CSE715 Presentation Project Fall 2004 by Michael Alexandrou and Rusty Coleman.

Slides:



Advertisements
Similar presentations
Module VIII Denial Of Service
Advertisements

(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Internet Threats Denial Of Service Attacks “The wonderful thing about the Internet is that you’re connected to everyone else. The terrible thing about.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Distributed Denial-of-Services (DDoS) Ho Jeong AN CSE 525 – Adv. Networking Reading Group #8.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Defensive Measures for DDoS By Farhan Mirza. Contents Survey Topics Survey Topics Introduction Introduction Common Target of DoS Attacks Common Target.
Firewalls and Intrusion Detection Systems
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
Computer Security and Penetration Testing
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann and Christos Papadopoulos presented by Nahur Fonseca NRG, June, 22.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
IP Spoofing, CS2651 IP Spoofing Bao Ho ToanTai Vu CS Security Engineering Spring 2003 San Jose State University.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Characterizing and Defending Against DDoS Attacks Christos Papadopoulos..and many others.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
10/21/20031 Framework For Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Kavita Chada & Viji Avali CSCE 790.
DDos Distributed Denial of Service Attacks by Mark Schuchter.
Lecture 15 Denial of Service Attacks
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Overview Network communications exposes one to many different types of risks: No protection of the privacy, integrity, or authenticity of messages Traffic.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Reviewed by Dave Lim.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
1 Distributed Denial of Service Attacks. Potential Damage of DDoS Attacks l The Problem: Massive distributed DoS attacks have the potential to severely.
Inferring Denial of Service Attacks David Moore, Geoffrey Volker and Stefan Savage Presented by Rafail Tsirbas 4/1/20151.
DoS/DDoS attack and defense
-SHAMBHAVI PARADKAR TE COMP  PORT SCANNING.  DENIAL OF SERVICE(DoS). - DISTRIBUTED DENIAL OF SERVICE(DDoS). REFER Pg.637 & Pg.638.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Inferring Internet Denial-of-Service Activity Authors: David Moore, Geoffrey M. Voelker and Stefan Savage; University of California, San Diego Publish:
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Denial-of-Service Attacks
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Distributed Denial of Service Attacks
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Defending Against DDoS
Intro to Denial of Serice Attacks
Distributed Denial of Service Attacks
Distributed Denial of Service Attacks
Presentation transcript:

CSE715 Presentation Project Fall 2004 by Michael Alexandrou and Rusty Coleman

The paper … A Framework for Classifying Denial of Service Attacks A Framework for Classifying Denial of Service AttacksAuthors: Alefiya Hussain Alefiya Hussain John Heideman John Heideman Christos Papadopoulos Christos Papadopoulos

Basis for classifying DoS attacks Why classify the attack? Helps to counter the attack Helps to counter the attack Attack Analysis: Header content Header content Ramp up behavior Ramp up behavior Spectral analysis Spectral analysis

Contribution of the paper Automated methodology Automated methodology A real time attack analysis A real time attack analysis Use of a traceback to identify the attacker is trivia in single source Use of a traceback to identify the attacker is trivia in single source New techniques of ramp up and spectral analysis New techniques of ramp up and spectral analysis

Taxonomy of DoS attacks To launch a Distributed DoS attack a malicious user : Compromises Internet hosts by exploiting security holes. Compromises Internet hosts by exploiting security holes. Installs attack tools on the compromised host also known as a zombie. Installs attack tools on the compromised host also known as a zombie.

Taxonomy of DoS attacks Software exploits Software exploits Software exploits. These attacks exploit specific bugs in the victim’s OS or applications. These cases are not considered in this paper. Flooding attacks Flooding attacks

Flooding attacks One or more attackers One or more attackers Streams of packets aimed at overwhelming link bandwidth or computing resources at the victim. Streams of packets aimed at overwhelming link bandwidth or computing resources at the victim. Single source attacks Single source attacks Multi-source attacks Multi-source attacks Reflector attack Reflector attack

Taxonomy of DoS attacks

Flooding attacks

Examples Ping of death Ping of death A modified version of a regular ping request. Land attack Land attack A packet with source host/port equal to destination host/port.

Attack tools Several canned attack tools are available on the Internet, such as Stacheldraht, Trinoo, Tribal Flood Network 2000, and Mstream that generate flooding attacks using a combination of TCP, UDP, and ICMP packets Several canned attack tools are available on the Internet, such as Stacheldraht, Trinoo, Tribal Flood Network 2000, and Mstream that generate flooding attacks using a combination of TCP, UDP, and ICMP packets

Attack Classification Header Contents Header Contents Ramp up behavior Ramp up behavior Spectral Analysis Spectral Analysis

Header Contents Most attacks spoof the source IP address Most attacks spoof the source IP address ID and TTL fields can give hints of the attackers ID and TTL fields can give hints of the attackers Difficult for attackers to coordinate the ID fields. Difficult for attackers to coordinate the ID fields.

Header Contents

Some attack tools forge all header contents. Impossible to distinguish between a single or multiple sources based on header information Need to use another technique

Ramp-up Behavior Observation point near the victim Observation point near the victim Master triggers zombies with trigger message Master triggers zombies with trigger message Results in a ramp up behavior Results in a ramp up behavior

Spectral analysis The attack stream is treated as a discrete function of time x(t) The attack stream is treated as a discrete function of time x(t) The autocorrelation function r(k) of x(t) is examined The autocorrelation function r(k) of x(t) is examined

Autocorrelation function

Discrete-time Fourier Transform

Spectral analysis We define two functions We define two functions The power of the attack stream P(f) The power of the attack stream P(f) The quantile of the attack stream F(p) The quantile of the attack stream F(p)

The cumulative power P(f) & C(f)

The quantile F(p)

Sample Graphs Single Source

Sample Graph Two Sources

Sample Graph Three Sources

Sample Graph Multiple Sources

Conclusion Possible to determine type of DoS attack Possible to determine type of DoS attack Analysis can be performed on the attack to determine if it is single or multi sourced Analysis can be performed on the attack to determine if it is single or multi sourced Need for automated tool to produce these analyses Need for automated tool to produce these analyses