Network Security Lecture 6 Presented by: Dr. Munam Ali Shah.

Slides:



Advertisements
Similar presentations
NETWORK SECURITY ADD ON NOTES MMD © Oct2012. IMPLEMENTATION Enable Passwords On Cisco Routers Via Enable Password And Enable Secret Access Control Lists.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Review For Exam 2 March 9, 2010 MIS 4600 – MBA © Abdou Illia.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Computer Security and Penetration Testing
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Web server security Dr Jim Briggs WEBP security1.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Lance West.  Just what is a Denial of Service (DoS) attack, and just how can it be used to attack a network.  A DoS attack involves exploiting operating.
Lecture 15 Denial of Service Attacks
Chapter 9 Phase 3: Denial-of-Service Attacks. Fig 9.1 Denial-of-Service attack categories.
DENIAL OF SERVICE ATTACK
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Port Scanning.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
13.1 Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Security.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Targeted Break-in, DoS, & Malware attacks (II) (February ) © Abdou Illia – Spring 2015.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Network Security Lecture 31 Presented by: Dr. Munam Ali Shah.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
DOS. Overview Denial of Service (DoS) is the act of performing an attack which prevents the system from providing services to legitimate users When successful,
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
DoS/DDoS attack and defense
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Role Of Network IDS in Network Perimeter Defense.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Denial-of-Service Attacks
Comparison of Network Attacks COSC 356 Kyler Rhoades.
DDoS Attacks on Financial Institutions Presentation
Domain 4 – Communication and Network Security
Error and Control Messages in the Internet Protocol
CS4622 Team 4 Worms, DoS, and Smurf Attacks
Intro to Denial of Serice Attacks
Red Team Exercise Part 3 Week 4
Presentation transcript:

Network Security Lecture 6 Presented by: Dr. Munam Ali Shah

Summary of the previous lecture We discussed different types of security attacks We looked how viruses, worms and Trojan can be harmful for a computing environment.

Outlines  Botnets  More discussion on DoS attacks  Cost of a DoS attacks  ICMP Echo Datagrams  TCP 3-Way Handshake  TCP SYNC Flood attack

Objectives To be able to distinguish between different types of security attacks To identify and classify which security attacks leads to which security breach category

Botnets A virus or worm often doesn’t do any immediate damage in order to stay invisible and spy on users (log keystrokes, steal serial numbers etc.) or add affected machine to a botnet (the machine becomes a bot) Botnet – a network of “owned” machines (bots) controlled usually via IRC protocol or P2P network used to send spam, launch DDoS attacks; also phishing, click fraud, further spread of viruses and worms etc. size: 100, 1000, 10k … up to > 1M of nodes access to bots and botnets can be bought (from $0.01 per bot)

Logic Bomb Program that initiates a security incident under certain circumstances It waits for certain conditions to occur. Stack and Buffer Overflow Exploits a bug in a program (overflow either the stack or memory buffers) Failure to check bounds on inputs, arguments Write pass arguments on the stack into the return address on stack When routine returns from call, returns to hacked address  Pointed to code loaded onto stack that executes malicious code Unauthorized user or privilege escalation

Virus Dropper Virus dropper inserts virus onto the system Many categories of viruses, literally many thousands of viruses File / parasitic Boot / memory Macro Source code Polymorphic to avoid having a virus signature Encrypted Stealth Tunneling Multipartite Armored

Keystroke logger Attacks still common, still occurring Attacks moved over time from science experiments to tools of organized crime Targeting specific companies Creating botnets to use as tool for spam and DDOS delivery Keystroke logger to grab passwords, credit card numbers Why is Windows the target for most attacks? Most common Everyone is an administrator  Licensing required? Monoculture considered harmful

Definitions of DoS and DDoS attacks A DoS (Denial of Service) attack aims at preventing, for legitimate users, authorised access to a system resource or the delaying of system operations and functions DDoS are distributed Denial of Service attacks that achieve larger magnitude by launching coordinated attacks by using a framework of “handlers” and “agents”. A DDoS is innovative in the form of coordination of the attack.

10 DoS attacks in the news On February 2000, several serious DDoS attacks targeted some of the largest Internet web sites, including Yahoo, Buy.com, Amazon, CNN and eBay.

Costs of DoS attacks Denial of Service is currently the most expensive computer crime for victim organisations:

Classification of DoS attacks 1. Bandwidth consumption -Attacks will consume all available network bandwidth 2. Resource starvation -Attacks will consume system resources (mainly CPU, memory, storage space) 3. Programming flaws -Failures of applications or OS components to handle exceptional conditions (i.e. unintended or unexpected data is sent to a vulnerable component) - OS components’ crash

Modes of attacks 1.Network connectivity attacks Flooding malformed traffic 2. Consumption of resources Filling-up of data structures storage (i.e. intentionally generating errors that must be logged) side effect of other forms of attack from a virus (i.e. SQL slammer virus) accounts locked-out during a password cracking

ICMP “echo” datagrams ICMP “echo” datagrams are typically used to test network connectivity. A destination host is expected to respond with an ICMP ECHO_REPLY message when “pinged” with an ICMP ECHO_REQUEST message

Ping of death In the IP specification, the maximum datagram size is 64 KB. Some systems react in an unpredictable fashion when receiving oversized (>64 KB) IP datagrams, causing systems crashing, freezing or rebooting, and resulting in a denial of service. Example of a DoS that exploits a programming flaw: the IP implementation is unable to deal with the exceptional condition posed by the oversized datagram.

Yet another simple form of DoS: ICMP (ping) flood Attackers flood a network link with ICMP ECHO_REQUEST messages using the “ping” command Exploits a characteristic of the IP layer, that answers with ICMP ECHO_REPLY messages upon reception of ICMP ECHO_REQUEST messages

Directed broadcast addresses The directed broadcast address is an IP address with all the host address set to 1s in host portion. It is used to simultaneously address all hosts within the same network. i.e., the directed broadcast address for the network class B has IP address For subnetted networks, the directed broadcast address is an IP address with all the host address set to 1 within the same subnet.

“ping” to a directed broadcast address All hosts in the broadcast domain answer back Network traffic “amplification”: 1 datagram generates n datagrams in response (where n is the number of systems replying to a broadcast ICMP ECHO_REQUEST)

Smurf attack In a Smurf attack, the attacker sends ping requests to a broadcast address, with the source address of the IP datagram set to the address of the target system under attack (spoofed source address)

Cont. All systems within the broadcast domain will answer back to the target address, thus flooding the target system with ICMP traffic and causing network congestion => little or no bandwidth left for legitimate users Smurf attack

Smurf attack protection Hosts can be configured not to respond to ICMP datagrams directed to IP broadcast addresses. Most OS have specific network settings to enable/disable the response to a broadcast ICMP ping message. Disable IP-directed broadcasts at your leaf routers: to deny IP broadcast traffic onto your network from other networks (in particular from the Internet) A forged source is required for the attack to succeed. Routers must filter outgoing packets that contain source addresses not belonging to local subnetworks.

RFC 2827 Defeating DoS which employ IP Spoofing Router can check any traffic it is passsing for the valid source addres Network administrator log information on packet which provide basis for monitoring and suspicious activity.

TCP’s three-way handshake The "three-way handshake" is the procedure used to establish a connection.

TCP’s three-way handshake Cont.

TCP SYN flood A TCP SYN flood is an attack based on bogus TCP connection requests, created with a spoofed source IP address, sent to the attacked system. Connections are not completed, thus soon it will fill up the connection request table of the attacked system, preventing it from accepting any further valid connection request. The source host for the attack sends a SYN packet to the target host. The target hosts replies with a SYN/ACK back to the legitimate user of the forged IP source address. Since the spoofed source IP address is unreachable, the attacked system will never receive the corresponding ACK packets in return, and the connection request table on the attacked system will soon be filled up.

TCP SYN flood Cont.

The attack works if the spoofed source IP address is not reachable by the attacked system. If the spoofed source IP address is reachable by the attacked system, then the legitimate owner of the source IP address would respond with a RST packet back to the target host, closing the connection and defeating the attack. TCP SYN flood is a denial of service attack that sends a host more TCP SYN packets than the protocol implementation can handle. This is a resource starvation DoS attack because once the connection table is full, the server is unable to service legitimate requests. TCP SYN flood Cont.

TCP SYN flood protection Apply Operating System fixes: Systems periodically check incomplete connection requests,and randomly clear connections that have not completed a three-way handshake. This will reduce the likelihood of a complete block due to a successful SYN attack, and allow legitimate client connections to proceed. Configure TCP SYN traffic rate limiting Install IDS (Intrusion Detection Systems) capable of detecting TCP SYN flood attacks.

Filter network traffic: Static packet filtering – stateless IP filtering  Static packet filtering is a firewall and routing capability that provides network packet filtering based only on packet information in the current packet and administrator rules.  Stateless IP filters are very inexpensive  A static IP filter does little more than simply route traffic, it is very good for traffic management.  Static filters are vulnerable to IP spoofing attacks TCP SYN flood protection Cont.

Summary of today’s lecture In today’s lecture, we discussed in detail about DoS attacks and its classification. Ping of Death Attack TCP datagram attack through SYN floods

Next lecture topics How to secure a Wireless Network How different mechanisms could be used to ensure security in a wireless network

The End