CS4622 Team 4 Worms, DoS, and Smurf Attacks

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG Dearborn,
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Computer Security and Penetration Testing
Network Attack and Defense
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Web server security Dr Jim Briggs WEBP security1.
DENIAL OF SERVICE ATTACK
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
DoS/DDoS attack and defense
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
© SYBEX Inc All Rights Reserved. CompTIA Security+ Study Guide (SY0-201) “Chapter 2: Identifying Potential Risks”
MALWARE.
Internet Quarantine: Requirements for Containing Self-Propagating Code
DDoS Attacks on Financial Institutions Presentation
Instructor Materials Chapter 7 Network Security
Attacks and Malicious Code
Managing Secure Network Systems
Distributed Denial of Service Attacks
EN Lecture Notes Spring 2016
Error and Control Messages in the Internet Protocol
Network Security: DoS Attack, Smurf Attack, Botnets, Worms
Network Security: DoS Attacks, Smurf Attack, & Worms
Intro to Denial of Serice Attacks
What Makes a Network Vulnerable?
سمینار آموزشی امنیت شبکه
Distributed Denial of Service Attacks
Red Team Exercise Part 3 Week 4
Types of Network Attacks
Network Security Mark Creighton GBA 576 6/4/2019.
Distributed Denial of Service Attacks
Introduction to Internet Worm
An overview over Botnets
Presentation transcript:

CS4622 Team 4 Worms, DoS, and Smurf Attacks DeShawn Dortch, Hunter Layton, Alaina Hammonds, Michael Hewitt, Oliver Harper, Ben Nunnelley

What Is a Worm? Worm vs Virus Self Propagating Host What Does it Do? Spread Delivery of Payload

How Does it Spread? System vulnerabilities Taking over specific ports Backdoors Social Engineering E-Mail IRC Human Ignorance

Examples SQL Slammer Vigilante Worm ILOVEYOU Worm WannaCry

Damages caused by worms No direct damage caused by worms Network and Bandwidth Hampering Malicious payloads

Recovering from and Preventing Worm Attacks Containment Inoculation Quarantining Treating Preventing Antivirus Software Patches General email best practices

DoS Attacks What is a DoS attack? How do DoS attacks affect you? How is a DoS attack executed? Examples of DoS attacks: Flood attacks Application Layer attacks APDoS attacks “Ping of Death” “UDP Storm” What are the effects of a DoS attack? How can a DoS attack be prevented?

What is a DoS Attack? Denial of Service Attack Usually targeted at larger servers or businesses Can involve other innocent users via “Distributed” DoS

How do DoS Attacks Affect You? Prevents users from accessing services hosted by the victim Consumes large amounts of the victim’s bandwidth Consumes victim’s processing power; slows computer Decreases strength of victim’s security, making them vulnerable to other attacks

How is a DDoS Attack Executed? Zombie Spreading control LOIC & HOIC Botnet

Examples of DoS Attacks Flood attacks - Flood victim with too much traffic for the victim to buffer Application Layer attacks - HTTP GET and HTTP POST APDoS attacks - Advanced Persistent Denial of Service “Ping of Death” - Oversized packets using “ping” command “UDP Storm” - Random ports on the targeted host with IP packets containing UDP datagrams

How Can a DoS Attack Be Prevented? Preventative vs Reactive Patching security software Regular monitoring of systems Increase effective resources Detect known signatures Compare traffic on network

Smurf Attack What is a Smurf Attack? How a Smurf Attack works Effects of Smurf Attack How can Smurf Attacks be prevented?

What is a Smurf Attack? A variation of DDoS Utilizes ICMP Echo request packets to flood a network with requests and responses IP broadcasting allows for this type of attack to be amplified

How a Smurf attack works: An ICMP Ping request is created with a spoofed IP address of the target computer This request is distributed across the host network The replies are sent back to the target and this creates a flood of pings that disrupts the network

Effects of Smurf Attack Victim network gets flooded with replies Smurf attack can cripple a company’s servers for extended periods of time, sometimes used as a cover for other attacks on the network Smurf program downloaded as a trojan Sits dormant til activated by remote user Usually combined with other ways to access systems such as rootkits

Prevention of Smurf Attacks Put filters on routers and firewalls to prevent address spoofing Turn off IP broadcasting on network routers Filter out directed broadcast traffic that is coming into the network

Sources “Computer Worms Explained.” Norton Security Online, www.nortonsecurityonline.com/security-center/computer-worms.html. “Computer Worm.” Veracode, 15 Aug. 2017, www.veracode.com/security/computer-worm. “CCNA Security: Worm, Virus and Trojan Horse Attacks.” CertificationKits.com, www.certificationkits.com/cisco- certification/ccna-security-certification-topics/ccna-security-describe- security-threats/ccna-security-worm-virus-and-trojan-horse-attacks/.

Sources cont. Cisco. “What Is the Difference: Viruses, Worms, Trojans, and Bots?” Cisco, Cisco, 20 Nov. 2017, www.cisco.com/c/en/us/about/security- center/virus-differences.html. Gibson, Steve, and Leo Laporte. “Breaches & Vigilante Worms.” Security Now! Transcript of Episode #528, 6 Oct. 2015, www.grc.com/sn/sn- 528.htm. “Distributed Denial of Service Attacks - The Internet Protocol Journal - Volume 7, Number 4.” Cisco, 15 Sept. 2015, www.cisco.com/c/en/us/about/press/internet-protocol-journal/back- issues/table-contents-30/dos-attacks.html.

Sources cont. “Understanding Denial of Service (DoS) Attacks.” NCSC Site, 31 Jan. 2018, www.ncsc.gov.uk/guidance/understanding-denial-service-dos- attacks. Incapsula.com, www.incapsula.com/ddos/attack-glossary/smurf-attack- ddos.html. “ICMP Attacks.” InfoSec Resources, 2 Sept. 2015, resources.infosecinstitute.com/icmp-attacks/#gref. “What Is a Smurf Attack?” Usa.kaspersky.com, usa.kaspersky.com/resource-center/definitions/smurf-attack.

Sources cont. “ Smurf DDoS Attack Type.” Corero, www.corero.com/resources/ddos- attack-types/smurf-ddos-attack.html. “What Is a Computer Worm and How Does It Spread?” Emsisoft Security Blog, 28 Feb. 2018, blog.emsisoft.com/en/28154/computer-worms/.