skip to main content
10.1145/3487552.3487840acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

QUICsand: quantifying QUIC reconnaissance scans and DoS flooding events

Published:02 November 2021Publication History

ABSTRACT

In this paper, we present first measurements of Internet background radiation originating from the emerging transport protocol QUIC. Our analysis is based on the UCSD network telescope, correlated with active measurements. We find that research projects dominate the QUIC scanning ecosystem but also discover traffic from non-benign sources. We argue that although QUIC has been carefully designed to restrict reflective amplification attacks, the QUIC handshake is prone to resource exhaustion attacks, similar to TCP SYN floods. We confirm this conjecture by showing how this attack vector is already exploited in multi-vector attacks: On average, the Internet is exposed to four QUIC floods per hour and half of these attacks occur concurrently with other common attack types such as TCP/ICMP floods.

References

  1. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1093--1110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Eray Balkanli and A. Nur Zincir-Heywood. 2014. On the Analysis of Backscatter Traffic. In Proc. of IEEE LCN. IEEE, Piscataway, NJ, USA, 671--678.Google ScholarGoogle ScholarCross RefCross Ref
  3. Prasenjeet Biswal and Omprakash Gnawali. 2016. Does QUIC Make the Web Faster?. In Proc. of IEEE Global Communications Conference (GLOBECOM). IEEE Press, Piscataway, NJ, USA, 6 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Norbert Blenn, Vincent Ghiëtte, and Christian Doerr. 2017. Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter. In Proc. of the 12th International Conference on Availability, Reliability and Security (Reggio Calabria, Italy) (ARES '17). ACM, New York, NY, USA, 10 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. CAIDA. 2012. The UCSD Network Telescope. http://www.caida.org/projects/network_telescope/ Last modified: January 29, 2018.Google ScholarGoogle Scholar
  6. Gaetano Carlucci, Luca De Cicco, and Saverio Mascolo. 2015. HTTP over UDP. In Proc. of the 30th Annual ACM Symposium on Applied Computing. ACM, New York, NY, USA, 6 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cloudflare. [n.d.]. What is a QUIC flood DDoS attack? QUIC and UDP floods. Blog. https://www.cloudflare.com/ko-kr/learning/ddos/what-is-a-quic-flood/ Last Access: May 2021.Google ScholarGoogle Scholar
  8. Quentin De Coninck and Olivier Bonaventure. 2017. Multipath QUIC. In Proc. of ACM CoNEXT. ACM, New York, NY, USA, 160--166.Google ScholarGoogle Scholar
  9. Sarah Cook, Bertrand Mathieu, Patrick Truong, and Isabelle Hamchaoui. 2017. QUIC: Better for what and for whom?. In Proc. of IEEE International Conference on Communications (ICC). IEEE Press, Piscataway, NJ, USA, 6 pages.Google ScholarGoogle ScholarCross RefCross Ref
  10. Yong Cui, Tianxiang Li, Cong Liu, Xingwei Wang, and Mirja Kühlewind. 2017. Innovating Transport with QUIC: Design Approaches and Research Challenges. IEEE Internet Computing 21, 2 (March 2017), 72--76.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. W. Eddy. 2007. TCP SYN Flooding Attacks and Common Mitigations. RFC 4987. IETF.Google ScholarGoogle Scholar
  12. Jasper Eumann, Raphael Hiesgen, Thomas C. Schmidt, and Matthias Wählisch. 2019. A Reproducibility Study of "IP Spoofing Detection in Inter-Domain Traffic". Technical Report arXiv:1911.05164. Open Archive: arXiv.org. https://arxiv.org/abs/1911.05164Google ScholarGoogle Scholar
  13. Inc. F5. 2021. Our Roadmap for QUIC and HTTP/3 Support in NGINX. Website. https://www.nginx.com/blog/our-roadmap-quic-http-3-support-nginx/ Last Access September 2021.Google ScholarGoogle Scholar
  14. Facebook. 2020. How Facebook is bringing QUIC to billions. Engineering Blog. https://engineering.fb.com/2020/10/21/networking-traffic/how-facebook-is-bringing-quic-to-billions/ Last Acess May 2021.Google ScholarGoogle Scholar
  15. Osvaldo Fonseca, Ítalo Cunha, Elverton Fazzion, Wagner Meira, Brivaldo Junior, Ronaldo A. Ferreira, and Ethan Katz-Bassett. 2020. Tracking Down Sources of Spoofed IP Packets. In Proc. of IFIP Networking Conference. IEEE Press, Piscataway, NJ, USA, 208--216.Google ScholarGoogle Scholar
  16. Eva Gagliardi and Olivier Levillain. 2020. Analysis of QUIC Session Establishment and Its Implementations. In Information Security Theory and Practice. LNCS, Vol. 12024. Springer Nature, Switzerland, 169--184.Google ScholarGoogle Scholar
  17. A. Ghedini and V. Vasiliev. 2020. TLS Certificate Compression. RFC 8879. IETF.Google ScholarGoogle Scholar
  18. Google. [n.d.]. quiche. Github Repository. https://github.com/google/quiche/search?p=2&q=retry&type=commits Last Access: September 2021.Google ScholarGoogle Scholar
  19. Michio Honda, Yoshifumi Nishida, Costin Raiciu, Adam Greenhalgh, Mark Handley, and Hideyuki Tokuda. 2011. Is it still possible to extend TCP?. In Proc. of ACM IMC. ACM, New York, NY, USA, 181--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Christian Huitema. 2020. A simple test of DDOS attacks on QUIC. Blog. https://huitema.wordpress.com/2020/09/22/a-simple-test-of-ddos-attacks-on-quic/ Last Access May 2021.Google ScholarGoogle Scholar
  21. Facebook Incubator. [n.d.]. mvfst. Github Repository. https://github.com/facebookincubator/mvfst/search?p=2&q=retry&type=commits Last Access: September 2021.Google ScholarGoogle Scholar
  22. J. Iyengar and M. Thomson. 2021. QUIC: A UDP-Based Multiplexed and Secure Transport. RFC 9000. IETF. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Mattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, and Alberto Dainotti. 2017. Millions of Targets under Attack: A Macroscopic Characterization of the DoS Ecosystem. In Proc. of ACM IMC (London, United Kingdom). ACM, New York, NY, USA, 100--113. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Arash Molavi Kakhki, Samuel Jero, David Choffnes, Cristina Nita-Rotaru, and Alan Mislove. 2017. Taking a long look at QUIC. An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols. In Proc. of ACM IMC. ACM, New York, NY, USA, 290--303.Google ScholarGoogle Scholar
  25. Daniel Kopp, Christoph Dietzel, and Oliver Hohlfeld. 2021. DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks. In Passive and Active Measurement (LNCS, Vol. 12671). Springer Nature, Switzerland, 284--301.Google ScholarGoogle Scholar
  26. Adam Langley, Alistair Riddoch, Alyssa Wilk, Antonio Vicente, Charles Krasic, Dan Zhang, Fan Yang, Fedor Kouranov, Ian Swett, Janardhan Iyengar, Jeff Bailey, Jeremy Dorfman, Jim Roskind, Joanna Kulik, Patrik Westin, Raman Tenneti, Robbie Shade, Ryan Hamilton, Victor Vasiliev, Wan-Teh Chang, and Zhongyi Shi. 2017. The QUIC Transport Protocol. In Proc. of ACM SIGCOMM. ACM, New York, NY, USA, 183--196.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Franziska Lichtblau, Florian Streibelt, Thorben Krüger, Philipp Richter, and Anja Feldmann. 2017. Detection, Classification, and Analysis of Inter-Domain Traffic with Spoofed Source IP Addresses. In Proc. of ACM IMC (London, United Kingdom). ACM, New York, NY, USA, 86--99.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Robert Lychev, Samuel Jero, Alexandra Boldyreva, and Cristina Nita-Rotaru. 2015. How Secure and Quick is QUIC? Provable Security and Performance Analyses. In Proc. of IEEE Symposium on Security and Privacy. IEEE Press, Piscataway, NJ, USA, 214--231.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Diego Madariaga, Lucas Torrealba, Javier Madariaga, Javiera Bermúdez, and Javier Bustos-Jiménez. 2020. Analyzing the Adoption of QUIC From a Mobile Development Perspective. In Proc. of the SIGCOMM Workshop on the Evolution, Performance, and Interoperability of QUIC (EPIQ). ACM, New York, NY, USA, 35--41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Patrick McManus. 2020. Does the QUIC handshake require compression to be fast? Fastly Blog. https://www.fastly.com/blog/quic-handshake-tls-compression-certificates-extension-study Last Access May 2021.Google ScholarGoogle Scholar
  31. Jelena Mirkovic and Peter Reiher. 2004. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM Sigcomm Computer Communication Review 34, 2 (April 2004), 39--53.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, and Stefan Savage. 2006. Inferring Internet Denial-of-Service Activity. ACM Trans. Comput. Syst. 24, 2 (May 2006), 115--139.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. David Moore, Colleen Shannon, and k claffy. 2002. Code-Red: A Case Study on the Spread and Victims of an Internet Worm. In Proc. of the 2nd ACM SIGCOMM Workshop on Internet Measurment. ACM, New York, NY, USA, 273--284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Lucas Müller, Matthew Luckie, Bradley Huffaker, Kc Claffy, and Marinho Barcellos. 2019. Challenges in Inferring Spoofed Traffic at IXPs. In Proc. of ACM CoNEXT. ACM, New York, NY, USA, 96--109.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Marcin Nawrocki, Thomas C. Schmidt, and Matthias Wählisch. 2021. Industrial Control Protocols in the Internet Core: Dismantling Operational Practices. Wiley International Journal of Network Management (2021). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Nexusguard Reasearch. 2020. Could QUIC turn into the next most prevalent amplification attack vector? Nexusguard Blog. https://blog.nexusguard.com/could-quic-turn-into-the-next-most-prevalent-amplification-attack-vector Last Access September 2021.Google ScholarGoogle Scholar
  37. Maxime Piraux, Quentin De Coninck, and Olivier Bonaventure. 2018. Observing the Evolution of QUIC Implementations. In Proc. of the Workshop on the Evolution, Performance, and Interoperability of QUIC (EPIQ). ACM, New York, NY, USA, 8--14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Philipp Richter and Arthur Berger. 2019. Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope. In Proc. of ACM IMC (Amsterdam, Netherlands). ACM, New York, NY, USA, 144--157.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Christian Rossow. 2014. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In Proc. of NDSS. Internet Society, 15 pages.Google ScholarGoogle ScholarCross RefCross Ref
  40. Jan Rüth, Ingmar Poese, Christoph Dietzel, and Oliver Hohlfeld. 2018. A First Look at QUIC in the Wild. In Passive and Active Measurement (LNCS, Vol. 10771). Springer Nature, Switzerland, 255--268.Google ScholarGoogle ScholarCross RefCross Ref
  41. Fabrice J. Ryba, Matthew Orlinski, Matthias Wählisch, Christian Rossow, and Thomas C. Schmidt. 2015. Amplification and DRDoS Attack Defense - A Survey and New Perspectives. Technical Report arXiv:1505.07892. Open Archive: arXiv.org. http://arxiv.org/abs/1505.07892Google ScholarGoogle Scholar
  42. Marten Seeman. 2021. QUIC Interop Runner. Blog. https://interop.seemann.io/?test=s Last Access September 2021.Google ScholarGoogle Scholar
  43. Jean-Pierre Smith, Prateek Mittal, and Adrian Perrig. 2021. Website Fingerprinting in the Age of QUIC. Proc. Priv. Enhancing Technol. 2021, 2 (2021), 48--69.Google ScholarGoogle ScholarCross RefCross Ref
  44. Avast Software s.r.o. 2020. The return of the Mirai botnet. https://blog.avast.com/return-of-mirai-botnet-avast.Google ScholarGoogle Scholar
  45. Martino Trevisan, Danilo Giordano, Idilio Drago, Maurizio Matteo Munafò, and Marco Mellia. 2020. Five Years at the Edge: Watching Internet From the ISP Network. IEEE/ACM Transactions on Networking 28, 2 (2020), 561--574.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. QUICsand: quantifying QUIC reconnaissance scans and DoS flooding events

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IMC '21: Proceedings of the 21st ACM Internet Measurement Conference
          November 2021
          768 pages
          ISBN:9781450391290
          DOI:10.1145/3487552

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 November 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate277of1,083submissions,26%

          Upcoming Conference

          IMC '24
          ACM Internet Measurement Conference
          November 4 - 6, 2024
          Madrid , AA , Spain

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader