Telecommunications Networking II Lecture 41d Denial-of-Service Attacks.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
Computer Security and Penetration Testing
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
1 Reading Log Files. 2 Segment Format
Lecture 5: TCP/IP OSI layers 3 (IP) and 4 (TCP/UDP) IPv4 – addresses and routing, “best-effort” service Ethernet, Appletalk, etc wrap IP packets with their.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 32 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Firewalls and Intrusion Detection Systems
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
1 ELEN 602 Lecture 15 More on IP TCP. 2 byte stream Send buffer segments Receive buffer byte stream Application ACKs Transmitter Receiver TCP Streams.
Gursharan Singh Tatla Transport Layer 16-May
OSI Model Routing Connection-oriented/Connectionless Network Services.
CS426Fall 2010/Lecture 331 Computer Security CS 426 Lecture 33 Network Security (1)
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Computer Security and Penetration Testing
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 6: Packet Filtering
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Telecommunications Networking II Lecture 41e Firewalls.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Routers and Routing Basics CCNA 2 Chapter 10.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 20 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 9 Intermediate TCP/IP/ Access Control Lists (ACLs)
CS426Network Security1 Computer Security CS 426 Network Security (1)
 network appliances to filter network traffic  filter on header (largely based on layers 3-5) Internet Intranet.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
CS526Topic 18: Network Security1 Information Security CS 526 Network Security (1)
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
TCP Security Vulnerabilities Phil Cayton CSE
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
© 2002, Cisco Systems, Inc. All rights reserved..
Transport Layer1 TCP Connection Management Recall: TCP sender, receiver establish “connection” before exchanging data segments r initialize TCP variables:
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
General Classes of TCP/IP Problems
Domain 4 – Communication and Network Security
Introduction to Networking
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
The IP, TCP, UDP protocols
* Essential Network Security Book Slides.
دیواره ی آتش.
Threats in Networks Jagdish S. Gangolly School of Business
Lecture 3: Secure Network Architecture
Intrusion Detection and Hackers Exploits IP Spoofing Attack
Session 20 INST 346 Technologies, Infrastructure and Architecture
TCP Connection Management
Presentation transcript:

Telecommunications Networking II Lecture 41d Denial-of-Service Attacks

Network Denial-of-Service Attacks and Other Network-Application- Based Attacks

Network Denial-of-Service Attacks Attacker’s objective To interrupt or reduce the quality of services…as experienced by legitimate users Many attacks have innocent counterparts (e.g., someone sends me a very large attachment, and blocks my access to other messages)

Network Denial-of-Service Attacks The “SYN” Flooding attack: -In TCP, one establishes a connection by sending a synchronization (SYN) message to the host one wishes to communicate with -The attack: send a large number of SYN messages (with phony source addresses) to a host. This overloads the buffer in the host that keeps track of TCP connections (and half-connections) in progress

TCP SYN Flooding Attack SYN(500) SYN(1024), ACK(501) No acknowledgement of prior SYN segment…....More new SYN segments More SYN acknowledgements...

Network Denial-of-Service Attacks The “SYN” Flooding attack: -Some protection can be gained by configuring networks so that they will not accept IP packets from external (to the network) sources whose source addresses are internal to the network; and which will not allow internal sources to send IP packets to external destinations if the source addresses used are not internal addresses

Sequence Number Attacks Disable a host that is trusted by the target (intended victim) machine Initiate a TCP connection by impersonating the disabled host (I.e., use it’s IP address) and sending a SYN message. Guess the initial sequence number that the target system will use; and respond with an acknowledgement.

TCP Sequence Number Attack SYN(500) SYN(800), ACK(501) ACK(801) ACK(801), data ACK(801), FIN(1012) ACK(1013) ACK(1013), FIN(800) ACK(801) ACK( ) Ref: “Firewalls and Internet Security”

Other Network-based Attacks See Cheswick and Bellovin Chapter 2 Many network-based attacks are caused by the lack of strong authentication of sources (e.g., it is easy to impersonate another machine by using its IP address) and lack of encryption on IP network links