Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.

Slides:



Advertisements
Similar presentations
NETWORK SECURITY ADD ON NOTES MMD © Oct2012. IMPLEMENTATION Enable Passwords On Cisco Routers Via Enable Password And Enable Secret Access Control Lists.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Denial of Service, Firewalls, and Intrusion Detection
Review For Exam 2 March 9, 2010 MIS 4600 – MBA © Abdou Illia.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG 12 Interprovider.
Computer Security and Penetration Testing
1/42 Arab Academy for Banking &Financial Sciences Faculty of Information Systems & Technology - Department of CIS Information System Security Ph.D Prepared.
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Lance West.  Just what is a Denial of Service (DoS) attack, and just how can it be used to attack a network.  A DoS attack involves exploiting operating.
Lecture 15 Denial of Service Attacks
Chapter 9 Phase 3: Denial-of-Service Attacks. Fig 9.1 Denial-of-Service attack categories.
Denial of Service attacks. Types of DoS attacks Bandwidth consumption attackers have more bandwidth than victim, e.g T3 (45Mpbs) attacks T1 (1.544 Mbps).
DENIAL OF SERVICE ATTACK
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
ITIS 6167/8167: Network Security Weichao Wang. 2 Contents ICMP protocol and attacks UDP protocol and attacks TCP protocol and attacks.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
CS426Fall 2010/Lecture 331 Computer Security CS 426 Lecture 33 Network Security (1)
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
1 Network Packet Generator Midway presentation Supervisor: Mony Orbach Presenting: Eugeney Ryzhyk, Igor Brevdo.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
Overview Network communications exposes one to many different types of risks: No protection of the privacy, integrity, or authenticity of messages Traffic.
Introduction to InfoSec – Recitation 11 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Targeted Break-in, DoS, & Malware attacks (II) (February ) © Abdou Illia – Spring 2015.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Network Security Lecture 6 Presented by: Dr. Munam Ali Shah.
Denial of Service (DoS). Overview Introduction Background Benchmarks and Metrics Requirements Summary of Methods Conclusion Vijay C Uyyuru Prateek Arora.
DOS. Overview Denial of Service (DoS) is the act of performing an attack which prevents the system from providing services to legitimate users When successful,
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
CS526Topic 18: Network Security1 Information Security CS 526 Network Security (1)
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Denial of Service Attacks: Methods, Tools, and Defenses Prof. Mort Anvari Strayer University at Arlington.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
DoS/DDoS attack and defense
Hands-On Ethical Hacking and Network Defense
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. SANS ‘98 Conference -
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denial-of-Service Attacks
Computer Network Security Dr. X. OSI stack… again.
DDoS Attacks on Financial Institutions Presentation
Error and Control Messages in the Internet Protocol
Lab 2: TCP IP Attacks ( Indirect)
Intro to Denial of Serice Attacks
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
Presentation transcript:

Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen

Introduction Dos : DoS 泛指駭客試圖妨礙正常使用者使用網路上的 服務。當駭客產生大量的 message flow 使得設備處理不及, 即可讓正常的使用者無法正常使用該服務。 Dos : DoS 泛指駭客試圖妨礙正常使用者使用網路上的 服務。當駭客產生大量的 message flow 使得設備處理不及, 即可讓正常的使用者無法正常使用該服務。 DDos : DDoS 則是 DoS 的特例,駭客利用多台機器同 時攻擊來達到妨礙正常使用者使用服務的目的。 DDos : DDoS 則是 DoS 的特例,駭客利用多台機器同 時攻擊來達到妨礙正常使用者使用服務的目的。

Classical Dos Malformed Packet Attack: Malformed Packet Attack: Ping of Death Attack. Ping of Death Attack. TearDrop Attack. TearDrop Attack. Land Attack. Land Attack.

Ping of Death Attacks An attacker sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to victim. Since the received ICMP echo request packet is bigger than the normal IP packet size, the victim cannot reassemble the packets. The OS may be crashed or rebooted as a result. An attacker sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to victim. Since the received ICMP echo request packet is bigger than the normal IP packet size, the victim cannot reassemble the packets. The OS may be crashed or rebooted as a result. Example : ping –l Example : ping –l

TearDrop Attacks An attacker sends two fragments that cannot be reassembled properly by manipulating the offset value of packet and cause reboot or halt of victim system. An attacker sends two fragments that cannot be reassembled properly by manipulating the offset value of packet and cause reboot or halt of victim system.

Land Attacks An attacker sends a forged packet with the same source and destination IP address. The victim system will be confused and crashed or rebooted. An attacker sends a forged packet with the same source and destination IP address. The victim system will be confused and crashed or rebooted.

Modern DoS attack method Capacity Depletion Capacity Depletion Flood Attack: Flood Attack: TCP SYN Flood Attack. TCP SYN Flood Attack. Smurf Flood Attack. Smurf Flood Attack. UDP Flood Attack. UDP Flood Attack. ICMP Flood Attack. ICMP Flood Attack.

TCP SYN Flood Attacks Taking advantage of the flaw of TCP three – way handshaking behavior, an attacker makes connection requests aimed at the victim server with packets with unreachable source addresses. Taking advantage of the flaw of TCP three – way handshaking behavior, an attacker makes connection requests aimed at the victim server with packets with unreachable source addresses. 保持在 SYN_RECT

Smurf Flood Attacks An attacker sends forged ICMP echo packets to broadcast addresses of vulnerable networks. All the systems on these networks reply to the victim with ICMP echo replies. An attacker sends forged ICMP echo packets to broadcast addresses of vulnerable networks. All the systems on these networks reply to the victim with ICMP echo replies. This attack rapidly exhausts the bandwidth available to the target, effectively denying its services to legitimate users. This attack rapidly exhausts the bandwidth available to the target, effectively denying its services to legitimate users.

UDP Flood Attacks UDP is a connectionless protocol and it does not require any connection setup procedure to transfer data. UDP is a connectionless protocol and it does not require any connection setup procedure to transfer data. A UDP Flood Attack is possible when an attacker sends a lot of UDP packet to a random port on the victim system. A UDP Flood Attack is possible when an attacker sends a lot of UDP packet to a random port on the victim system. If enough UDP packets are delivered to ports on victim, the system will go down. If enough UDP packets are delivered to ports on victim, the system will go down.

ICMP Flood Attacks An attacker sends a huge number of ICMP echo request packets to victim and, as a result, the victim cannot respond promptly since the volume of request packets is high and have difficulty in processing all requests and responses rapidly. The attack will cause the performance degradation or system down. An attacker sends a huge number of ICMP echo request packets to victim and, as a result, the victim cannot respond promptly since the volume of request packets is high and have difficulty in processing all requests and responses rapidly. The attack will cause the performance degradation or system down.

DDos Attack

Zombie Network Zombie Network Ex: 一個中型的 zombie network 具 3000 台系統,若每台 產生 25Kbps ,產生 600,000,000 bps 的流量,大約就是 600Mbps 。 Ex: 一個中型的 zombie network 具 3000 台系統,若每台 產生 25Kbps ,產生 600,000,000 bps 的流量,大約就是 600Mbps 。

抵禦 Dos 反 Dos 的產品 反 Dos 的產品 容量規劃 容量規劃 考慮能容忍的 Dos 最大流量 考慮能容忍的 Dos 最大流量 與 ISP 合作 與 ISP 合作 強化網路邊緣 強化網路邊緣 阻擋 ICMP 與 UDP 封包 阻擋 ICMP 與 UDP 封包 停用 Direct IP Broadcast 停用 Direct IP Broadcast 流量限制 流量限制 強化伺服器 強化伺服器 停用 echo 、 chargen 服務 停用 echo 、 chargen 服務 SYN protection at system level SYN protection at system level

偵測阻斷服務 密切注意惡意軟體 密切注意惡意軟體 大部份由 virus 、 worm 發動 大部份由 virus 、 worm 發動 偵測阻斷服務攻擊的技巧與技術 偵測阻斷服務攻擊的技巧與技術 流量偵測 流量偵測 檢查 SYN_RECV 狀態 (netstat -na) 檢查 SYN_RECV 狀態 (netstat -na) 掃瞄網路裡的阻斷服務攻擊程式 掃瞄網路裡的阻斷服務攻擊程式 整個網路架構防毒軟體 整個網路架構防毒軟體

The End~~