Professional Documents
Culture Documents
1 Identification
2 Containment
3
Objective: Establish contacts, define procedures, Objective: Detect the incident, determine its Objective: Mitigate the attack’s effects on the
and gather information to save time during an scope, and involve the appropriate parties. targeted environment.
attack.
Analyze the attack If the bottleneck is a particular feature of an application,
Internet Service Provider support Understand the logical flow of the DDoS attack and identify temporarily disable that feature.
Contact your ISP to understand the DDoS mitigation services the infrastructure components affected by it.
it offers (free and paid) and what process you should follow.
Understand if you are the target of the attack or a collateral Attempt to throttle or block DDoS traffic as close to the
If possible, subscribe to a redundant Internet connection. victim network’s “cloud” as possible via a router, firewall, load
Establish contacts with your ISP and law enforcement entities. Review the load and log files of servers, routers, firewalls, balancer, specialized device, etc.
Make sure that you have the possibility to use an out-of-band applications, and other affected infrastructure.
communication channel (e.g.: phone).
Identify what aspects of the DDoS traffic differentiate it from Terminate unwanted connections or processes on servers
Inventory benign traffic and routers and tune their TCP/IP settings.
Create a whitelist of the IP addresses and protocols you must - Source IP addresses, AS, etc
allow if prioritizing traffic during an attack. Don’t forget to include - Destination ports
your critical customers, key partners, etc. - URLs If possible, switch to alternate sites or networks using DNS
Document your IT infrastructure details, including business - Protocols flags or another mechanism. Blackhole DDoS traffic targeting the
owners, IP addresses and circuit IDs, routing settings (AS, etc); original IP addresses.
prepare a network topology diagram and an asset inventory. Network analysis tools can be used to review the traffic
ÎTcpdump, Tshark, Snort, Argus, Ntop, Aguri, MRTG
Network infrastructure Set up an alternate communication channel between you
Harden the configuration of network, OS, and application If possible, create a NIDS signature to focus to differentiate
and your users/customers (e.g.: web server, mail server, voice
components that may be targeted by DDoS. between benign and malicious traffic.
server, etc.)
Baseline your current infrastructure’s performance, so you can
identify the attack faster and more accurately. Involve internal and external actors
Contact your internal teams to learn about their visibility into If possible, route traffic through a traffic-scrubbing service or
If your business is Internet dependent, consider purchasing product via DNS or routing changes (e.g.: sinkhole routing)
specialized DDoS mitigation products or services. the attack.
Confirm DNS time-to-live (TTL) settings for the systems that Contact your ISP to ask for help. Be specific about the traffic
might be attacked. Lower the TTLs, if necessary, to facilitate DNS you’d like to control: Configure egress filters to block the traffic your systems
redirection if the original IP addresses get attacked. 600 is a good - Network blocks involved may send in response to DDoS traffic (e.g.: backsquatter traffic),
TTL value. - Source IP addresses to avoid adding unnecessary packets to the network.
Depending of the criticality of your services, consider setting-
- Protocols
up a backup that you can switch on in case of issue. Notify your company’s executive and legal teams.
In case of an extortion attempt, try to buy time with the
Internal contacts fraudster. For example, explain that you need more time in
Establish contacts for your IDS, firewall, systems, and network Check the background order to get management approval.
teams. Find out whether the company received an extortion
demand as a precursor to the attack.
Collaborate with the business lines to understand business
implications (e.g., money loss) of likely DDoS attack scenarios. Search if anyone would have any interest into threatening
If the bottleneck is at the ISP’s side, only the
your company ISP can take efficient actions. In that case, work
Involve your BCP/DR planning team on DDoS incidents.
closely with your ISP and make sure you share
The “preparation” phase is to be considered as the most - Competitors information efficiently.
important element of a successful DDoS incident response. - Ideologically-motivated groups (hacktivists)
- Former employees
Remediation
4 Aftermath
6 Incident Response Methodology
Objective: Take actions to stop the Denial of Objective: Document the incident’s details,
Service condition. discuss lessons learned, and adjust plans and
defences.
Contact your ISP and make sure that it enforces
remediation measures. For information, here are Consider what preparation steps you could IRM #4
some of the possible measures: have taken to respond to the incident faster or
more effectively. DDoS incident response
- Filtering (if possible at level Tier1 or 2) Guidelines to handle Distributed Denial of Service incidents
- Traffic-scrubbing/Sinkhole/Clean-pipe If necessary, adjust assumptions that affected ___________________________________________________
- Blackhole Routing the decisions made during DDoS incident IRM Author: CERT SG / Vincent Ferran-Lacome
preparation. IRM version: 1.3
If the DDoS sponsors have been identified,
consider involving law enforcement. Assess the effectiveness of your DDoS E-Mail: cert.sg@socgen.com
This should be performed upon the direction of response process, involving people and Web: http://cert.societegenerale.com
your company’s executive and legal teams. communications. Twitter: @CertSG
Rollback the mitigation measures J Preparation: get ready to handle the incident
J Identification: detect the incident
Switch back traffic to your original network. J Containment: limit the impact of the incident
J Remediation: remove the threat
Restart stopped services. J Recovery: recover to a normal stage
J Aftermath: draw up and improve the process
Ensure that the recovery-related actions are IRM provides detailed information for each step.
decided in accordance with the network teams.
Bringing up services could have unexpected
side effects. This document is for public use