- Types of State-Exhaustion DDoS Attacks
- Types of State-Exhaustion DDoS Attacks
- Signs of a State-Exhaustion DDoS Attack
- Why Are State-Exhaustion DDoS Attacks Dangerous?
- Mitigation and Prevention
Tom Bienkowski
Director, Product Marketing
What is a State-Exhaustion DDoS Attack?
State-exhaustion DDoS attacks are primarily focused on taking down services or underlying network infrastructure which is responsible for delivering content to the end users. This might involve an attacker targeting DNS name servers with invalid name queries, thus resulting in increased load on the DNS infrastructure itself, disrupting service as users will no longer be able to connect to the services as the DNS name cannot be resolved to IP addresses.
This DDoS attack vector was used in the DYN attack in 2016 which resulted in major web sites like Amazon, Twitter, Github and others becoming unavailable. The attacker might also target Transport Layer Security (TLS) endpoints, thereby resulting in legitimate users being unable to connect to the services. As the name suggests, these DDoS attacks target stateful devices such as Next Gen Firewalls with the intention of filling TCP State Tables with bogus connections.
These DDoS attacks are typically employed by determined attackers who monitor and adjust their attacks for maximum impact. Such DDoS attacks are usually low-to-mid volume since they have to conform to the protocol the application itself is using, which often involves protocol handshakes and protocol/application compliance. This means that these attacks will primarily be launched using discrete intelligent clients, usually IoT devices, and cannot be spoofed.
What Are the Different Types of State-Exhaustion DDoS Attacks?
State-exhaustion DDoS attacks typically target the edge load balancers, firewalls, and stateful traffic inspection services of publicly-exposed services by stressing the scale of the Transmission Control Protocol (TCP) state machine of these devices. These DDoS attacks can easily overwhelm even large-scale enterprise services, but present as much lower overall bandwidth attacks (typically less than 10-20 gigabits per second), so they are not normally considered a direct threat to the network provider’s infrastructure. State-exhaustion DDoS attacks cannot be mitigated in stateless edge router infrastructures.
Common state-exhaustion attacks might include:
What Are the Signs of a State-Exhaustion DDoS Attack?
State-exhaustion DDoS attacks are complex in nature. Because they are designed to be indistinguishable from legitimate traffic and operate at relatively small traffic volumes, these DDoS attacks rarely have signatures that can be matched in stateless payload filters.
What makes them even more insidious is that determined attackers will rapidly change the attack vector as soon as that vector is mitigated. Such DDoS attacks can be detected using security-focused flow analysis; however, since they are low-volume DDoS attacks, it is necessary to use behavioral analysis or deep packet inspection (DPI) to uncover them. Payload-based blocking is simply not sufficient. What is required is the use of IDMSs to detect the specific attack vector used by either employing virtual or physical appliances’ visibility into the traffic.
Why Are State-Exhaustion DDoS Attacks Dangerous?
Modern DDoS attackers are constantly improving their attack tools and looking for new state-exhaustion DDoS attack techniques. And because they now have access to millions of vulnerable Internet of Things (IoT) devices, they can launch complex DDoS attacks at scales never seen before.
What makes state-exhaustion DDoS attacks most dangerous is that even when multi-vector attacks contain identifiable patterns, a determined attacker will monitor the results of his attack and modify it to thwart a skilled and determined defender. Because active attackers are known to continually modify payload patterns to avoid simplistic DDoS mitigation, maintaining an ongoing list of known attack patterns quickly becomes impractical due to scale issues and the rate at which this list must be updated. Further, since payload patterns bring a high risk of causing collateral damage, maintaining a long-lived set of payload patterns may be unwise.
How to Mitigate and Prevent State-Exhaustion DDoS Attacks
Proper defense against today’s landscape of Internet-based security threats requires flexibility, scale, intelligent detection, and automated mitigation. State-exhaustion DDoS attacks cannot be mitigated in a stateless edge router infrastructure. This type of infrastructure requires intelligent L3-L7 mitigation front-ending individual services and applications, and centralized mitigation architected to protect the provider’s infrastructure and all its downstream customers. By leveraging economies of scale (multi-tenancy), it becomes possible to implement centralized DDoS scrubbing.
Best practices to defend against these constantly evolving types of attacks include:
- Use flow telemetry analysis supplemented with behavioral analysis to detect abnormalities and DDoS attacks. Focus on understanding what is normal. This will simplify identification of abnormalities.
- Use an IDMS to detect abnormal behavior and state-exhaustion DDoS attacks that require advanced and active mitigation; and using this approach in conjunction with BGP FlowSpec Offload when and where appropriate.
If implemented successfully, these DDoS protection strategies will force the attacker to behave like normal clients, rendering the DDoS attack ineffective and allowing for the use of application-level analysis to detect any abnormal traffic or usage patterns.
How can NETSCOUT help?
NETSCOUT's Arbor DDoS solution has been protecting the world's largest and most demanding networks from DDoS attacks for more than a decade. We strongly believe that the best way to protect your resources from modern DDoS attacks is through a multi-layer deployment of purpose-built DDoS mitigation solutions.
Only with a tightly integrated, multi-layer defense can you adequately protect your organization from the full spectrum of DDoS attacks.
Arbor SP/Threat Mitigation System
NETSCOUT customers enjoy a considerable competitive advantage by getting both a micro view of their own network, via our products, combined with a macro view of global Internet traffic, via NETSCOUT Cyber Threat Horizon, an interface to our ATLAS threat intelligence and a DDoS Attack Map visualization.