Handout B: Network Traffic Analysis Report
Campus network bandwidth monitoring from July 13-20, 2001. Code Red worm scanning and DDoS attack generated unprecedented traffic volumes, paralyzing university networks.
Daily Network Traffic Statistics
| Date | Time Period | Inbound (Mbps) | Outbound (Mbps) | Peak Scanning Activity | Incident Status |
|---|---|---|---|---|---|
| July 12 | Normal | 45 | 38 | None | BASELINE |
| July 13 | 14:00-15:00 | 52 | 480 | Initial Scanning | INFECTION BEGINS |
| July 13 | 15:00-22:00 | 68 | 850 | Rapid Growth | Exponential Spread |
| July 14 | 00:00-06:00 | 94 | 1,200 | Peak Scanning | WORM SPREADING RAPIDLY |
| July 14 | 06:00-12:00 | 105 | 2,100 | Massive Activity | Campus Networks Degraded |
| July 14 | 12:00-18:00 | 78 | 3,400 | Peak Bandwidth | NETWORK USABILITY: 5% |
| July 14 | 18:00-23:59 | 120 | 2,850 | Continued Scanning | Emergency Response Mode |
| July 19 | 00:00-12:00 | 480 | 4,200 | DDoS Attack Phase | WHITEHOUSE.GOV TARGETED |
| July 19 | 12:00-18:00 | 560 | 3,900 | Peak DDoS Traffic | Sustained Attack |
| July 20 | 00:00-06:00 | 320 | 1,400 | Attack Continuing | Patch Deployment Underway |
| July 20 | 06:00-23:59 | 95 | 180 | Declining Traffic | Recovery Phase |
IM NOTES (Do Not Show to Players): Key observations:
Exponential Growth: Outbound traffic grows from 480 Mbps to 4,200 Mbps in 6 days. This is exponential infection β each infected server helps scan and infect more servers.
Network Saturation: July 14 peak of 3,400 Mbps outbound on a university link that typically used 38 Mbps. Assuming 100 Mbps link capacity, the university network becomes completely unusable. Every scan request is a new HTTP GET request consuming bandwidth.
DDoS Phase (July 19+): When the hardcoded trigger date (00:00 UTC July 19) arrives, all infected servers begin attacking
198.137.240.91(the original White House IP address). The shift to 4,200 Mbps outbound is a sustained, coordinated attack from thousands of servers globally.Scanning Pattern: Infected servers use a pseudo-random number generator seeded with their own IP address to generate target IPs to scan. This means each server scans different targets, so scanning is distributed across the entire IPv4 address space.
Detailed Scanning Pattern Analysis
Code Red Scanning Algorithm Reconstruction:
Random IP Generation Pattern (July 13-19):
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Each infected server (PRNG seeded with local IP):
Infected Server 1 (IP: 192.168.1.X) generates:
Target 1: 203.145.67.89 [HTTP GET /default.ida?exploit...]
Target 2: 45.123.78.90 [HTTP GET /default.ida?exploit...]
Target 3: 167.44.55.220 [HTTP GET /default.ida?exploit...]
... (random targets across IPv4 space)
Infected Server 2 (IP: 203.100.50.X) generates:
Target 1: 198.55.123.45 [HTTP GET /default.ida?exploit...]
Target 2: 152.78.90.12 [HTTP GET /default.ida?exploit...]
Target 3: 61.234.167.8 [HTTP GET /default.ida?exploit...]
... (different random targets)
Result: Globally distributed scanning from 300,000+ infected servers
= Each server scanning 400+ targets per minute
= Distributed scanning of entire IPv4 space in days
= Impossible to block from single location
Traffic Profile per Infected Server:
- Scanning: 40-80 HTTP GET requests/minute to random IPs
- Infection attempts: 60-100 HTTP GET requests/minute to vulnerable targets
- Defacement: Continuous file modification to web directory
- Overall: Each server generating 150-300 Mbps of scanning traffic
IM NOTES (Do Not Show to Players): The scanning algorithm was the genius of Code Red:
Decentralized Scanning: Unlike traditional malware C&C where a central server commands attacks, each infected server independently scanned random targets. This made it impossible to shut down by shutting down central infrastructure.
Pseudo-Random but Deterministic: The PRNG was seeded based on local IP and date. This meant researchers could predict which servers would attack which targets, but couldnβt predict which servers would become infected.
Birthday Paradox: With 300,000+ servers randomly scanning the IP address space, the probability of hitting vulnerable IIS servers became very high very quickly.
No Network Defense: Pre-2001 network security didnβt have DDoS protection, rate limiting, or behavioral detection. Firewalls were stateless and couldnβt handle the scanning volume.
DDoS Attack Target Analysis (July 19, 2001)
Coordinated DDoS Attack on United States Government Infrastructure
Primary Target: 198.137.240.91 (White House website - www.whitehouse.gov)
Attack Duration: 19 July 00:00 UTC through 20 July 10:00 UTC
Participating Servers: ~359,000 infected IIS servers globally
Attack Pattern:
Time Window (UTC) | Attack Traffic | Sustained Duration | Target Status
ββββββββββββββββββββΌβββββββββββββββββΌββββββββββββββββββββΌββββββββββββββββ
July 19 00:00-06 | 2.4 Gbps | 6 hours | OFFLINE
July 19 06:00-12 | 2.8 Gbps | 6 hours | OFFLINE
July 19 12:00-18 | 1.9 Gbps | 6 hours | OFFLINE
July 19 18:00-24 | 2.1 Gbps | 6 hours | OFFLINE
July 20 00:00-06 | 1.6 Gbps | 6 hours | OFFLINE/RECOVERED
White House Response:
- Original IP (198.137.240.91) changed within 6 hours
- New IP (199.182.123.50) assigned by ISP
- Attack continued against old IP (ineffective)
- Site restored on new IP by 20 July 10:00 UTC
IM NOTES (Do Not Show to Players): Historical context:
Actual DDoS Success: This is documented as one of the first successful large-scale DDoS attacks against a government site. 2.8 Gbps in 2001 was unprecedented. Modern DDoS attacks are in the 100+ Gbps range, but this was shocking at the time.
IP Change Mitigation: The White House had their ISP change their IP address, which was an effective (if crude) mitigation. The malware was hardcoded to attack the old IP, so new attacks against the new IP required the worm to evolve (it didnβt).
Time-Based Trigger: The hardcoded trigger date was genius for stealth. The worm spread quietly for 6 days (July 13-19), then revealed its destructive intent. This meant defenders initially had no way to predict the DDoS attack.
Attribution Confusion: The attack against the White House fueled false attribution to China and βChinese hackers,β despite no credible evidence.
Key Discovery Questions
- Why would infected servers attack a single IP address (the White House) starting on July 19?
The trigger date was hardcoded in the wormβs binary. The authors wanted maximum spread before launching the attack. This suggests the attack was purposeful and deliberate, not a random byproduct of the wormβs scanning behavior.
- How did the White House respond to a 2.8 Gbps attack in 2001?
IP address change was the primary mitigation. Modern DDoS mitigation uses traffic scrubbing, rate limiting, geographic blocking, and other sophisticated techniques. In 2001, simply changing IPs was effective because the attack was hardcoded to a specific IP.
IM Facilitation Notes
This handout shows the transition from infection/scanning phase to the deliberate attack phase, helping players understand:
- Exponential growth in worm-based attacks
- Time-based triggers for staged attacks
- Impact of coordinated DDoS from distributed sources
- Government-level incident response to internet attacks