SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

TCP Flooding. TCP handshake C S SYN C SYN S, ACK C ACK S Listening Store data Wait Connected.
Computer Security and Penetration Testing
Transport Layer – TCP (Part2) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Transmission Control Protocol (TCP)
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Availability Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Aspects of Computer.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 Reading Log Files. 2 Segment Format
Analysis of a Denial of Service Attack on TCP Christoph L.Schuba, Ivan V.Krsul, Markus G. Kuhn, Eugene H.Spafford, Aurobindo Sundaram, Diego Zamboni July.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
DENIAL OF SERVICE ATTACK
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Sales Kickoff - ARCserve
CCI through Firewall TNG 2.4 Updated April 16, 2002.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
The Transmission Control Protocol (TCP) TCP is a protocol that specifies: –How to distinguish among multiple destinations on a given machine –How to initiate.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Transmission Control Protocol TCP. Transport layer function.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
CSE 461 Section. Let’s learn things first! Joke Later!
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Attacks
Bishop: Chapter 26 Network Security Based on notes by Prashanth Reddy Pasham.
Lesson 7: Network Security and Attacks. Computer Security Operational Model Protection = Prevention+ (Detection + Response) Access Controls Encryption.
TCP Security Vulnerabilities Phil Cayton CSE
DoS/DDoS attack and defense
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
© 2002, Cisco Systems, Inc. All rights reserved..
Transport Layer1 TCP Connection Management Recall: TCP sender, receiver establish “connection” before exchanging data segments r initialize TCP variables:
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
An Introduction To ARP Spoofing & Other Attacks
Outline Basics of network security Definitions Sample attacks
Introduction to Networking
The IP, TCP, UDP protocols
0x1A Great Papers in Computer Security
Firewalls Purpose of a Firewall Characteristic of a firewall
Outline Basics of network security Definitions Sample attacks
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

SYN Flooding: A Denial of Service Attack Shivani Hashia CS265

Topics  What is Denial of Service attack?  Types of attacks  SYN flooding attack  Solutions  Conclusion

What is Denial of Service Attack?  Main aim to stop the victim’s machine from doing it’s required job  Server unable to provide service to legitimate clients  Damage done varies from minor inconvenience to major financial losses

Types of Attacks  Bandwidth Consumption: All available bandwidth used by the attacker e.g.,ICMP ECHO attack  Resource Consumption: Resources like web server, print or mail server flooded with useless requests e.g., mail bomb  Network Connectivity: The attacker forces the server to stop communicating on the network e.g., SYN Flooding.

SYN Flooding Attack  Network connectivity attack  Most commonly-used DoS attack  Launched with a little effort  Presently, difficult to trace attack back to its originator  Web servers and systems connected to Internet providing TCP-based services like FTP servers, mail servers are susceptible  Exploits TCP’s three-way handshake mechanism and its limitations in maintaining half open connections

TCP Protocol: Three-way Handshake SYN Client requests for connection ACK + SYN Server agrees for connection request ACK Client finishes handshake SD Client connecting to TCP port LISTEN SYN_RCVD CONNECTED

Three-way Handshake SYN x SYN y +ACK x+1 ACK y+1 LISTEN SYN_RCVD CONNECTED SD Initialize sequence numbers for a new connection (x,y) Resources allocated

How SYN Flooding Attack Works? Client connecting to TCP port I have ACKed these connections but I have not received an ACK back!  Resources allocated for every half open connection Victim  Limit on number of half open connections SYN SYN + ACK Attacker Uses spoofed addresses

Attack Modes  Different parameters by which SYN flood attack can vary: 1.Batch-size : Number of packets sent from source address in a batch 2.Delay : Time interval between two batches of packets sent 3.Source address allocation  Single Address: Single forged address  Short List: Small list to pick source addresses  No List: Randomly created source addresses

Solutions  Using firewall  System configuration improvements  SYN cache

Using Firewalls  Two ways in which firewall used:  Firewall as a relay: Packets from source received and answered by the firewall  Firewall as a semi-transparent gateway: Lets SYN and ACK to pass, monitors the traffic and reacts accordingly

Firewall as a Relay SYN SYN+ACK A FIREWALLD Acts as a proxy Attack with Relay Firewall SYN+ACK SYN

Firewall as a Relay (cont’d) SYN SYN+ACK ACK SYN SYN+ACK ACK Data Sequence number conversion SFirewallD Legitimate connection with relay firewall

Firewall as Semi-transparent Gateway S Firewall D SYN SYN+ACK ACK RST Timeout

System Configuration Improvements 1) Decrease timeout period  Reset the connections sooner  Can deny legitimate access where the timeout period will be less than the round trip times 2) Increase the number of half-open connections  More connections at the same time  Will increase the use of resources

SYN Cache  Global hash table instead of the usual per socket queued connections  Protection from running out of the resources  Limit on number of entries in the table and hash bucket  Limit on the memory usage and amount of time taken to search for a matching entry

SYN Cache (cont’d)  Queue is divided into hash buckets  Each bucket treated as a First in First out Queue.  Hash value computed by choosing a function of source and destination IP addresses, ports and a secret key  Hash value acts as an index in the hash table.  Secret key transforms hash value so that an attacker cannot target specific hash bucket and deny service to a specific machine

Conclusion  SYN Flooding denial of service attack one of the most common attacks  Caused by the flaws in TCP protocol  Not possible to eliminate the attack  Possible to reduce the danger by taking the described measures properly

Thank you