Application Layer Attack. DDoS DDoS – Distributed Denial of Service Why would any one want to do this? In some cases, for bringing down service of competitors,

Slides:



Advertisements
Similar presentations
COMPUTER MALWARE FINAL PROJECT PROPOSAL THE WAR AGAINST CAPTCHA WITH IMPLEMENTATION OF THE WORLDS MOST ACCURATE CAPTCHA BREAKER By Huy Truong & Kathleen.
Advertisements

Categories of I/O Devices
CAPTCHA: Using Hard AI Problems for Security 12 Jun 2007 Ohad Barak (a.k.a. jo) Luis Von Ahn, EuroCrypt 2003.
Cloud Computing COMP 1631, Winter 2011 Yanggang Chen.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Bitcoin. What is Bitcoin? A P2P network for electronic payments Benefits: – Low fees – No middlemen – No central authority – Can be anonymous – Each payment.
DDOS Defense by Offense OFFENSE Presented by: Anup Goyal Aojan Su.
5/18/2015 Samarpita Hurkute DDoS Defense By Offense 1 DDoS Defense by Offense Michael Walfish,Mythili Vutukuru,Hari Balakrishnan,David Karger,Scott Shenker.
DDoS: Defense by Offense 1 DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker, SIGCOMM ‘06 Presented.
1 DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, Scott Shenker, SIGCOMM ‘06 Presented by Lianmu Chen DDoS:
CAPTCHA Presented by: Sari Louis SPAM Group: Marc Gagnon, Sari Louis, Steve White University of Illinois Spring 2006.
Michael Walfish, Mythili Vutukuru, Hari Balakrishanan, David Karger, Scott Shankar DDos Defense by Offense.
CAPTCHA Presented By Sayani Chandra (Roll )
COVERT TWO-PARTY COMPUTATION LUIS VON AHN CARNEGIE MELLON UNIVERSITY JOINT WORK WITH NICK HOPPER JOHN LANGFORD.
DDoS Defense by Offense Presented by: Matthew C.H. Ma Damon Chan.
Mitigating Bandwidth- Exhaustion Attacks using Congestion Puzzles XiaoFeng Wang Michael K. Reiter.
DDoS: Defense by Offense 1 DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker, SIGCOMM ‘06 Presented.
CAPTCHA Prabhakar Verma “08MC30”.
CAPTCHA & THE ESP GAME SHAH JAYESH CS575SPRING 2008.
Human Computation CSC4170 Web Intelligence and Social Computing Tutorial 7 Tutor: Tom Chao Zhou
Kill-Bots: Surviving DDoS Attacks That Mimic Legitimate Browsing Srikanth Kandula Dina Katabi, Matthias Jacob, and Arthur Berger.
Department of Information Engineering 1 What is port number? OK, you know that in order to connect to Internet, each computer must have a unique address.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
Matthias Neubauer CAPTCHA What humans can do, But computers can not.
Mrs. Beth Cueni Carnegie Mellon
CAPTCHA 1 Are you Human? (Sorry, I had to ask). CAPTCHA 2 Agenda What is CAPTCHA? Types of CAPTCHA Where to use CAPTCHAs? Guidelines when making a CAPTCHA.
intelligence study and design of intelligent agentsis the intelligence of machines and the branch of computer science that aims to create it. AI textbooks.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds Srikanth Kandula, Dina Katabi, Matthias Jacob, and Arthur Berger Awarded Best Student.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.
CMPE 421 Parallel Computer Architecture
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Exploration Seminar 3 Human Computation Roy McElmurry.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
Protecting Web Servers from Content Request Floods Srikanth Kandula ▪ Shantanu Sinha ▪ Dina Katabi ▪ Matthias Jacob CSAIL –MIT.
Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Limiting Denial of Service Using Client Puzzles Presented by Ed Kaiser.
Preventing Automated Use of STMP Reservation System Using CAPTCHA.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Withstanding Multimillion-Node Botnets Colin Dixon Arvind Krishnamurthy, Tom Anderson Affiliates Day, 2007.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Mehmud Abliz, Taieb Znati, ACSAC (Dec., 2009). Outline Introduction Desired properties Basic scheme Improvements to the basic scheme Analysis Related.
Packet-Marking Scheme for DDoS Attack Prevention
Books Don’t tear the books, treat them like your books. Make sure you return the books on time. Keep the books out of a baby’s reach. Don’t let a dog.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Biometrics Authentication Bruce Maggs. 2 Biometric Identifiers Fingerprints, palm prints Palm veins Hand shape Facial image DNA Iris, retinal images Odor.
CONDUCT COMPETITIVE ANALYSIS 3.05 C. BENEFITS OF COMPETITIVE ANALYSIS  Identify Your Own Competitive Strengths - You'll discover your company's competitive.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Submitted To: Submitted By: Seminar On Parasitic Computing.
By: Steven Baker.  What is a CAPTCHA?  History of CAPTCHA  Applications of CAPTCHAs  Accessibility  Examples of CAPTCHAs  reCAPTCHA  Vulnerabilities.
Distributed Denial of Service Yi Zhang April 26, 2016.
CAPTCHA What humans can do, But computers can not.
KEYNOTE OF THE FUTURE 3: DAVID BECKETT CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
Billy Vivian Dr. Oblitey COSC  What is CAPTCHA?  History  Uses  Artificial Intelligence Relationship  reCAPTCHA  Works Cited.
CAPTCHA Presented by: Md.R ahim 08B21A Agenda Definition Background Motivation Applications Types of CAPTCHAs Breaking CAPTCHAs Proposed Approach.
SANDEEP MEHTA (ECE, IV Year). CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart Invented at CMU by Luis von Ahn, Manuel.
3.6 Fundamentals of cyber security
Web Server Protection against Application Layer DDoS Attacks using Machine Learning and Traffic Authentication Jema David Nidbwile*, Kazuya Okada**, Youki.
3.2 Virtualisation.
Mrs. Beth Cueni Carnegie Mellon
Assignment #4 – Solutions
Peer-to-Peer Streaming: An Hierarchical Approach
590 Web Scraping – Handling Images
Presented By Vibhute J.B. Class : M.Sc. (CS)
Presentation transcript:

Application Layer Attack

DDoS DDoS – Distributed Denial of Service Why would any one want to do this? In some cases, for bringing down service of competitors, or for extortion money.

Application Layer Attack There is a particular type of attack – simply ask bots to send requests to the victim for large files. Now, the victim, the server, has to send large files therefore the bandwidth is saturated and no more requests can be satisfied.

CAPTCHA One way is to see if we can distinguish human from bots. CAPTCHA -- Completely Automated Public Turing test to tell Computers and Humans Apart Below is a picture from wiki

CAPTCHA Was proposed by Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford.

Other things you can do With the CAPTCHA idea, they actually did something else: scan an old book, and show a word in the book along with one from CAPTCHA. You don’t know which one is from where. So while you login, you help the library to recognize words.

Problem with CAPTCHA The problem is that you do not want to answer a CAPTCHA problem every 30 mins if you are watching a movie.

The other solution Ask the client to solve a puzzle, basically asking the client to spend some resource before getting service. Can you design some puzzles?

Puzzles Some puzzles include: – Finding a string such that the first k bits of its SHA- 1 hash are 0. – By controlling k, you control the difficulty of the puzzle. – A problem is that this puzzle is biased toward clients with fast machines.

Memory-bound puzzles are better Memory speed varies less significantly than CPU speed. Forcing the client to do a lot of read from main memory. How?

One memory bound puzzle There is a one-to-one function F() that cannot be reversed. Server started from x_0. x_i = F(x_i-1). Server sends x_k to the client. Ask him to return x_0.

Other solutions Speak-up: When system is in trouble, instead waiting to drown, you should speak up! Meaning that you should also send a lot of requests. The server serves the one with loudest voice. From their 2006 sigcomm paper:

Speak-up Actually, every client has to pay the server some currency in the form of bandwidth. The hope is that the clients have spare bandwidths but the attackers already have used up their bandwidths. These dummy byes are a waste of resource.

What we are working on Introducing p2p to DDoS defense.

A useful link s/ s/