Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
Computer Security and Penetration Testing
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Dos (Denial of Services) Aamir Wahid September 23 rd 2004.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Firewalls. What are firewalls? a hardware device and/or software program which sits between the Internet and the intranet, internet, of an organization.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Internet Security facilities for secure communication.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Linux Networking and Security
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Jeopardy ProtocolsPartsPrograms General Internet HTML Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Network Devices and Firewalls Lesson 14. It applies to our class…
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
CompTIA CompTIA Academic/E2C Security+ Study Guide JK0-022
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Defining Network Infrastructure and Network Security Lesson 8.
DDoS Attacks on Financial Institutions Presentation
Introduction to Networking
Introduction to Networking
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Firewalls Chapter 8.
6. Application Software Security
Presentation transcript:

Matt Jennings

 What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques

 February  CNN, Yahoo, eBay, Buy.com, ZDNet, E*Trade, and Datek were affected  Attacks lasted from 30 minutes to 3 hours  Loss of $1.1 million

 Amazon  Paypal  Mastercard  Visa  Department of Justice  MPAA/RIAA  Many more

 DDoS attacks relatively new  First DDoS tools were discovered on networks in May and June of 1998  First Attack on University of Minnesota network  Conferences were held in Pittsburgh Pennsylvania by DIST to discuss the DDoS problem

 October 21 st 2002  Hackers targeted DNS root name servers  Attack lasted one hour  900Mbits/sec  No noticeable effect  Government took notice February 6, 2007

 Open source C# program developed by Praetox Technologies  Primitive DDoS attack using Layer 4 of OSI  Easy to use  However, it takes thousands of hosts to bring down a website  Anonymous failed to bring down Amazon.com

 Also known as TCP Floods  Three way handshake

 Requires less active connections  Real TCP and UDP connections  Can deny proper function hardware regardless of how good the hardware is  Goal of attacks if for network devices or computers to crash  Hard to defend against

 DDoS attacks are hard to detect  Michael Jackson DDoS  After his death, popular news sites such as Google, CNN, and TMZ were taken offline briefly due to the massive burst of traffic.  This shows how hard it can be to detect legitimate traffic from illegitimate traffic

 Update  Operating System  Applications  Install Firewall or IDS/IPS  Use a Patch Management Server to update applications speedily  Remove unnecessary programs and services(especially on Linux distros)

 Audit Frequently  Increase frequency of audits for more critical devices such as routers or switches  Scan network  Log  Configure NAT devices to log all events and traffic

 Segmentation of traffic   Web traffic  Decentralize  If one service is attacked by DDoS, the others won’t go down

 Pick a reasonable time  Higher the time, less time to redirect traffic  Less time, more time to redirect traffic  If a DNS TTL is set at 24 hours, servers would keep that IP address in their cache for 24 hours  Pick a DNS TTL between 4 and 8 hours

 Monitors the network for malicious activity  Very Specific  Tailor the rule base depending on the type of service you are running  Lots of false positives will be generated by the nature of IDS/IPS

 Block certain types of packets  UDP  TCP  Block source address  Not very helpful when DDoS attacks originate from spoofed IP addresses

 MySQL and Oracle queries  Cache Webpages  Cache in site applications  Caching Web Pages is smart so that if customers need to access an webpage even though the original server is down, they can

 Develop statistics about who visits your site  Browser Version  Operating System  Country  Referral  Average ping

 Origin of a packet  Communication with ISP  Requires communication with ISP  To properly identify an IP with a 95% accuracy, the IP must have sent atleast 300,000 packets  More streamlined than previous years

 “Border Gateway Protocol”  Reroute ALL traffic  Scrub the bad traffic(DDoS) off  ISP’s and services such as the ones offered by VeriSign help redirect traffic to be filtered

 Questions?