Trends in Denial of Service Attack Technology -or – Oh, please, they arent smart enough to do that… Presentation to CERT-Polska November 2001 Rob Thomas,

Slides:



Advertisements
Similar presentations
60 Days of Basic Naughtiness
Advertisements

High Performance Research Network. Development Lab. / Supercomputing Center 1 Design of the Detection and Response System against DDoS attacks Yoonjoo.
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Defending Against Denial of Service Attacks Presented By: Jordan Deveroux 1.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Internet Threats Denial Of Service Attacks “The wonderful thing about the Internet is that you’re connected to everyone else. The terrible thing about.
CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA The CERT Coordination Center is part of.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG 12 Interprovider.
Introduction to Security Computer Networks Computer Networks Term B10.
Computer Security and Penetration Testing
Outline Definition Point-to-point network denial of service
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
DDos Distributed Denial of Service Attacks by Mark Schuchter.
COEN 252: Computer Forensics Router Investigation.
Lecture 15 Denial of Service Attacks
Denial of Service attacks. Types of DoS attacks Bandwidth consumption attackers have more bandwidth than victim, e.g T3 (45Mpbs) attacks T1 (1.544 Mbps).
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Introduction to Honeypot, Botnet, and Security Measurement
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Honeypot and Intrusion Detection System
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Lesson 4 Networked Computer Security Attacks on Internet Computers.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service Attacks
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
DoS/DDoS attack and defense
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. SANS ‘98 Conference -
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Network Security: DoS Attacks, Smurf Attack, & Worms
CS4622 Team 4 Worms, DoS, and Smurf Attacks
A Distributed DoS in Action
Outline Basics of network security Definitions Sample attacks
6. Application Software Security
Presentation transcript:

Trends in Denial of Service Attack Technology -or – Oh, please, they arent smart enough to do that… Presentation to CERT-Polska November 2001 Rob Thomas,

Credit Where Credit is Due! Presentation and paper by Kevin Houle, George Weaver, Neil Long, and Rob Thomas – a global- ish study of a global problem! Portions originally presented by Kevin Houle at NANOG 23, October Paper located at

Agenda – Keeping up with Rob Some history. Gift giving for all occasions. Target selection – ready, FIRE, aim. Methods of control. Trends in use and methods. What we are not seeing.

BP (Before Pain) - Pre-1999 DoS Tools: Single-source, single target tools IP source address spoofing Packet amplification (e.g., smurf) Deployment: Widespread scanning and exploitation via scripted tools Hand-installed tools and toolkits on compromised hosts (unix) Use: Hand executed on source host

The danger grows DoS Tools: Multiple-source, single target tools Distributed attack networks (handler/agent) DDoS attacks Deployment: Hand-selected, hard-coded handlers Scripted agent installation (unix) Use: Custom, obfuscated control channels –intruder handlers –handlers agents

The bubble bursts : Infamous DDoS attacks : DNS amplification attacks, mstream DDoS tool : VBS/Loveletter, t0rnkit : Hybris : Trinity IRC-based DDoS tool (unix) :Multiple IRC-based DDoS tools (Windows)

The fun continues :Ramen worm :VBS/OnTheFly (Anna Kournikova), erkms worm, 1i0n worm :Adore/Red worm, carko DDoS tool :cheese worm, w0rmkit worm, sadmind/IIS worm :Maniac worm :W32/Sircam, Leaves, Code Red worm, various telnetd worms, various IRC-based DDoS tools (knight, kaiten) : Nimda worm

Methods of gift giving - The deployment of malware Greater degree of automation –Self-propagating worms Central source propagation Back channel propagation Autonomous propagation

Central Source Propagation central-source attackervictims next-victims 1 - exploit 2 – copy code 3 - repeat Example: 1i0n worm

Back Channel Propagation attackervictims next-victims 1 - exploit 2 – copy code 3 - repeat Example: Ramen worm

Autonomous Propagation attackervictims next-victims 1 – exploit & copy code2 - repeat Examples: Code Red, Code Red II

Trends Matrix Degree of Blind Targeting Selective Targeting AutomationVery high Low high Vulnerability- specificity Very high Low high Other criteriaLowVery high Targeting Systems: Blind vs. Selective Targeting

Blind Targeting –Social Engineering W32/Sircam Anti-virus software –Specific vulnerabilities sadmind/IIS worm - UNIX/IIS Code Red, Code Red II - IIS Nimda - Windows/IIS Various telnetd worms – UNIX Activity tends to follow vulnerability lifecycles

Selective Targeting – Malware Makes House Calls –Windows end-users increasingly targeted less technically sophisticated less protected difficult to contact en mass slow response to security alerts/events well-known netblocks widespread broadband connectivity increase in home networking exploit technology base is maturing CERT® Tech Tip - Home Network Security

Selective Targeting – Routers Arent Unkown Anymore –Routers increasingly targeted Source for recon/scanning Proxy to IRC networks Source for packet flooding attacks Compromise via weak/default passwords Routers sometimes reconfigured –public guides are available Increased threat of routing protocol attacks –discussions at DefCon and Black Hat Briefings

Control Infrastructure – The Old Way Control Infrastructure – The classic DDoS model intruder handler agent victim

Control Infrastructure – The Older Way is the New Way –Increased use of IRC networks and protocols IRC server replaces the handler –common, legit service ports (e.g., 6667/tcp) –commands are buried in legit traffic –no agent listeners; outbound connections only More survivable infrastructure –reduction in address lists maintained –disposable, easy to obtain agents –makes use of public IRC networks –private servers are also used

Why IRC? Agent redirection / update is easier –everyone change to a new channel –everyone change to a new IRC server –everyone download this updated module floating domains used to direct agents –bogus WHOIS data, stolen credit cards –A record modification redirects hard-wired agents

Trends in Use – Keep it simple, keep it legit –Less emphasis on forged packet characteristics size and distribution of DDoS makes response difficult –overwhelming number of sources in DDoS attack –sources often cross multiple AS boundaries –high bandwidth consumption is easy; no need for fancy packets increase in attacks using legitimate traffic –mixes with other traffic –harder to filter/limit

Trends in Impact – The blast radius grows –Increase in collateral damage backup systems impacted by sharp increases in log volumes financial impact on sites with measured usage circuits multiple sites impacted in shared data centers arp storms impacting locally infected networks –Highly automated deployments are themselves causing denial of service conditions

What We Are Not Seeing Changes in fundamental conditions that enable denial of service attacks –Over-consumption of finite resources Processing cycles Memory resources Network bandwidth –Interdependency of security on the Internet The exposure to DoS attack of SiteA depends on the security of SiteB There are huge numbers of SiteBs

What We Are Not Seeing (2) Advances in DoS attack payload –Seeing the same common packet stream types –Known attacks work, there is little incentive to improve TCP (SYN|ACK|FIN|RST) flood UDP flood ICMP echo request/reply flood Amplification attacks Source IP address spoofing

What We Are Not Seeing (3) Reductions in launch-point availability –Vendors are still producing insecure products –Administrators and users are still deploying and operating systems insecurely –Vulnerability life cycle is still lengthy (2-3 years)

What We Are Not Seeing (4) A decrease in pages for Rob. An increase in sleep for Rob. Hey, wait, this describes us ALL!

Questions? Feedback is always welcome! Questions are always welcome! Suggestions are always welcome!

Thank you for your time! Thanks to CERT-Polska for the invitation!