Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity
    • Networking

    DDoS Attacks Abusing Network Timing Protocol Flood the Web

    Written by

    Sean Michael Kerner
    Published January 16, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Distributed denial-of-service (DDoS) attacks can take on many different forms, as those who commit them leverage different techniques to drown Websites under a flood of traffic. The United States Computer Emergency Readiness Team (US-CERT) is warning of an increased risk from DDoS attacks that leverage the Network Time Protocol (NTP) to amplify the attack volume.

      NTP is a widely deployed Internet protocol that is primarily used as a time-keeping technique for clock synchronization. Simply requesting the time from an NTP server is not, however, what attackers are using to execute DDoS attacks.

      Instead, attackers are abusing a feature in NTP that enables administrators to query an NTP server about connected clients and their traffic counts. The query is made via a “monlist” command.

      “This command causes a list of the last 600 IP addresses which connected to the NTP server to be sent to the victim,” US-CERT warns. “Because the size of the response is typically considerably larger than the request, the attacker is able to amplify the volume of traffic directed at the victim.”
      US-CERT also warns that since NTP traffic is typically considered legitimate, it can be difficult for administrators to block the attack.

      The monlist command is also at the root of a known vulnerability referred to as CVE-2013-5211, which has been patched in the latest release of NTP. US-CERT warns that all versions of the NTP prior to version 4.2.7 are at risk

      Amplification attacks have become much more well-known and observed throughout service provider and enterprise networks in the last 12 to 18 months, Paul Scanlon, principal product line manager at Juniper Networks, told eWEEK.

      In March 2013 one of the largest DDoS attacks ever recorded leveraged a Domain Name System (DNS) amplification technique to hit Spamhaus with 300G bps of traffic.

      “The expansion of the amplification attack technique from DNS servers to include NTP servers is a dangerous behavior exhibited by attackers as they continue to realize that critical services using UDP designed to provide fundamental services to Internet infrastructure must be openly available and can be abused as a means to intensify attacks,” Scanlon said. “Fundamentally, the attack is exhibiting the abuse of services leveraging UDP as a transport protocol that does not require an established connection between client and server.”

      NTP reflection/amplification attacks have been seen in the wild for the last six or seven years, Roland Dobbins, senior ASERT (Arbor Security Engineering and Response Team) analyst at Arbor Networks, told eWEEK.

      “This technique has been used recently in high-profile attacks on gaming networks, attacks that have affected a substantial consumer base of these gaming networks; so it’s been receiving attention in the industry space, that’s the main difference,” Dobbins said. “But network operational security specialists have been dealing with these attacks for quite some time.”

      DDos Attacks Abusing Network Timing Protocol Flood the Web

      Best Practices

      In addition to making sure the organization is running the latest patched version of NTP, several steps can be taken to limit the risks of NTP-driven DDoS.

      Every organization with systems participating in NTP, DNS and any other service that uses UDP as its communication model must implement simple administrative techniques to reduce the possibility that attackers looking for points of reflection can abuse these services, Scanlon said.

      Hardening the services is only one key step in preparing for these types of threats, Scanlon said. “Ultimately, if an organization has mission-critical services exposed to the Internet, dedicated solutions and practices should be implemented to defend against the ever-evolving threat of DDoS attacks,” he added.

      DDoS amplification attacks typically involve the attacker spoofing the target’s network address location. The responding DNS or NTP servers, in turn, are tricked into sending response traffic back to the legitimate IP address of the target. Dobbins suggests that anti-spoofing technologies such as unicast reverse-path forward (uRPF), Cable IP Source Verify, DHCP Snooping and even simple anti-spoofing access-control lists (ACLs) be deployed.

      Additionally, network operators should routinely scan their IP address space (and that of their customers) for insecurely configured services that can be abused by attackers, Dobbins said.
      “But anti-spoofing is the key to making all the various flavors of reflection/amplification attacks impossible for attackers to launch in the first place,” Dobbins said.

      DDoS Trends

      DDoS attacks continue to mount. In the fourth quarter, DDoS attacks rose 26 percent year-over-year, according to Prolexic’s latest Global DDoS Attack Report .

      “DDoS attacks are evolving from high-bandwidth volumetric attacks that bring down Web servers to highly sophisticated targeted attacks that threaten availability of critical business applications and resources,” Scanlon said. “DDoS volumetric flood attacks are still a problem for online businesses, but with the right defense in place, these attacks can be nullified.”

      The trend of attackers leveraging critical services such as NTP is disturbing and should raise awareness concerning the need to reduce attackers’ ability to spoof or forge machine IP addresses, Scanlon said. “The emerging trend of using critical services such as DNS and NTP should be yet another alarm bell that further investment and work must be done to continue to remove dark corners of the Internet that allow these threats to be disruptive,” he said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.