DDoS Attack and Its Defense

Slides:



Advertisements
Similar presentations
COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips.
Advertisements

Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
Defending Against Denial of Service Attacks Presented By: Jordan Deveroux 1.
Random Flow Network Modeling and Simulations for DDoS Attack Mitigation Jiejun Kong, Mansoor Mirza, James Shu, Christian Yoedhana, Mario Gerla, Songwu.
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson University of Washington- Seattle, WA Presented by Mohammad Hajjat- Purdue University Slides.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Defending against Large-Scale Distributed Denial-of-Service Attacks Department of Electrical and Computer Engineering Advanced Research in Information.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Network Layer Security Distributed Denial of Service (DDoS) attacks and the proposed solutions November 12, 2007.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff
04/12/2001ecs289k, spring ecs298k Distributed Denial of Services lecture #5 Dr. S. Felix Wu Computer Science Department University of California,
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Defense Against DDoS Presented by Zhanxiang for [Crab] Apr. 15, 2004.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Final Introduction ---- Web Security, DDoS, others
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Large-Scale IP Traceback in High-Speed Internet : Practical Techniques and Theoretical Foundation Jun (Jim) Xu Networking & Telecommunications Group College.
Distributed Denial of Service Attacks
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Packet-Marking Scheme for DDoS Attack Prevention
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
1 Defense Strategies for DDoS Attacks Steven M. Bellovin
By Rod Lykins.  Brief DDoS Introduction  Packet Marking Overview  Other DDoS Defense Mechanisms.
TCP Security Vulnerabilities Phil Cayton CSE
DoS/DDoS attack and defense
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
A Real and Rising Concern
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Distributed Denial of Service (DDoS) Attacks
Pi: A Path Identification Mechanism to Defend Against DDoS Attacks
Defending Against DDoS
Filtering Spoofed Packets
Stateless Source Address Mapping for ICMPv6 Packets
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Who should be responsible for risks to basic Internet infrastructure?
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
Network Support For IP Traceback
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
IIT Indore © Neminath Hubballi
Detect and Prevent Rogue Traffic in Mobile Ad Hoc Networks
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Outline The spoofing problem Approaches to handle spoofing
Distributed Denial of Service (DDoS) Attacks
Presentation transcript:

DDoS Attack and Its Defense CSE551: Introduction to Information Security CSE551 Handout on DDoS

Outline What is a DDOS attack? How to defend a DDoS attack? CSE551 Handout on DDoS and Worm

What is DDoS attack? Internet DDoS attack is real threat - on websites · Yahoo, CNN, Amazon, eBay, etc (Feb. 2000)  services were unavailable for several hours - on Internet infrastructure · 13 root DNS servers (Oct, 2002)  7 of them were shut down, 2 others partially unavailable Lack of defense mechanism on current Internet CSE551 Handout on DDoS and Worm

What is a DDos Attack? DoS attacks: Examples of DoS include: Attempt to prevent legitimate users of a service from using it Examples of DoS include: Flooding a network Disrupting connections between machines Disrupting a service Distributed Denial-of-Service Attacks Many machines are involved in the attack against one or more victim(s) CSE551 Handout on DDoS and Worm

CSE551 Handout on DDoS and Worm

CSE551 Handout on DDoS and Worm

CSE551 Handout on DDoS and Worm

What Makes DDoS Attacks Possible? Internet was designed with functionality & not security in mind Internet security is highly interdependent Internet resources are limited Power of many is greater than power of a few CSE551 Handout on DDoS and Worm

To Address DDoS attack Ingress Filtering - P. Ferguson and D. Senie, RFC 2267, Jan 1998 - Block packets that has illegitimate source addresses - Disadvantage : Overhead makes routing slow Identification of the origins (Traceback problem) - IP spoofing enables attackers to hide their identity - Many IP traceback techniques are suggested Mitigating the effect during the attack - Pushback CSE551 Handout on DDoS and Worm

IP Traceback - Allows victim to identify the origin of attackers - Several approaches ICMP trace messages, Probabilistic Packet Marking, Hash-based IP Traceback, etc. CSE551 Handout on DDoS and Worm

PPM Probabilistic Packet Marking scheme - Probabilistically inscribe local path info - Use constant space in the packet header - Reconstruct the attack path with high probability Making at router R For each packet w Generate a random number x from [0,1) If x < p then Write IP address of R into w.head Write 0 into w.distance else if w.distance == 0 then wirte IP address of R into w.tail Increase w.distance endif CSE551 Handout on DDoS and Worm

PPM (Cont.) legitimate user attacker Victim CSE551 Handout on DDoS and Worm

PPM (Cont.) legitimate user attacker Victim CSE551 Handout on DDoS and Worm

PPM (Cont.) legitimate user attacker Victim CSE551 Handout on DDoS and Worm

PPM (Cont.) R V legitimate user attacker Victim CSE551 Handout on DDoS and Worm

What is Pushback? A mechanism that allows a router to request adjacent upstream routers to limit the rate of traffic CSE551 Handout on DDoS and Worm

How Does it Work? A congested router request other adjacent routers to limit the rate of traffic for that particular aggregate. Router sends pushback message Received routers propagates pushback CSE551 Handout on DDoS and Worm

Conclusion What is a DDoS attack? Defending a DDoS attack Ingress filtering Trace-back Push-back CSE551 Handout on DDoS and Worm