Availability Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Aspects of Computer.

Slides:



Advertisements
Similar presentations
REFLEX INTRUSION PREVENTION SYSTEM.. OVERVIEW The Reflex Interceptor appliance is an enterprise- level Network Intrusion Prevention System. It is designed.
Advertisements

Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection Aaron Beach Spring 2004.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
TCP Flooding. TCP handshake C S SYN C SYN S, ACK C ACK S Listening Store data Wait Connected.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 Reading Log Files. 2 Segment Format
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Network Attacks Mark Shtern.
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Communication Protocols III Tenth Meeting. Connections in TCP A wants to send to B. What is the packet next move? A travels through hub and bridge to.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
DoS/DDoS Attack Forbes Henderson. What is a DoS Attack  DoS Attack (Denial of Service Attack)  A Denial of Service Attack is Often used by hackers to.
Network Attacks. Network Trust Issues – TCP Congestion control – IP Src Spoofing – Wireless transmission Denial of Service Attacks – TCP-SYN – Name Servers.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Sales Kickoff - ARCserve
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Intrusion Detection Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Intrusion.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
CSE 461 Section. Let’s learn things first! Joke Later!
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Attacks
Aspects of Security Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Aspects.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Bishop: Chapter 26 Network Security Based on notes by Prashanth Reddy Pasham.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
8: Network Security 8-1 IPsec: Network Layer Security r network-layer secrecy: m sending host encrypts the data in IP datagram m TCP and UDP segments;
DoS/DDoS attack and defense
DDoS Defense: Utilizing P2P architecture By Joshua Aslan Smith.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
© 2002, Cisco Systems, Inc. All rights reserved..
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
DDoS Attacks on Financial Institutions Presentation
Outline Basics of network security Definitions Sample attacks
Introduction to Networking
The IP, TCP, UDP protocols
0x1A Great Papers in Computer Security
Outline Basics of network security Definitions Sample attacks
Red Team Exercise Part 3 Week 4
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Availability Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Aspects of Computer Security 11

Aspects of Computer Security Recall that historically computer security has been defined to encompass: Confidentiality: (also called secrecy/privacy) who can read information; Integrity: who can write or modify information; Availability: are resources available when needed. Coming up: Availability Attacks 22

Availability Attacks Attacks on availability are called denial of service or DoS attacks. An attacker prevents a user from accessing or utilizing available system resources. A particular class of DoS attacks are labeled Distributed Denial of Service or DDoS attacks. These typically involve co-opting the services of many other machines to participate in the attack, a botnet. Coming up: Gresty’s Framework 33

Gresty’s Framework David Gresty at Liverpool John Moore’s University classifies DoS attacks into two groups: 1.the consumer problem: (also called “man-in-the-middle” attack) the attacker gets logically between the client and service and somehow disrupts the communication. 1.the producer problem: the attacker produces, offers or requests so many services that the server is overwhelmed. Coming up: Typical Scenarios 44

Typical Scenarios In a typical producer attack: the volume of requests may overwhelm the server. the transaction may involve some handshake (protocol); the attacker does not respond and the server ties up resources waiting for a response. A classic example of the second is so-called syn flooding Coming up: TCP Handshake 55

TCP Handshake Via this three-way handshake a client establishes a TCP connection with a server. Server receives the SYN packet, allocates space in an internal table and sends SYN/ACK back to the caller. The connection remains “half-open” until the ACK is received by the server or the connection times out. Coming up: SYN Flooding Attack 66

SYN Flooding Attack A SYN Flooding attack happens when an attacker forges the return address on a number of SYN packets. The server fills its table with these half-open connections. All legitimate accesses are denied until the connections time- out. Coming up: SYN Flooding Solutions 77

SYN Flooding Solutions Is the SYN flooding problem inherent in the way TCP connections are established? How could you close the vulnerability? 1.Increase the server’s queue size: typically only 8 connections are allowed; could consume considerable resources. 2.Shorten the time-out period: might disallow connections by slower clients. 3.Filter suspicious packets: if the return address does not match the apparent source, discard the packet. May be hard to determine. 4.Change the algorithm: instead of storing the record in the queue, send the information encrypted along with the SYN/ACK. A legitimate client will send it back with the ACK. Coming up: Lessons 88

Lessons Availability attacks are called “denial of service” attacks. An attacker can either block traffic from clients (the consumer problem) or flood the server (the producer problem). Syn flooding is a classic DoS attack. Coming up: Blocking Flooding Attacks 99

Blocking Flooding Attacks A filter or packet sniffer can detect patterns of identifiers in the request stream and block messages in that pattern. Ingress filtering means sniffing incoming packets and discarding those with source IP addresses outside a given range (e.g., those known to be reachable via that interface). It is a very hard problem to be able to discriminate patterns of attack from patterns of standard usage. An overly aggressive filter also gives a type of denial of service by discarding too many legitimate requests. Coming up: Protection from DoS Attacks 10

Protection from DoS Attacks A good firewall can help by filtering out illegal requests. However, a typical DoS flooding attack may comprise only legal requests. An intrusion detection system (IDS) can analyze traffic patterns and react to anomalous patterns. However, often there is nothing apparently wrong but the volume of requests. An IDS reacts after the attack has begun. An intrusion prevention system (IPS) attempts to prevent intrusions by more aggressively blocking attempted attacks. This assumes that the attacking traffic can be identified. IDS/IPS are useful for confidentiality and integrity attacks, not just DoS attacks. Coming up: Potential DDoS Solutions 11

Potential DDoS Solutions A DDos attack comes when an attacker takes over a number of nodes in a network and uses them as bots to launch a coordinated producer attack. How might you counter them? over-provisioning the network—have too many servers to be overwhelmed (expensive and unworkable); filtering attack packets—somehow distinguish the attack packets from regular packets (may not be possible); slow down processing—disadvantages all requestors, but perhaps disproportionately disadvantages attackers; “Speak-up” solution (Mike Walfish)—request additional traffic from all requestors. Walfish’s solution assumes that the attacker’s bots are already maxed out. So this solution raises the proportion of valid to invalid requests. Coming up: Lessons 12

Lessons Availability attacks are difficult to counter because it is very hard to distinguish legitimate from illegitimate traffic. Various solutions attempt to block incoming traffic or to detect anomalous activity. End of presentation 13