Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.

Similar presentations


Presentation on theme: "Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher."— Presentation transcript:

1 Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher

2 Lecture 18 Page 2 CS 236 Online DDoS In the Real World Do DDoS attacks really happen? What responses are taken in real cases? What tools are available and used today to handle DDoS?

3 Lecture 18 Page 3 CS 236 Online Real World Occurrence of DDoS Estonia, Georgia, Iran, Australia governments have all suffered large DDoS attacks in recent years Companies also get attacked fairly often –Usually for extortion GoDaddy has been attacked many times recently It’s pretty common

4 Lecture 18 Page 4 CS 236 Online So What Do Victims Do? Generally, either last it out –Or pay extortion, if that’s the goal of the attacker Or enlist help from ISP –Who may, in turn, enlist help of other parties

5 Lecture 18 Page 5 CS 236 Online How Do ISPs Help? Two approaches: –Drop traffic –Block attacking machines

6 Lecture 18 Page 6 CS 236 Online Dropping Traffic Drop traffic before it gets to the victim Which traffic? Usually, ISP engineers examine data flows by hand –Dropping obvious attack flows –Or all traffic from obvious attack sources May need to get upstream ISPs to help Generally a blunt instrument And not quick

7 Lecture 18 Page 7 CS 236 Online Blocking the Bots Can’t just block them near the target Must get them further upstream –Generally at their entry to the Internet Requires cooperation of their providers –Won’t do it for just anyone A lot of work, if there are lots of bots

8 Lecture 18 Page 8 CS 236 Online Content Distribution Network Approaches Akamai and similar companies can help their customers They maintain cached copies of customer content And have huge server pools spread around the Internet How does that help?

9 Lecture 18 Page 9 CS 236 Online The Resource Multiplication Solution Cache content at vast number of places As demand increases, increase caching Few attackers can overwhelm big enough cache providers –Who could charge for the protection A feasible solution, but not cheap

10 Lecture 18 Page 10 CS 236 Online Do Practical Measures Work? If you can get the necessary parties to help, usually yes What’s theoretically hard might not be too bad, in practice –If you are important enough Small fry are likely to get squashed


Download ppt "Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher."

Similar presentations


Ads by Google