Investigating a Denial of Service attack

Download as PDFDownload as PDF

GD/NOTE/001 (01/01)

This paper has been contributed by a Janet customer site, and records their experiences in investigating a denial-of-service attack committed using hosts at their site. We are very grateful to them for allowing us to publish this information and hope that it will be useful to others.

Names and addresses have been altered. Individuals wishing to contact us for further information are invited to do so via Janet-CSIRT (irt@csirt.ja.net).

During the summer of 2000 our institution (a UK university) was identified as a participant in a Distributed Denial-of-Service (DDoS) attack against a number of foreign sites. This paper briefly summarises the technique we used to trace the machines involved - a task often complicated by the use of IP spoofing [1] to disguise the actual source of an attack.

The incident began with a call from a user concerned about a sudden increase in the number of events recorded by his personal firewall software [2]. The logs indicated several periods of intense network activity during the previous night, apparently involving multiple local hosts. Unfortunately, by the time the report was received, traffic levels had returned to normal leaving no indication of the likely cause.

Within a few hours more reports began to arrive from remote sites that had been on the receiving end of a denial-of-service attack originating from the departmental network where our user was located.