1 Crashing the Net Steven M. Bellovin AT&T Labs Research

Slides:



Advertisements
Similar presentations
Routing Routing in an internetwork is the process of directing the transmission of data across two connected networks. Bridges seem to do this function.
Advertisements

SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Nick Feamster Research Interest: Networked Systems Arriving January 2006 Likely teaching CS 7260 in Spring 2005 Here off-and-on until then. works.
Let's say we want to access domain - reliablescribe.com First we need to buy a computer We need to subscribe to an Internet Service Provider (ISP) The.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Copyright © 1999 Telcordia Technologies All Rights Reserved Christian Huitema An SAIC Company IPv6: Connecting 6 billion.
The Internet AIMS 2710 R. Nakatsu. History Of The Internet: Origins The Internet has its roots in the U.S. military, which funded a network in 1969 called.
Application Layer At long last we can ask the question - how does the user interface with the network?
The internet layer Skills: None IT concepts: layered protocols, the internet layer, IP protocol, router, dumb (“end-to- end,” “neutral”) networks This.
DOMAIN NAMING SYSTEM (AN OVERVIEW) By -DEEPAK. Topics --DNS What is DNS? Purpose of DNS DNS configuration files.
IP Routing: an Introduction. Quiz
1 Reminding - ARP Two machines on a given network can communicate only if they know each other’s physical network address ARP (Address Resolution Protocol)
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
How the Internet Works Jon Crowcroft,
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
Lesson 19 Internet Basics.
Fundamentals of Networking Discovery 1, Chapter 9 Troubleshooting.
The internet and the WWW
TCP/IP (Transmission Control Protocol / Internet Protocol) : The Protocol That Made the Internet Possible. By Albert Kalim (lecture materials quoted by.
Internet Outage Trends Sean Donelan Equinix Inc NANOG 21 Atlanta, Georgia.
How the Internet Works: What happens when information is sent from your computer?
THE INTERNET INTERNET REGISTRIES & INTERNET REGISTRARS.
HOW ACCESS TO WWW Student Name : Hussein Alkhaldi.
1 DNS: Domain Name System People: many identifiers: m SSN, name, Passport # Internet hosts, routers: m IP address (32 bit) - used for addressing datagrams.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
CSx760 Computer Networks1 Introduction to Network Protocols Kang Li.
1 The Internet Structure & evolution Messaging Addressing E-Commerce Intranets & Internets.
Brett Neely IP Next Generation. To boldly go where no network has gone before...
CSC Intro. to Computing Lecture 23: Networks.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
How Does the Internet Work? Protocols Protocols are rules that describe how computers communicate and exchange data. The Internet has a series of these.
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
THE INTERNET Computer Fundamentals. TODAY I AM:  Learning about the complexity of sending messages over the Internet  Translating web addresses into.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Chapter 2 The Internet Underlying Architecture. How the DNS works? DNS: Domain Name System Visiting a website: - Write the address - IP will use the address.
Akademska in raziskovalna mreža Slovenije 1 Networking Basics Gorazd Božič Academic and Research Network of Slovenia
Networks: LANs, WANs and Communication Protocols How do computers communicate?
9: Troubleshooting Your Network
1 Defense Strategies for DDoS Attacks Steven M. Bellovin
NetTech Solutions Common Connectivity Problems Lesson Eight.
1 st Semester, Batch 2014 CS-114: Introduction to Computer Science LECTURE-3 THE INTERNET AND WORLD WIDE WEB.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 10 Internet Group Management Protocol (IGMP)
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
UNIT 2 LESSON 8 CS PRINCIPLES. UNIT 2 LESSON 8 OBJECTIVES Students will be able to: Describe how routers develop routing tables to determine how to send.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
science/internet-intro
1 Host versus Network Security Steven M. Bellovin
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
What is the Internet? 11/27/07. Where did the Internet start?  Networked computers started by Military  ARPANET – 1969 experiment by the Defense department.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
COMP 431 Internet Services & Protocols
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Domain Name System The Technology Context Presentation.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Domain Name System DNS - A system for converting host names and domain names into IP addresses on the Internet or on local networks that use the TCP/IP.
Outline Basics of network security Definitions Sample attacks
Why Do We Need More Research?
Fix AOL Mail Error Code 554 Call for Help
Troubleshooting IP Addressing
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Providing Network Services
Preventing Denial of Service Attacks
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

1 Crashing the Net Steven M. Bellovin AT&T Labs Research

2 Physical Layer l Backhoes –Natural enemy of cables. –Most fibers haven't evolved strong defenses, but some are symbiotic with gas pipelines. l Squirrels –Many squirrels find insulation tasty. –Some seem to home in on electrical fields. Do these attacks scale?

3 Massive Fiber Cut Pauses East West Traffic Week, 29 September 1999) “At least four Internet service providers are experiencing severe traffic backlogs because of a massive fiber-optic cable cut that put out four OC-192 lines connecting data networks on the East and West Coasts. “Industry sources told Week that the cut was accidentally made by an unidentified gas company in Ohio around 12:30 EST today. “The news is sending shockwaves through the networking community, with many carrier operators struggling to understand why, all of a sudden, their traffic is routed through London and Denmark. At least four Internet service providers are being affected by the outage…”

4 Other Risks -- Routing l Routing tables tell the traffic how to flow. l Routing tables are generated by routing protocols. l Each router believes its neighbors. l If one of them lies, it confuses all of the others...

5 RISKS Digest (1 May 97) “Internet service providers lost contact with nearly all of the U.S. Internet backbone operators… some for up to 3 hours. The problem was attributed to MAI Network Services... which provided Sprint and other backbone providers with incorrect routing tables… “Furthermore, the routing tables Sprint received were designated as optimal, which gave them higher credibility than otherwise. Something like 50,000 routing addresses all pointed to MAI.”

6 Other Risks -- DNS l Under the hood, the Internet relies on IP addresses to identify hosts. l The Domain Name System (DNS) maps host names into IP addresses. l If the mapping is wrong, bad things happen...

7 RISKS Digest (18 July 97) “[On] 17 Jul 1997, a remarkable event occurred. The 4AM update of the root nameserver database was botched - horribly. The... effect of this is that the Internet does not work right. In this episode, the top-level domains.com and.net have ceased to exist... “The problem apparently began... during the autogeneration of the NSI top-level domain zone files... Quality-assurance alarms were evidently ignored and the corrupted files were released at 2:30am EDT.”

8 If it can happen by mistake, it can happen by malice.

9 Hack Puts AOL Off Limits (CNET News.com 16 Oct 1998) “Internet users trying to send to America Online users or get to the online giant's site have been plagued by problems due to a major glitch with the Internet's domain naming system. “The problem was caused when someone forged an message to the InterNIC, run by Network Solutions, requesting that Network Solutions change AOL's designated name server.”