WebAccess

(counts/min)

Send 100 different indexes to one Winny node

Index distribution without download operation of each node (1200 nodes)

Page 33: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

32Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Traffic(kbps)

WebAccess

(counts/min)

Peak traffic583 kbps

Peak access15,241 counts/min

254 counts/sec370,000 counts

per 30min

5. DoS attack by P2P networkResult from experiment

Index distribution with download operation of each node (1200 nodes)

Send one index to one Winny node Send 100 different indexes to one Winny node

Elapsed time(min)

Elapsed time(min)

Page 34: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

33Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

5. DoS attack by P2P networkConsideration from experiment

Ave 70,000 Winny nodes(/hour) are active.

Day time: 60,000 Winny nodes(/hour)

Night time: 80,000 Winny nodes(/hour)

When 70,000 Winny nodes are controlled by attacker, Winny nodes issue 880,000 (/min) (15,000/sec) accesses to targeted Web server.

Page 35: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Contents

1. Problems of P2P network2. Our activity against the problems3. About P2P file exchange software "Winny" & "Share“4. About StarBED5. DoS attack by P2P network6. Disable P2P network by P2P own protocol operation7. Recovery capability of P2P network

This presentation shows a solution approach against problems in PURE P2P network.

Page 36: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

35Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Disable P2P network by P2P own protocol operationIf it lets active Winny nodes stop, at the time of the emergency, it can be applied to disable Winny network, and to prevent the leakage information circulation.

Sending many “Close connection request” messagesSending one message with exploit the vulnerability (JVN#74294680)

6. Disable P2P network by P2P own protocol operation

WinnyWinnyWinny

WinnyWinnyWinny

WinnyWinnyWinny

WinnyWinnyWinny WinnyWinnyWinny

Winny CommanderWinny CommanderWinny Commander

ControlCommand

STOP

STOP

STOP

Page 37: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

36Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

If a remote attacker sends a malicious packet, Winny will crash.

6. Disable P2P network by P2P own protocol operationWinny buffer overflow vulnerability (JVN#74294680)

Page 38: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

37Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Experiment procedures - Sending many “Close connection request” messages

1200 Winny nodes are started, and P2P network for Winny is constructed.Winny Commander node sends 200 “Close connection request” messages (Command 33) to 12 Winny node.Above procedure is carried out repeatedly.

6. Disable P2P network by P2P own protocol operation

WinnyCommander

ConnectedWinnynodeWinny

Commander

WinnyConnector BadPort0 alert !

Command 33:Close connection request(Aka. Badport 0 alert)

[ Command 33 ] Close connection request (BadPort0)

[ Command 33 ] Close connection request (BadPort0)

Page 39: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

38Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

0

10

20

30

40

50

60

70

80

90

100

0 100 200 300 400 500 600 700 800 900

停止

ノー

ドの

割合

(%

経過時間(秒)

Port0警告送信によるWinny停止実験 814 secs814 secs

6. Disable P2P network by P2P own protocol operationResult from experiment

Time to all the Winny node stops

Time to all the Winny node stops

814 sec13 min 34 sec

Page 40: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

39Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

1 cell is 1 Winny node

1 cell is 1 Winny node

1200nodes

6. Disable P2P network by P2P own protocol operationResult from experiment

Winny node status Red circle: Winny node stop

Page 41: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

40Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Experiment procedures - Sending one message with exploit the vulnerability (JVN#74294680)

1200 Winny nodes are started, and P2P network for Winny is constructed.Winny Commander node sends 1 “Buffer overflow data request (JVN#74294680)” message (Command 17) to 12 Winny node.Above procedure is carried out repeatedly.

6. Disable P2P network by P2P own protocol operation

WinnyCommander

ConnectedWinnynodeWinny

Commander

WinnyConnector Buffer Overflow data

Command 17:BBS Key forward request

[ Command 17 ] BBS Key forward request with buffer overflow data

Page 42: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

41Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

0

10

20

30

40

50

60

70

80

90

100

0 20 40 60 80 100 120 140 160 180

Winny

稼働

率(%)

経過時間(秒)

Winny緊急停止実験

150 secs150 secs

Time to all the Winny node stops

150 sec2 min 30 sec

6. Disable P2P network by P2P own protocol operationResult from experiment

Time to all the Winny node stops

Page 43: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

42Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

(8x speed)

6. Disable P2P network by P2P own protocol operationResult from experiment

Winny node status Yellow box: Winny node crash

Page 44: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

43Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

6. Disable P2P network by P2P own protocol operation Consideration from experiment

Ave 70,000 Winny nodes(/hour) are active.

Day time: 60,000 Winny nodes(/hour)

Night time: 80,000 Winny nodes(/hour)

Time to all the Winny node stops is about 8,750 sec (1 hour 25 min 50 sec).

Page 45: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Contents

1. Problems of P2P network2. Our activity against the problems3. About P2P file exchange software "Winny" & "Share“4. About StarBED5. DoS attack by P2P network6. Disable P2P network by P2P own protocol7. Recovery capability of P2P network

This presentation shows a solution approach against problems in PURE P2P network.

Page 46: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

45Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

7. Recovery capability of P2P network

Recovery capability of P2P networkIn Winny network , there are some “Super” P2P node which is most active node and reference node .When some active Winny nodes stop, other Winny nodes will recover own network.

Page 47: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

46Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Experiment procedures1200 Winny nodes are started, and P2P network for Winny is constructed.Winny Commander node sends 200 “Close connection request” messages (Command 33) to 5 “Super “ Winny node.

7. Recovery capability of P2P network

WinnyCommander

ConnectedSuperWinnynodeWinny

Commander

WinnyConnector BadPort0 alert !

Command 33:Close connection request(Aka. Badport 0 alert)

[ Command 33 ] Close connection request (BadPort0)

[ Command 33 ] Close connection request (BadPort0)

“Super” Winny node is most active node and reference node in Winny network.

Page 48: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

47Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Start

Start(20.0.94.1)

7. Recovery capability of P2P networkResult from experiment

P2P link relation map

“Super” Winny nodes

From the top From the side

Page 49: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

48Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

After 10min

Start(20.0.94.1)10min(20.0.35.1)

7. Recovery capability of P2P networkResult from experiment

Page 50: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

49Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Start(20.0.94.1)10min(20.0.35.1)

20min(20.0.84.1)

7. Recovery capability of P2P networkResult from experiment

After 20min

Page 51: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

50Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Start(20.0.94.1)10min(20.0.35.1)

20min(20.0.84.1)

30min(20.0.84.1)

Composition is recovered with the time progress in the condition of the degree experiment start time.

7. Recovery capability of P2P networkResult from experiment

After 30min

Page 52: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Questions ?

We continue this feasibility study of DoS attack by P2P network. Next month, we will do 3rd experiment trial on StarBED.

Page 53: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

HIRT (Hitachi Incident Response Team)http://www.hitachi.com/hirt/http://www.hitachi.com/hirt/publications/

JVNRSS Feasibility Study Sitehttp://jvnrss.ise.chuo-u.ac.jp/jtg/

About HIRT

HIRT (Hitachi Incident Response Team) was established in 1998 as an in-house project, and was organized to act as CSIRT (Computer Security Incident Response Team) for the Hitachi group in October 2004. To promote better vulnerability handling (support activity to eliminate security vulnerabilities) and better incident responsiveness (support activity to avoid and recover from the latest security violations and related incidents), HIRT is the CSIRT point of contact that coordinates the Hitachi group and liaisons with external entities.

Page 54: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

About HIRT

Page 55: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Ending

This work was supported by a consignment researchfrom the Ministry of Internal Affairs and Communications, Japan.

Acknowledgement

This presentation has showed some experiment results about P2P network enforced in StarBED which is a Large Scale Network Experiment.- DoS attack by P2P network- Disable P2P network by P2P own protocol

Page 56: Feasibility Study of DoS attack by P2P network. · 2009-01-29 · 1200 Winny nodes are started, and P2P network for Winny is constructed. Make an index which includes IP address of

Copyright © Hitachi Incident Response Team. 2009, All rights reserved.

Hitachi Incident Response TeamMasato Terada

2009/01/20

Feasibility Study of DoS attack by P2P network.

END