Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. SANS ‘98 Conference -

Slides:



Advertisements
Similar presentations
NETWORK SECURITY ADD ON NOTES MMD © Oct2012. IMPLEMENTATION Enable Passwords On Cisco Routers Via Enable Password And Enable Secret Access Control Lists.
Advertisements

06-Sep-2006Copyright (C) 2006 Internet Initiative Japan Inc.1 Prevent DoS using IP source address spoofing MATSUZAKI ‘maz’ Yoshinobu.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Internet Threats Denial Of Service Attacks “The wonderful thing about the Internet is that you’re connected to everyone else. The terrible thing about.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
1 Reading Log Files. 2 Segment Format
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
The Latest In Denial Of Service Attacks: “Smurfing” Description and Information to Minimize Effects Craig A. Huegen Cisco Systems, Inc. NANOG 11 Interprovider.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG 12 Interprovider.
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG Dearborn,
Computer Security and Penetration Testing
Sniffing the sniffers - detecting passive protocol analysers John Baldock, Intel Corp Craig Duffy, Bristol UWE.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
COEN 252: Computer Forensics Router Investigation.
Chapter 9 Phase 3: Denial-of-Service Attacks. Fig 9.1 Denial-of-Service attack categories.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Module 1: Reviewing the Suite of TCP/IP Protocols.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
1 Network Packet Generator Midway presentation Supervisor: Mony Orbach Presenting: Eugeney Ryzhyk, Igor Brevdo.
Overview Network communications exposes one to many different types of risks: No protection of the privacy, integrity, or authenticity of messages Traffic.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Network Presence, LLC SM Innovative Security Solutions SM Understanding, Planning For, and Responding To Denial of Service Attacks SANS 2001.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
CHAPTER 9 Sniffing.
Chapter 23: ARP, ICMP, DHCP CS332, IS333 Spring 2014.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Attacks Dr. John R. Durrett ISQS 6342 Spring 2003 Dipen Joshi.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Denial of Service Attacks: Methods, Tools, and Defenses Prof. Mort Anvari Strayer University at Arlington.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
DoS/DDoS attack and defense
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Introduction to Information Security
Domain 4 – Communication and Network Security
Outline Basics of network security Definitions Sample attacks
Error and Control Messages in the Internet Protocol
Filtering Spoofed Packets
Intro to Denial of Serice Attacks
Outline Basics of network security Definitions Sample attacks
Network-Based Denial of Service Attacks
Red Team Exercise Part 3 Week 4
Firewalls.
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. SANS ‘98 Conference - Monterey, CA _dos.ppt

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 2 Trends Significant increase in network-based DoS attacks over the last year Attackers’ growing accessibility to networks Growing number of organizations connected to networks Vulnerability Most networks have not implemented spoof prevention filters Very little protection currently implemented against attacks

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 3 Profiles of Participants Tools of the Trade Anonymity Internet Relay Chat Cracked super-user account on well-connected enterprise network Super-user account on university residence hall network “Throw-away” PPP dial-up accounts Typical Victims IRC Users, Operators, and Servers Providers who eliminate troublesome users’ accounts

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 4 Goals of Attacks Prevent another user from using network connection “Smurf” and “Fraggle” attacks, “pepsi” (UDP floods), ping floods Disable a host or service “Land”, “Teardrop”, “NewTear”, “Bonk”, “Boink”, SYN flooding, “Ping of death” Traffic monitoring Sniffing

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 5 “Smurf” and “Fraggle” Very dangerous attacks Network-based, fills access pipes Uses ICMP echo/reply (smurf) or UDP echo (fraggle) packets with broadcast networks to multiply traffic Requires the ability to send spoofed packets Abuses “bounce-sites” to attack victims Traffic multiplied by a factor of 50 to 200 Low-bandwidth source can kill high-bandwidth connections Similar to ping flooding, UDP flooding but more dangerous due to traffic multiplication

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 6 “Smurf” (cont’d)

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 7 “Smurf” and “Fraggle” trend Smurf attacks are still “in style” for attackers - Fraggle released March ‘98 Significant advances made in reducing the effects Education campaigns through the use of white paper and other education by NOCs has reduced the average “smurf” or “fraggle” attack from 80 Mbits/sec to less than 5 Mbits/sec Most attacks can still inundate a T1 link

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 8 “Land” Goal is to severely impair or disable a host or its IP stack Connects address and port pair to itself Requires the ability to spoof packet source addresses Requires the victim’s network to be unprotected against packets coming from outside with own IP addresses

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 9 “Teardrop”, “NewTear”, “Bonk”, “Boink”, “Ping of Death” Goal is to severely impair or disable a host or its IP stack Use packet fragmentation and reassembly vulnerabilities Require that a host IP stack be able to receive a packet from an attacker

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 10 SYN flooding Goal is to deny access to a TCP service running on a host Creates a number of half-open TCP connections which fill up a host’s listen queue; host stops accepting connections Requires the TCP service be open to connections from the victim

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 11 Sniffing Goal is generally to obtain information Account usernames, passwords Source code, business critical information Usually a program placing an Ethernet adapter into promiscuous mode and saving information for retrieval later Hosts running the sniffer program is compromised using host attack methods

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 12 Prevention Techniques How to prevent your network from being the source of the attack: Apply filters to each customer network Allow only those packets with source addresses within the customer’s assigned netblocks to enter your network Apply filters to your upstreams Allow only those packets with source addresses within your netblocks to exit your network, to protect others Deny those packets with source addresses within your netblocks from coming into your network, to protect your network This removes the possibility of your network being used as an attack source for many attacks which rely on anonymity

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 13 Prevention Techniques How to prevent being a “bounce site” in a “Smurf” or “Fraggle” attack: Turn off directed broadcasts to networks: Cisco: Interface command “no ip directed-broadcast” Proteon: IP protocol configuration “disable directed-broadcast” Bay Networks: Set a false static ARP address for bcast address Use access control lists (if necessary) to prevent ICMP echo requests from entering your network Encourage vendors to turn off replies for ICMP echos to broadcast addresses

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 14 Prevention Techniques Technical help tips for Cisco routers Unicast RPF checking Interprovider Cooperation Stories from the field Network Operations Centers should publish proper procedures for getting filters put in place and tracing started

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 15 References Detailed “Smurf” and “Fraggle” information Ingress filtering MCI’s DoSTracker tool Other DoS attacks

Craig A. Huegen Network-Based Denial of Service AttacksSANS ‘98 16 Author Craig Huegen Questions?