DDoSæ»æã®åºç€ãããã®å¯Ÿçæ¹æ³ããã¬ã³ããªã©ãã²ãè§£ãæ¬é£èŒãååã¯ãå®éã®è¢«å®³äŸã調æ»çµæãããšã«ãã©ã®ãããªçµç¹ã«ãããŠDDoS察çãå¿ èŠãã«ã€ããŠèª¬æããŸãããä»åã¯ãIoTããã€ã¹ãèžã¿å°ãšããMiraiãŠã€ã«ã¹ããããŒã¯ãŠã§ãã«ããæ»æã®é²åããŸãã人ã ã®ç掻ãåœãè ããæ»æãªã©ã仿³šèŠãã¹ãDDoSæ»æãšãã®èæ¯ã«ã€ããŠè§£èª¬ããŸãã
DDoSã®è åšãç¥ãããããMirai
ååãå°ãè§ŠããŸãããã2016幎10æ26æ¥ãå€§èŠæš¡ãªãµã€ããŒæ»æãçºçããTwitterãAWSãªã©ç±³åœã®äž»èŠãªWebãµãŒãã¹ãžã¢ã¯ã»ã¹ã§ããªããªããŸãããæ¥æ¬ã§ãå€ãã®ãŠãŒã¶ãŒãTwitterã«ã¢ã¯ã»ã¹ã§ããªããªã£ãã»ããä»ã®è€æ°ã®WebãµãŒãã¹ãã¢ã¯ã»ã¹ãå®å®ããªãç¶æ³ã§ããããã¬ãã®ãã¥ãŒã¹ã§ããå€§èŠæš¡ãªãµã€ããŒæ»æãçºçãããšå ±ããŠããããšã¯èšæ¶ã«æ°ããããšã§ãããã
ãã®æ»æã¯ãè匱æ§ã®ããIoTããã€ã¹ã«ææããMiraiãŠã€ã«ã¹(以äžMirai)ã«ãã圢æããããããããããããDyn瀟ã®DNSãµãŒãã«å¯ŸããŠäžæ£ãªéä¿¡ã倧éã«éä¿¡ããDDoSæ»æã§ããã
Dyn瀟ã¯ãå€ãã®WebãµãŒãã¹ã®ãã¡ã€ã³ã管çããDNSãµãŒããéå¶ãããµãŒãã¹ãããã€ããŒã§ãããã®Dyn瀟ã管çããŠããDNSãµãŒãã«å¯ŸããŠå€ãã®äžæ£ãªDNSãªã¯ãšã¹ããéä¿¡ããæ£èŠã®ãªã¯ãšã¹ãã«å¯ŸããŠåå解決ãã§ããªããªãããŠãŒã¶ãŒãWebãµãŒãã¹ã«æ¥ç¶ã§ããªãç¶æ ã«ãªããŸããã
DDoSæ»æã®ã€ã³ãã©åœ¢æã®ããã«äœ¿ãããMiraiã¯ãå€éšããSSHãTelnetãä»ããŠãããã©ã«ãã®IDããã¹ã¯ãŒããå©çšããå€ãã®è匱æ§ã®ããLinux OSã§åäœããIoTããã€ã¹ã«ææããããšããŸããIDããã¹ã¯ãŒãã補ååºè·æãã倿Žãããªãç¶æ ã§ãã€ã³ã¿ãŒãããã«æ¥ç¶ãããŠããããã€ã¹ã¯äžã®äžã«å€ãååšããŸãã
ãŸããMiraiã®äœè ã¯ãœãŒã¹ã³ãŒããMiraiã®åã§å ¬éããããåçš®é¡ã®ãŠã€ã«ã¹(äºçš®)ãå€ãçºçããŸãããMiraiã®ãœãŒã¹ã³ãŒããããè€æ°ã®ããã©ã«ãã®IDããã¹ã¯ãŒãã«å¯ŸããŠã¢ã¯ã»ã¹ãè¡ã£ãŠããããšãããããŸãã
![]() |
Miraiã®ãœãŒã¹ã³ãŒãã¹ã¯ãªãŒã³ã·ã§ãã(1) |
ãã®ãœãŒã¹ã³ãŒããè§£æãããšãææåŸã«DDoSæ»æã®ããããšããŠudp flood, DNSæ°Žæ»ãæ»æ(DNS water torture)ãSYN Floodãªã©ãè€æ°ã¿ã€ãã®æ»æãã©ãã£ãã¯ãéä¿¡ããæ©èœã確èªã§ããŸããUDPãTCPã®ã¬ã€ã€ãŒã ãã§ãªããDNSãHTTPã®ããã«ã¢ããªã±ãŒã·ã§ã³ã¬ã€ã€ãŒã絡ããæ»æãèŠãããŸãããã®ããããããã¯ãŒã¯ã ãã§ã¯ãªãããµãŒããŒãªãœãŒã¹ãæ¯æžãããããšãã§ããæ©èœè±å¯ãªDDoSæ»æã®ããã®ããããããã圢æã§ããããšãããããŸãã
è匱ãªIoTããã€ã¹ããæ§ç¯ããããããããã
ä»åDynã®æ»æã«äœ¿çšããããããããã(Miraiã«ææããããã€ã¹çŸ€)ã¯50äžå°ä»¥äžã«äžããšèšãããŠããŸããææããå€ãã®IoTæ©åšã¯ãã²ãšã€ã²ãšã€ã¯ã«ã¡ã©ãªã©å°èŠæš¡ãªé»åããã€ã¹ã§ããã50äžå°ä»¥äžã®ããã€ã¹çŸ€ãåæã«ããç¹å®ã®ã·ã¹ãã ã«æ»æã仿ãããšéåžžã«åŒ·åãªæ»æãã©ãã£ãã¯ãçæããããšãå¯èœã«ãªããŸãã
ãã®ãããªæ»æã®åå°ãšãªãè匱æ§ã®ããããã€ã¹ã¯IoTã®æ®åãšãšãã«å¢ããåŸåã«ãããDDoSæ»æã®ã€ã³ãã©ãç°¡åã«åœ¢æã§ããŠããŸãçµæã«ãªã£ãŠããŸããããã«æè¿ã§ã¯ãAndroidã¢ããªãèžã¿å°ã«DDoSæ»æãè¡ãããWireXããšãããããããããç»å ŽããŠããŸãã
IoTããã€ã¹ã®ç®¡çè ã¯ãããã€ã¹ãè匱æ§ã®ããç¶æ ã«ããªãããšãå°ãªããšãããã©ã«ãã®IDããã¹ã¯ãŒãã§ã€ã³ã¿ãŒãããããã¢ã¯ã»ã¹ãããªãããã«ããããšãšåæã«ãæ»æã®ã€ã³ãã©ã«ãªããªãããã«ããã€ã¹ã®ç¶æ ãç£èŠããå¿ èŠããããŸããã¹ããŒããã©ã³ã¢ããªã®éçºè ãåæ§ã«ãå©çšããAPIã«æ°ãä»ããå¿ èŠããããŸãã
ããŒã¯ãŠã§ãåžå Žã§å£²è²·ãããDDoSæ»æãµãŒãã¹
ãããŸã§èª¬æããŠããããã«ãDDoSæ»æãå¢å ãé«åºŠåããŠããèæ¯ã«ã¯ãããŒã¯ãŠã§ãã®ååšããããŸããããŒã¯ãŠã§ãã解説ããã«ããããäžã®äžã®Webãµã€ããã¢ã¯ã»ã¹ã®èгç¹ãã3ã€ã«åé¡ããŸãã
ãŸã1ã€ã¯ã衚局(ãµãŒãã§ãŒã¹)ãŠã§ããã§ããGoogleãªã©ã®äžè¬çãªæ€çŽ¢ãšã³ãžã³ããæ€çŽ¢ã§ããäžç¹å®å€æ°ã®ãŠãŒã¶ãŒãã¢ã¯ã»ã¹ã§ããWebãµã€ããããã«åé¡ãããŸãã
ç¹å®ãŠãŒã¶ãŒã«ã¢ã¯ã»ã¹ãè§£æŸããŠãããããªãµã€ããæ€çŽ¢ãšã³ãžã³ã«çŽ¢åŒããããã¢ã¯ã»ã¹å ãç¥ã£ãŠãããŠãŒã¶ãŒã ããã¢ã¯ã»ã¹ã§ãããµã€ãã¯ããã£ãŒããŠã§ãããšããŠåé¡ãããŸãã
ãããŒã¯ãŠã§ãããšããŠåé¡ãããã®ã¯ãTor (The onion router)ãI2P (Invisible Internet Project)ãªã©ããã©ã€ãã·ãŒãä¿è·ããããã«éçºãããéä¿¡ãç§å¿åãããããã³ã«ãä»ããŠã¢ã¯ã»ã¹ã§ãããµã€ãã§ããããŒã¯ãŠã§ãäžã®åžå Žã§ã¯ããµãŒãã¹ãæäŸããåŽãšå©çšããåŽã®ç«¯æ«ãIPã¢ãã¬ã¹ãªã©ãé èœããŠååŒããããšãã§ããŸãã
ããŒã¯ãŠã§ãã§ã¯éåæ³ãªéº»è¬ããã«ããæŠåšã ãã§ãªãDDoSæ»æã®ãããªãµã€ããŒç¯çœªãæ¯æŽãããµãŒãã¹ãç°¡åã«è³Œå ¥ããããšãã§ããŸããè匱æ§ãæ»æããŒã«ããŠã€ã«ã¹ãªã©ã販売ãããç¯çœªããžãã¹ã®åæ¥åãé²ãã§ããŸããæ»æè ã«ãšã£ãŠãå°éçãªç¥èããªããŠãå¹ççã«ãµã€ããŒæ»æã宿œã§ããç°å¢ãããã£ãŠããŸãã
ãŸãIPAããçºè¡šããããæ å ±ã»ãã¥ãªã㣠10倧è åš 2017ãã«ãæ»æã®ããžãã¹åã9äœã«ã©ã³ã¯ã€ã³ããŠããŸãããã®ãããªãµã€ããŒç¯çœªã®åæ¥åããè¿å¹Žãµã€ããŒæ»æãæ°çš®ã®ãŠã€ã«ã¹ãå¢å ããŠããèæ¯ã«ãªããŸãã
2019幎åé¡ãš2020幎åé¡
ãŸããæ¥æ¬äŒæ¥ã«DDoS察çãæ±ããããèæ¯ãšããŠã2019幎ã«ã©ã°ããŒã¯ãŒã«ãã«ããã2020幎ã«ã¯æ±äº¬ãªãªã³ããã¯ãšãä»åŸäžçèŠæš¡ã®å€§ã€ãã³ããéå¬ãããããšãæããããŸãã
䞻矩䞻匵ãå±ããããã«ãè¡ãããDDoSæ»æã¯ãå€§èŠæš¡ãªã€ãã³ãã§å®æœããããšã§ãããæ³šç®åºŠãé«ããããšãã§ããŸããå ããŠãããããã奜å¥å¿ããè¡ãDDoSæ»æãèŠãããã§ããããå®éã«ãååã®ãªãªäºèŒªã§ã¯540Gbpsãè¶ ããDDoSæ»æãçºçããŸããã
ãã®ã»ããAnonymousã®ãããªãã¯ãã£ãã¹ãã¯ããªãªã³ããã¯ã¹ãã³ãµãŒäŒæ¥ãé¢é£çµç¹ãæ¿åºãæ¥æ¬ã®æåäŒæ¥ãã¿ãŒã²ããã«DDoSæ»æãè¡ãå¯èœæ§ããããŸããæ¥æ¬äŒæ¥ãçµç¹ã®ã»ãã¥ãªãã£èæ§ã詊ããããæ©äŒã§ãããå€§èŠæš¡ãªæ»æãçºçããŠã察åŠã§ããèœåãäžçããæ³šç®ãããŸãã
DDoSæ»æãç®åœãŠãããªããã¹ã¢ãŒã¯ã¹ã¯ãªãŒã³ã
DDoSæ»æã¯å¯çšæ§ãçã£ãæ»æã§ãããããæ¬æ¥ã®ç®çã§ã¯ãªããæ å ±æŸåãç®çãšããæ»æãã«ã¢ãã©ãŒãžã¥ããããšããããŸããDDoSæ»æã¯éåžžã«ç®ç«ã€æ»æã§ããããµãŒãã¹ã忢ããå¯èœæ§ããããã人ã®ç®ãåããããããšãã§ããŸãããã®ç¹åŸŽãæªçšããã»ãã¥ãªãã£ç®¡çè ã®æ°ãããããè£ã§ã¯æ å ±æŸåã«åããæ»æãè¡ããŸãã
ãŸãããã¡ã€ã¢ãŠã©ãŒã«ãªã©ã®ã»ãã¥ãªãã£è£ 眮ããå€ãã®ã€ãã³ããåºåããã¢ãã¿ãªã³ã°ã®å¯çšæ§ãèœãšãããšã§ãæ å ±æŸåã®ããã®æ»æãæåããå¯èœæ§ãé«ããªããŸãã
ããžã¿ã«åãã瀟äŒã€ã³ãã©ã«å¿ã³å¯ãè åš
ç¹°ãè¿ããšãªããŸãããDDoSæ»æã¯ãå¯çšæ§ãæ±ãããããµãŒãã¹ãæäŸããäŒæ¥ãçµç¹ã«å¯ŸããŠè¡ãããŸãããã®æãããã®ãéèŠã€ã³ãã©ãæäŸããçµç¹ã§ãé»åãæ°Žéã®ããã«åžžã«äŸçµŠãå¿ èŠãªãã®ã¯å¯çšæ§ãå¿ èŠã«ãªããŸãã
ãã®å¯çšæ§ãçã£ãæ»æãçºçããå Žåã人ã ã®ç掻ãåœã«åœ±é¿ãåãŒãå¯èœæ§ããããŸããäŸãã°ããã£ã³ã©ã³ãã®ã»ã³ãã©ã«ããŒãã·ã¹ãã ãæ»æãåããæã¯ãäœå® ã®ææ¿èšåãæ©èœããªããªããŸããã
ãã®ããã«äººéã®ç掻ãåœãè ãã瀟äŒã€ã³ãã©ãžã®æ»æã¯èæ§ã匷ããããšãäžå¯æ¬ ã§ãå¯çšæ§ãé«ãæ±ãããããšããã«DDoSæ»æå¯Ÿçãé©åã«è¡ãããšã¯äžå¯æ¬ ã§ãã
ãŸããIoTãã¢ãã€ã«éä¿¡ã®æè¡çºå±ã«äŒŽããè¿å¹Žããžã¿ã«åã®ä¿é²ãéåžžã«é²ãã§ããŠããŸããå·¥å Žãåçºæ³šã·ã¹ãã ããããã¯ãŒã¯ã§ã€ãªãããç¡é§ãªãã¿ã€ã ãªãŒã«è£œé ã©ã€ã³ãåãããã®ãšãã®ãã€ãªããããšã§ããããã¯ãŒã¯ãä»ããå€ãã®ãµãŒãã¹ãç£ã¿åºãããŠããŸããäžæ¹ããµã€ããŒç¯çœªè ãæ»æã®ããã®æè¡çºå±ãç¶ãããµãŒãã¹ã瀟äŒã€ã³ãã©ãéæã«ãšããŸããããžã¿ã«åã«åãããã»ãã¥ãªãã£å¯Ÿçãè¡ããšå ±ã«ãç¹ã«DDoSæ»æã«ãããŠã¯ãæ»æã«å¯Ÿãã察çã ãã§ã¯ãªããæ»æã«å æ ããããšã«ãªããªãããæ³šæããå¿ èŠããããŸãã
ãããŸã§DDoS察çãå¿ èŠãªèæ¯ã«ã€ããŠã説æããŠããŸããããæ¬¡åããã¯å®éã«DDoS察çãè¡ãäžã§ã®æ³šæç¹ã«ã€ããŠè§£èª¬ããŠãããŸãã
åæ³ åå©ïŒãã€ããªããã€ãšãïŒ
A10ãããã¯ãŒã¯ã¹æ ªåŒäŒç€Ÿãããžãã¹éçºæ¬éš ããžãã¹ãœãªã¥ãŒã·ã§ã³éçºéš ã»ãã¥ãªãã£ããžãã¹ãã£ããããã¡ã³ãïŒã¢ã©ã€ã¢ã³ã¹ããžãã¹ãããŒãžã£
å ¬èªæ å ±ã·ã¹ãã ç£æ»äººïŒCISAïŒãCertfied Information System Security Professional (CISSP)ãGIAC Certifed Intrusion Analyst (GCIA)
ã»ãã¥ãªãã£ãŒãã³ããŒã®ããªã³ã·ãã«ã¢ãŒããã¯ããã³ã³ãµã«ãã£ã³ã°ãã¡ãŒã ã®ã·ãã¢ãããŒãžã£ãçµãŠã2016幎ããA10ãããã¯ãŒã¯ã¹ã®ã»ãã¥ãªãã£ããžãã¹ã®è²¬ä»»è ã«çä»»ãã€ãã³ãã§ã®è¬æŒãæžç±ãå¯çš¿èšäºã®å·çãªã©ã»ãã¥ãªãã£ã®åçºæŽ»åã«ãåŸäºã



