æšä»ããµã€ããŒæ»æé¢é£ã®ãã¥ãŒã¹ã§DDoS(Distributed Denial of Service)æ»æãšããåèªãè³ã«ããæ©äŒãå¢ããŠããŠããã®ã§ã¯ãªãã§ãããããä»ã®ãµã€ããŒæ»æãšåæ§ãDDoSæ»æã«ããè¢«å®³ã¯æ¡å€§ãç¶ããŠããŸãããçè ã®æå±ããA10ãããã¯ãŒã¯ã¹ã«ãã2016幎ã«éŠéœåäžå ŽäŒæ¥100瀟ã«è¡ã£ã調æ»ã«ãããŠããDDoS察çãè¡ã£ãŠããäŒæ¥ã¯55%ããšããçµæãåºãŠããã察çãè¡ããŠããçµç¹ããŸã å°ãªãã®ãçŸç¶ã§ãã
ããã§æ¬é£èŒã§ã¯ãDDoSæ»æã®åºç€ãããã®å¯Ÿçæ¹æ³ãææ°ãã¬ã³ããªã©ãã²ããšããDDoSæ»æå¯Ÿçãè¡ãã®ã«åèãšãªããããªæ å ±ãå±ããŠãããŸãã
2çš®é¡ã«å€§å¥ã§ããDDoSæ»æ
DDoSæ»æã¯Distributed Denial of Serviceã®ç¥ã§ã忣ãµãŒãã¹äžèœæ»æãšèš³ãããŸããããã¯DoSæ»æ(ãµãŒãã¹äžèœæ»æ)ã®äžçš®ã§ãæ»æã®ç®çã¯ãã®åã®éãããµãŒãã¹ãäžèœã«ããããšã§ãã
å€éšããè¡ãããDoSæ»æã¯å€§ãããããŠä»¥äžã®2ã€ã«åé¡ã§ããŸãã
(1)Exploitå
ã·ã¹ãã ã®è匱æ§ãçªãæ»æïŒExploit)ãããããšã§æ»æå¯Ÿè±¡ã®ã·ã¹ãã ãæ£åžžã«åäœããªããªãæ©èœããªããªãã¿ã€ã
(2)ãªãœãŒã¹æ¯æžå
åç·ãã¢ããªã±ãŒã·ã§ã³ãOSã§åŠçã§ããèœåãè¶ ãããããªã³ã³ãã¥ãŒã¿ãªãœãŒã¹ãžã®ãªã¯ãšã¹ããçºçãããŠæ©èœãããã¿ã€ã
Exploitåã¯ã·ã¹ãã ãæ³å®å€ã®åäœãè¡ãæ»æã«å¯Ÿå¿ã§ãããæçµçã«æ©èœåæ¢ãåãŒãè匱æ§ãããå Žåã«æå¹ã«ãªããŸããç¹ã«ãããã¯ãŒã¯ããæ»æãæå¹ãªå Žåãç°¡åã«æ»æãæç«ããããšããããŸãã
ãã®äŸãšããŠãBSOD (Blue Screen of Death)ãåŒãèµ·ããExploitã玹ä»ããŸãããã
Windowsããç¹å®ã®è匱æ§ãçªããæ»æãªã©ã«ããBlue Screenã«ãªãã·ã¹ãã ã忢ããŠããŸãããšããäžè¬çã«Blue Screen of DeathïŒæ¥æ¬ã§ã¯åã«ãã«ãŒã¹ã¯ãªãŒã³ïŒãšåŒã³ãŸãã
ãã®BSODãåŒãèµ·ããæåãªè匱æ§ãšããŠã2015幎4æã®MS15-034ïŒCVE-2015-1635ïŒã§ä¿®æ£ãããHTTP.sysã®è匱æ§ããããCVSSã¹ã³ã¢ïŒè匱æ§ã®æ·±å»åºŠïŒã¯æãé«ã10ã§è©äŸ¡ãããŸãããç·æ¥ã®å¯Ÿå¿ãæ±ããããã»ãã¥ãªãã£ã®çŸå ŽãéšãããäžäŸã«ãªããŸãã
ãã®è匱æ§ã¯æ»æè ã现工ãããªã¹ã¯ãšã¹ããGET / HTTP/1.1\r\nHost: stuff\r\nRange: bytes=0-18446744073709551615\r\n\r\nããéããšãµãŒãã忢ããŠããŸããè匱æ§ããããµãŒãã«å¯ŸããŠç°¡åã«DoSæ»æãè¡ããŠããŸããŸããè匱æ§ã®è©³çްã¯ãã¡ãã§ç¢ºèªã§ããŸãã
äžæ¹ã®ãªãœãŒã¹æ¯æžåã®å Žåãåç·ãOSãã¢ããªã±ãŒã·ã§ã³ã®åŠçãã§ããªããªãããã«ã倧éã®ãã©ãã£ãã¯ãéä¿¡ãããããã£ããæéããããŠãªã¯ãšã¹ããéä¿¡ãããããŠã¢ããªã±ãŒã·ã§ã³ã®ã»ãã·ã§ã³ç®¡çé åãæ¯æžãããæ»æãªã©ãããŸããŸãªææ³ããããŸãããã®ãããªãªãœãŒã¹æ¯æžåã®DoSæ»æãè€æ°ã®ç«¯æ«ããè¡ãã®ãDDoSæ»æãšåŒã°ãããã®ã§ãããDoSæ»æã®äž»æµã«ãªã£ãŠããŸãã
DoSæ»æã«Distributedãã€ããDDoSæ»æã¯ããµãŒãã¹æäŸã劚害ããããã«ãããå€ãã®ã·ã¹ãã ãçšããŠDoSæ»æã仿ããã·ã¹ãã ã«å€§ããªææãäžããããšã§ã³ã³ãã¥ãŒã¿ãªãœãŒã¹ãåç·åž¯åã倧ããªã·ã¹ãã ã«ã圱é¿ãäžããããšãã§ããŸããå€§èŠæš¡ãªWebãµã€ãã§ããã°ãïŒå°ã®ç«¯æ«ã§æ»æãããããè€æ°ã®ç«¯æ«ã®ãªãœãŒã¹ãçµéããŠæ»æããã»ããæåã®å¯èœæ§ãäžãããŸãã
æ»æè ã¯ãªãDDoSæ»æã仿ããã®ã?
æ»æè ãDDoSæ»æã宿œããç®çã¯ä»ã®ãµã€ããŒæ»æãšåæ§ã«ãåçŽãªå¥œå¥å¿ããééã®ç²åŸãç®çãšããã±ãŒã¹ãŸã§ããŸããŸã§ãã以äžã«äž»èŠãªãµã€ããŒæ»æè ã®ãããã¡ã€ã«ãšDDoSæ»æãéžã¶çç±ã«ã€ããŠãŸãšããŠã¿ãŸããã
ãµã€ããŒç¯çœªè
ãµã€ããŒç¯çœªè ã«åé¡ãããããã¡ã€ã«ãšã¯ããµã€ããŒæ»æã§å©çãåŸãããã®ãµã€ããŒç¯çœªçµç¹ã»ã°ã«ãŒããæããŸãããã®çµç¹ã¯ãééãåãããã«DDoSæ»æãè¡ãããšã宣èšããæ»æå¯Ÿè±¡ã®ã·ã¹ãã ææè ãæåããŸãã¯æ»æå¯Ÿè±¡ã®ã·ã¹ãã ãå®éã«DDoSæ»æããããšã§æ»æå¯Ÿè±¡ã®çµç¹ã«ééãèŠæ±ããŸãããŸããç¹å®æ å ±ã®å¥ªåãçã£ãæ»æãè¡ãããã«DDoSæ»æãåãããŠè¡ããDDoSæ»æãããšããšããã±ãŒã¹ããããŸãã
äžæºãæã€åŸæ¥å¡
äžæºãæã€åŸæ¥å¡ã«åé¡ãããããã¡ã€ã«ã§ã¯ãçµç¹ã«äžæºãããçµç¹ãéå¶ããã·ã¹ãã ã«ãã¡ãŒãžãäžããŠæå®³ãçºçãããããšãç®çãšããã±ãŒã¹ãå€ããããŸããDDoSæ»æã¯ããµã€ããŒæ»æã®äžã§ãæ¯èŒçç°¡åã«å®è¡ã§ãããããäžæºãæã€åŸæ¥å¡ãéžã¶ããšã®å€ãæ»æã®ïŒã€ã§ãã
ãã¯ãã£ãã¹ã
ãã¯ãã£ãã¹ããšã¯ãããç¹å®ã®ææ³ã䞻匵ããè ãçµç¹ãæãããµã€ããŒæ»æãéããŠææ³ã䞻匵ããã±ãŒã¹ãå€ããããŸããéå»ã®ã±ãŒã¹ã§ã¯ãæ¥æ¬ã§æé¯šæŒãè§£çŠã«ãªãææã«ãããã«å察ããããšã瀟äŒã«äŒãããããé¢é£ããããªçµç¹ãæ¥æ¬ã®èåãªäŒæ¥ãæ¿æ²»å®¶ãªã©ã®ãŠã§ããµã€ãã«å¯ŸããŠDDoSæ»æã仿ããŠã¡ãã»ãŒãžãçºä¿¡ãããããšããããŸãããç¯è¡å£°æããœãŒã·ã£ã«ãªã©ã§å¯Ÿå€çã«å ¬è¡šããã±ãŒã¹ãå€ãã§ãã
ã¹ã¯ãªããããã£
ã€ã³ã¿ãŒãããäžã§ã¯ç°¡åã«DDoSæ»æã®ããŒã«ãDDoSæ»æãè¡ããµãŒãã¹ãæäŸãããŠããŸãããã®ããŒã«ãæ»æãµãŒãã¹ãå©çšããã±ãŒã¹ããå ¬éãããŠããããŒã«ããŸããŠèªåã®åã詊ãããã«ã奜å¥å¿ããå®éã«æ»æã仿ããã±ãŒã¹ããããŸãã
次åã¯DDoSæ»æã«ãããªã¹ã¯ãããçè§£ããã ãããã«ãDDoSæ»æã«ããå®éã®è¢«å®³äŸã玹ä»ããŸãã
åæ³ åå©ïŒãã€ããªããã€ãšãïŒ
A10ãããã¯ãŒã¯ã¹æ ªåŒäŒç€Ÿãããžãã¹éçºæ¬éš ããžãã¹ãœãªã¥ãŒã·ã§ã³éçºéš ã»ãã¥ãªãã£ããžãã¹ãã£ããããã¡ã³ãïŒã¢ã©ã€ã¢ã³ã¹ããžãã¹ãããŒãžã£
å ¬èªæ å ±ã·ã¹ãã ç£æ»äººïŒCISAïŒãCertfied Information System Security Professional (CISSP)ãGIAC Certifed Intrusion Analyst (GCIA)
ã»ãã¥ãªãã£ãŒãã³ããŒã®ããªã³ã·ãã«ã¢ãŒããã¯ããã³ã³ãµã«ãã£ã³ã°ãã¡ãŒã ã®ã·ãã¢ãããŒãžã£ãçµãŠã2016幎ããA10ãããã¯ãŒã¯ã¹ã®ã»ãã¥ãªãã£ããžãã¹ã®è²¬ä»»è ã«çä»»ãã€ãã³ãã§ã®è¬æŒãæžç±ãå¯çš¿èšäºã®å·çãªã©ã»ãã¥ãªãã£ã®åçºæŽ»åã«ãåŸäºã
