By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)

Slides:



Advertisements
Similar presentations
Denial of Service, Firewalls, and Intrusion Detection
Advertisements

Access Control Chapter 3 Part 5 Pages 248 to 252.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security and Penetration Testing
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Survey of Distributed Denial of Service Attacks and Popular Countermeasures Andrew Knotts, Kent State University Referenced from: Charalampos Patrikakis,Michalis.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
23 rd Annual Computer Security Application Conference Miami, Florida 12/13/2007 Dongqing Yuan Department of Information Technology Management University.
BUSINESS B1 Information Security.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
GORAN OSIM AND TIM MYERS CPSC 424 DDOS AND THE SYSADMIN.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
A Network Security -Firewall Bruce Turin.
DoS/DDoS attack and defense
Role Of Network IDS in Network Perimeter Defense.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denial-of-Service Attacks
AP Waseem Iqbal.  DoS is an attack on computer or network that reduces, restricts or prevents legitimate of its resources  In a DoS attack, attackers.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Critical Security Controls
Instructor Materials Chapter 7 Network Security
NETWORKS Fall 2010.
Backdoor Attacks.
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
Introduction to Networking
Introduction to Networking
Who should be responsible for risks to basic Internet infrastructure?
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Red Team Exercise Part 3 Week 4
6. Application Software Security
Presentation transcript:

By Steve Shenfield COSC 480

 Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing) Clean Pipes Intrusion Prevention Systems(IPS)  Conclusion

Denial-of-Service  A malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. ex) inability to login to an account or access a website  Targeted resources: bandwidth, CPU, memory, disk capacity, or any combination

 September the very first DoS attack occurred against Panix(New York ISP) using SYN flood  January first major attack involving DNS servers against Register.com  February over 10,000 online game servers attacked by group RUS  December a group called “Anonymous” successfully attacked Mastercard.com, PayPal, and Visa.com but failed against Amazon.com

185 Respondents2009 CSI Computer Crime and Security Survey

 How much does a successful DoS attack cost? Estimated at $122,000 per attack in 2004 Up to 32 hours for security personal to counteract damages done  Interruption to services may negatively impact customer satisfaction and trust

Total Losses ≈45.6 million 194 Respondents Year = 2007 CSI 2007 Computer Crime and Security Survey

 For Users Install system security mechanisms Protect yourself from being a zombie  For Businesses Security companies can guard a client’s network ex) Prolexis Technologies

Firewalls Pros  Will prevent simple flood attacks ex) SYN flood  Able to allow or deny protocols, ports, or IP addresses Cons  Unable to prevent more complex attacks

Switches & Routers Pros  Both have the ability to limit data rate  Both have network Access Control Lists ACLs are custom router filters Able to filter both inbound and outbound traffic Cons  Most can be easily overwhelmed

Blackholing  Attempts to mitigate the impact of an attack  Redirects traffic from attacked DNS or IP address to a “black hole” Then all traffic will be dropped  Must know IP address of attacker or else legitimate traffic will be dropped as well

Sinkholing  Routes suspicious traffic to a valid IP address where it can be analyzed  Capturing traffic and analyzing it can be done with a sniffer Traffic found to be malicious is rejected Cons  Unable to react to severe attacks as effectively as blackholing

Clean Pipes  Best used when deployed inside ISP  When an attack occurs, traffic is diverted to a cleaning center in the ISP Here the traffic is “cleaned” by specialized filtering devices and malicious activity is removed Only legitimate traffic is passed to the destination

Intrusion Prevention System(IPS)  Monitors network traffic for malicious activity Scans both inbound and outbound Searches for suspicious patterns known as signatures or rules  System logs malicious activity and will attempt to stop it

 What have we learned? DoS Definition Brief History of Notable Attacks Damages/Losses for a Business Protect yourself from becoming a Zombie Defense Mechanisms

 4/dos_attacks.html 4/dos_attacks.html  athmaker.biz/whitepapers/CSISurvey2009.pdf athmaker.biz/whitepapers/CSISurvey2009.pdf     it-security it-security   0.pdf 0.pdf