Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Sinkholing: A Critical Defensive Tool
You are here: Home \ Security Practices \ Sinkholing: A Critical Defensive Tool
Sinkholing : A Critical defending tool
Posted on Saturday, December 5th, 2015 by

What is Sinkholing?

Now that the Internet is the most important medium in the world, even many non-technical people have heard of things like botnets and denial-of-service (DoS) attacks. Nonetheless, very few people ever talk about sinkholing, one of the more important tactics for defending against both (among other types of attacks).

 

Definition of a Sinkhole

Put simply, a sinkhole is a server or network segment to which malicious traffic is intentionally directed. It is similar to a honeypot but it is used actively as a defense. Once the traffic is isolated in a sinkhole, it can no longer hurt its intended targets; additionally, the traffic can be analyzed to reveal the source of the attack as well as information about the techniques being employed.

For example, when a Denial-of-Service (DoS) attack is detected against a web server, all of that malicious traffic could instead be directed to a sinkhole. Sinkholes are designed to withstand this traffic and to prevent any packets from coming back out—no backscatter.

Additionally, they are normally outfitted with analysis tools to perform reconnaissance: packet sniffing and flow analysis and traceroutes to the attackers.

 

A Few of the Numerous Security Applications of Sinkholes

  • Distributed sinkholes are a standard feature of the infrastructure of all major Internet Service Providers (ISPs) today. They are positioned throughout the network and assigned anycast addresses so that malicious traffic is directed to the nearest one, reducing congestion. The ISPs utilize internal DNS servers with lists of known malicious addresses that automatically route any traffic coming from them into the sinkholes. They also automatically reroute anything claiming to come from the small remaining pool of unallocated IP space, which is obviously malicious or at least erroneous by definition.
  • It is a good practice for any organization to use internal DNS servers to redirect suspicious outbound communications to sinkholes for analysis too. A few examples of this are restricting any DNS queries (port 53) to known DNS server addresses and blacklisting any other protocols that should not be emanating from the organization as well as all traffic to any known malicious IPs. The logs of the traffic that ends up in these sinkholes can provide invaluable clues about compromised hosts inside the organization.
  • Sinkholing is also a powerful technique for neutralizing botnets. When a botnet is discovered, one could analyze the traffic coming from the bots and determine which server is controlling them. Once this so-called Command and Control (C&C) server is discovered, its publicly-listed address can be changed in the relevant DNS server(s), redirecting the traffic it would normally receive to the sinkhole.

 

Controlling the Command and Control Server

As mentioned above, entire huge botnets can be effectively neutralized by changing their given DNS entries. Obviously now we’re talking about changing entries in public DNS servers. Generally speaking, DNS organizations are happy to modify their listings for the purpose of taking down botnets, but there have also been examples of law enforcement agencies obtaining court orders to change public DNS listings for this purpose.

By changing this one address, gigantic botnets of even hundreds of thousands of infected hosts are effectively neutralized. Not only that, but the traffic of all the infected hosts (zombies) can be analyzed to discover the methods employed by the attackers, and possibly even the identity of the attackers. An especially devious tactic is to mimic the control interface of the real C&C server and wait for the botnet owner to try and log in, thus revealing him or herself.

 

Further Reading

These are just a few specific examples of the many ways that sinkholes can be used to defend networks and fight back against criminal hackers. For those interested, there is a wealth of information with more technical depth available on the internet.

Here are a few references with some more in-depth technical information:

Andrew Kozloski
About author:
I’ve been a geek since before I could walk. I remember loading video games on cassette tapes with my Commodore 64. I remember downloading games too, back when geeks programmed them for fun and gave them away for free on Bulletin Boards. I literally live on the internet: I’m an inveterate gamer, an electronic music producer and I’ve put in time in the video games industry in a variety of positions before finding my way to cyber security and ethical hacking, where I expect to spend the rest of my career. I’m passionate about coding, copyright, privacy, human rights and the intersection of these things. I am the Security Evangelist at Hitachi Systems Security.In my spare time I study languages (particularly Middle English and Russian these days) and I cook traditional Japanese food.

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now