1 / 18

Empirical Analysis of Denial of Service Attack Against SMTP Servers

Empirical Analysis of Denial of Service Attack Against SMTP Servers. Boldizs ár BENCSÁTH , Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology and Economics http://www.crysys.hu/ this is joint work with Miklós Aurél RÓNAI. Spam is a REAL problem today.

tdane
Télécharger la présentation

Empirical Analysis of Denial of Service Attack Against SMTP Servers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Empirical Analysis of Denial of Service Attack Against SMTP Servers Boldizsár BENCSÁTH, Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology and Economics http://www.crysys.hu/ this is joint work with Miklós Aurél RÓNAI

  2. Spam is a REAL problem today As of 03/27/2007 time blue: SPAMgreen: Normal e-mails (ham) ~10-fold increase in number of spam

  3. Why to measure performance? • Many e-mail servers are overloaded • Sometimes they even stop to respond or just restart (DoS situation) • We don’t know the performance of the server • As more and more spam arrives, we should expect more problems (DoS, etc.) • Can we deploy a successful DoS attack against the server easily? • Can we protect our server against DoS attacks? • How does the content filtering (virus- and spam filtering) affects the server?

  4. Related work • Some information is available on performance, but it is not enough (sometimes no data on content filtering, or no real comparison, etc.) • Microsoft has a more complex test to calculate performance need in their Exchange architecture, but it is too complex. (we don’t want to analyze the performance of e.g. the calendar and address book) • Some information is available on the spam traffic and also some on DoS situations in SMTP servers, but not very informative • We tried to make some standard measurements to support our other research activity, e.g. DoS protection

  5. The performance testing of SMTP is complicated • It’s hard to send e-mails (complicated application, network connectivity can hang, resource consumption is high for random emails (needed for testing spam engine)) • It’s hard to coordinate the sending (starting the same time) • It’s hard to measure successful transfers • SMTP delivery it a multi-step process (explained later) • Too much overload can cause server to hang • Different SMTP servers can work in very different ways

  6. SMTP delivery • The SMTP server gets a new message • The server puts it into a temporary queue -Sometimes it delivers without the temporary queue • The server sometimes/always/immediately/later checks the temporary queue and finds the e-mail -If the target server (or e.g. content filtering) is not responding, retry and retry timeout can occour -If the server is overloaded, the delivery process can be delayed • The server tries to deliver the message (or start content filtering) -Sometimes content filtering results in a new email (dual smtp setup)

  7. Phases of delivery during the test • Phase 1: SMTP server receives and delivers messages • Phase 2: SMTP server receives into temporary queue, no or low speed delivery • Phase 3: no SMTP mails received, just delivery from the queue • Our test server: 2800MHz, 1GB RAM

  8. What was our approach • Load the server fully, but not to overload too much • Messages generated on multiple computers to avoid problems by resource problems on the tester computers • Coordination by IRC based ‘botnet’ architecture • Sending a large number of emails and measuring the delivery time (and ensuring that the server runs under full load by delivery parameters) • Tried to measure performance in the different phases of delivery • Standard SMTP servers with standard content filtering • QMAIL, Postfix, Sendmail, Exim, MS Exchange • Amavisd-new, ClamAV-daemon, Spamassassin

  9. Botnet

  10. First results, no content filtering

  11. Some data on delivery process

  12. Delivery rate, without content filtering

  13. Exim and queue_only_load • Queue_only_load parameter stops delivering e-mails if the load average is too much • Without this paramter, delivery is continuous throughout the test • Results show that for the performance, this behaviour is not very important • Of course the parameter is important, e.g. to avoid DoS

  14. Exim with content filtering Clamscan is not daemonized, Clamd is daemonized == always in memory Clamd is clearly faster Performance is down from 30 to 6.81/4.03 e-mails/sec

  15. Exim, virus+spam filtering Performance is down from 30->6->1.58 messages/sec

  16. DoS? DoS! Test messages: body size of 4kb, random text Exim, virus+spam filtering = 1.58 e-mails/sec 1.58e-mails/sec*4kb=6.32 kb/sec payload, ~50kbps, with overhead ~64kbps Using only 64kbps we can overload an SMTP server with content filtering!

  17. Future work • Our tests can be easily extended -other SMTP servers (e.g. kerio, mailgate etc.) -other content filtering tools (mailscanner, milters, COTS tools and products) -other spam engines (dspam, commercial products) -different parameter settings (e.g. spamassassin tests) -test e-mail parameters (attachments, size) (now random text 4kb) -other test approach (testing under heavy/low load etc.) -testing ‘appliance’ solutions. The main goal is completed: some basic information is now available about the possibility of overloading (DoS) and the performance of the server

  18. Thanks Thank You! http://www.crysys.hu boldi@crysys.hu

More Related