 Unlike other forms of computer attacks, goal isn’t access or theft of information or services  The goal is to stop the service from operating o.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Denial of Service. Denial of Service Attacks Unlike other forms of computer attacks, goal isnt access or theft of information or services The goal is.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Intrusions (vulnerability, exploit) Intrusion phases Reconnaissance (non-technical, technical) – Interrogating DNS, split-horizon DNS Scanning – Learn.
Internet Threats Denial Of Service Attacks “The wonderful thing about the Internet is that you’re connected to everyone else. The terrible thing about.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
CIS 659 – Introduction to Network Security – Fall 2003 – Class 10 – 10/9/03 1 What is Distributed Denial of Service?
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Denial of Service. Denial of Service Attacks Unlike other forms of computer attacks, goal isn’t access or theft of information or services The goal is.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Denial of Service.
Denial of Service Attacks. Understanding to Denial of Services.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Distributed Denial of Service Attacks
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Denial of Service. Denial of Service Attacks Unlike other forms of computer attacks, goal isn’t access or theft of information or services The goal is.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
CIS 659 – Introduction to Network Security – Fall 2003 – Class 10 – 10/9/03 1 Simple Denial of Service.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
DoS/DDoS attack and defense
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Role Of Network IDS in Network Perimeter Defense.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Outline Basics of network security Definitions Sample attacks
Defending Against DDoS
Defending Against DDoS
Outline Basics of network security Definitions Sample attacks
Red Team Exercise Part 3 Week 4
DDoS Attack and Its Defense
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

 Unlike other forms of computer attacks, goal isn’t access or theft of information or services  The goal is to stop the service from operating o To deny service to legitimate users o Slowing down may be good enough  This is usually a temporary effect that passes as soon as the attack stops

 Lots of ways o Crash the machine o Or put it into an infinite loop o Crash routers on the path to the machine o Use up a key machine resource o Use up a key network resource o Deny another service needed for this one (DNS)  Using up resources is the most common approach

 Floods  Congestion control exploits  Unexpected header values  Invalid content  Invalid fragments  Large packets  Impersonation attacks

7

 One machine tries to bring down another machine  There is a fundamental problem for the attacker: o The attack machine must be “more powerful” than the target machine to overload it OR o Attacker uses approaches other than flooding  The target machine might be a powerful server

 Sometimes generating a request is cheaper than formulating a response e.g. sending a bogus packet is cheaper than decrypting this packet and checking that it’s bogus  If so, one attack machine can generate a lot of requests, and effectively multiply its power  Not always possible to achieve this asymmetry  This is called amplification effect

 Use multiple machines to generate the workload  For any server of fixed power, enough attack machines working together can overload it  Enlist lots of machines and coordinate their attack on a single machine

 Yes, attacks happen every day o One study reported ~4,000 per week 1  On a wide variety of targets  Tend to be highly successful  There are very few mechanisms that can stop certain attacks  There have been successful attacks on major commercial sites 1 ”Inferring Internet Denial of Service Activity,” Moore, Voelker, and Savage, Usenix Security Symposium, 2002

 August 2009, hours-long service outage o 44 million users affected  At the same time Facebook, LiveJournal, YouTube and Blogger were under attack o Only some users experienced an outage  Real target: a Georgian blogger Image borrowed from Wired.com article. Originally provided by Arbor Networks

 December 2010  Parts of services went down briefly  Attack launched by a group of vigilantes called Anonymous o Bots recruited through social engineering o Directed to download DDoS software and take instructions from a master o Motivation: Payback to services that cut their support of WikiLeaks after their founder was arrested on unrelated charges  Several other services affected

 Most (if not all) sites could be rendered non-operational  The Internet could be largely flooded with garbage traffic  Essentially, the Internet could grind to a halt o In the face of a very large attack  Almost any site could be put out of business o With a moderate sized attack

 Everyone connected to the Internet can be attacked  Everyone who uses Internet for crucial operations can suffer damages

18 Doesn’t matter! The problem isn’t your vulnerability, it’s everyone elses’

Doesn’t matter! Either the attacker slips his traffic into legitimate traffic Or he attacks the firewall

Doesn’t matter! The attacker can fill your tunnel with garbage Sure, you’ll detect it and discard it... But you’ll be so busy doing so that you’ll have no time for your real work

Doesn’t matter! The attacker can probably get enough resources to overcome any level of resources you buy

 Widely available on the net o Easily downloaded along with source code o Easily deployed and used  Automated code for: o Scanning – detection of vulnerable machines o Exploit – breaking into the machine o Infection – placing the attack code  Rootkits o Hide the attack code o Restart the attack code o Keep open backdoors for attacker access  DDoS attack code

 Attacker can customize: o Type of attack  UDP flood, ICMP flood, TCP SYN flood, Smurf attack (broadcast ping flood)  Web server request flood, authentication request flood, DNS flood o Victim IP address o Duration o Packet size o Source IP spoofing o Dynamics (constant rate or pulsing) o Communication between master and slaves

 You don’t need much knowledge or great skills to perpetrate DDoS  Toolkits allow unsophisticated users to become DDoS perpetrators in little time  DDoS is, unfortunately, a game anyone can play

 Attackers follow defense approaches, adjust their code to bypass defenses  Use of subnet spoofing defeats ingress filtering  Use of encryption and decoy packets, IRC or P2P obscures master-slave communication  Encryption of attack packets defeats traffic analysis and signature detection  Pulsing attacks defeat slow defenses and traceback  Flash-crowd attacks generate application traffic

 If we solve simple attacks, DDoS perpetrators will move on to more complex attacks  Recently seen trends: o Larger networks of attack machines o Rolling attacks from large number of machines o Attacks at higher semantic levels o Attacks on different types of network entities o Attacks on DDoS defense mechanisms  Need flexible defenses that evolve with attacks