Deciphering Detection Techniques: Part III Denial of Service Detection

Size: px
Start display at page:

Download "Deciphering Detection Techniques: Part III Denial of Service Detection"

Transcription

1 Deciphering Detection Techniques: Part III Denial of Service Detection By Dr. Fengmin Gong, Chief Scientist, McAfee Network Security Technologies Group January 2003 networkassociates.com

2 Table of Contents I. Introduction... 3 II. What Is a Denial of Service Attack?... 3 III. What Is a Distributed Denial of Service Attack?... 3 IV. DOS/DDOS Detection Available Today... 4 V. The Requirements of an Effective DOS/DDOS Detection System Multiple Detection Mechanisms Attack Coverage Granularity of Attack Detection Consolidation of Alarms Response Actions... 5 VI. IntruShield System: Next-Generation Network IDS Designed for Effective DoS/DDoS Protection... 5 IntruShield Architecture... 6 IntruShield DoS and DDoS Detection Mechanisms... 6 IntruShield: DoS and DDoS Detection Coverage... 7 IntruShield: Unmatched Granularity of Detection... 8 IntruShield: Data Management and Consolidation of Alarms... 8 IntruShield: DoS/DDoS Response Actions... 8 VII. About the Author... 8 VIII. About McAfee Network Protection Services... 8 McAfee IntruShield... 9 IX. About Network Associates Network Associates

3 I. Introduction Nothing is more crippling to your business than a network outage, and no one is immune to them. They cause operational problems, and it takes time to deal with them. Thousands of dollars are lost every second your services are unavailable to your customers. You may have invested in the personnel or infrastructure to respond to an equipment failure, but what do you do when you find yourself a victim of a Denial of Service (DoS) or a Distributed DoS (DDoS) attack? Can you afford to be disabled by hackers? DoS and DDoS attacks deny legitimate users access to critical network services. Hackers achieve this by launching attacks that consume excessive network bandwidth, host processing cycles, or other network infrastructure resources. DoS attacks have caused some of the world s largest companies to disappoint customers and investors as their Web sites became inaccessible to customers, partners, and usersæsometimes for up to twenty-four hours. For the victim, the impact can be extensive. Tools that enable DoS attacks are maturing to the point that even unsophisticated intruders could do serious damage. This paper details: The severe nature of DoS and DDoS attacks The requirements of an effective DoS/DDoS detection in a network IDS The highly accurate DoS and DDoS detection and pro-active response capabilities of the IntruShield System II. What Is a Denial of Service Attack? Unlike most other hacks, a Denial of Service (DoS) does not require the attacker to gain access or entry into the targeted server. The primary goal of a DoS attack is instead to deny legitimate users access to the service provided by that server. Attackers achieve their DoS objective by flooding the target until it crashes, becomes unreachable from the outside network, or can no longer handle legitimate traffic. The actual volume of the attack traffic involved depends on the type of attack traffic payload used. With crafted payload such as malformed IP fragments, several such packets may be sufficient to crash a vulnerable TCP/IP stack; on the other hand, it may take a very large volume of perfectly conforming IP fragments to overwhelm the defragmentation processing in the same TCP/IP stack. Sophisticated attackers may choose to use a mixture of normal and malformed payloads for a DoS attack. DoS attacks can vary in impact from consuming the bandwidth of an entire network, to preventing service use of a single targeted host, or crashing of a single service on the target host. Most DoS attacks are flood attacks; that is, attacks aimed at flooding a network with TCP connection packets that are normally legitimate, but consume network bandwidth when sent in heavy volume. The headers of malicious packets are typically forged, or spoofed, to fool the victim into accepting the packets as if they are originating from a trusted source. III. What Is a Distributed Denial of Service Attack? A Distributed Denial of Service (DDoS) attack is a DoS attack that is coordinated across many systems all controlled by a single attacker, known as a master. Prior to the attack, the master had compromised a large number of hosts, typically without their owners knowledge, and installed software that will later enable the coordinated attack. These compromised hosts, called zombies (a.k.a. daemons, agents, slaves, or bots), are then used to perform the actual attack. When the master is ready to launch the attack, every available zombie is contacted and instructed to attack a single victim. The master is not a part of the attack, thus tracing the true origin of a DDoS attack is very difficult. As with a DoS attack, packets sent from each zombie may be spoofed to fool the victim into accepting data from the trusted source. DDoS allows the attackers to utilize the network to multiplex low-volume sources into a high-volume stream in order to overwhelm the targets. Through the master-zombie communications, the real attackers can potentially hide their identities behind the zombies Network Associates

4 IV. DOS/DDOS Detection Available Today Your ability to detect attacks directly affects your ability to react appropriately and to limit the damage caused by a DoS/DDoS attack. While Intrusion Detection Systems (IDS) have grown quite sophisticated and most products available today successfully detect most types of attacks, DoS and DDoS attacks are still difficult to detect with accuracy. The problem with DoS attacks is the sheer number of ways in which they can be executed, the increasingly sophisticated attack methods, and the growing range of systems targeted. Most of today s IDS products use a very simplistic method of detection. They compare current traffic behavior with acceptable normal behavior to detect DoS attacks, where normal traffic is characterized by a set of pre-programmed thresholds. These techniques establish a baseline and then look for jumps æsituations where the volume of network traffic jumps from low to very high levels. This simplistic approach suffers from several shortcomings. First, the threshold is typically set statically and thus requires user setting for every new environment and cannot adapt to changes to the environment. Second, only a small number of thresholds can be defined because very detailed statistics for protocol breakdown are not available to users. Third, thresholds can only be applied at high aggregate levels, e.g., per subnet, due to the lack of monitoring granularity. These shortcomings can lead to false positives and false negatives in detection depending on the threshold errors. Even if a detection is made correctly, a lack of granularity can limit one s ability to accurately identify and block the attack traffic. To be effective, a DoS/DDoS detection system requires additional features to help accurately detect an attack, and distinguish it from normal activity. V. The Requirements of an Effective DOS/DDOS Detection System An effective DoS/DDoS detection system is capable of detecting and responding to denial-of-service attacks on networked computers in real time. The method described above, threshold-based detection, is only one basic method, and there are ways to evade it. Combining that technique with others greatly improves your system s ability to determine benign traffic from an attack. 1. Multiple Detection Mechanisms With any baseline-based product, its effectiveness depends on how accurately your thresholds are set. These thresholds do not take into account flash crowds, or legitimate surges in traffic caused by benign behavior, such as everyone logging in to their systems around 9 am. Thresholds are static. Instead, the ability to learn the network, also known as statistical anomaly analysis, provides a solid view of how the network looks over time, and thus the product can quickly detect when something different takes place. Statistical anomaly analysis provides a more realistic picture of normal network behavior, and should be adaptive and intelligent, repeating the learning process automatically, and enabling itself to view network behavior over different time periods to acquire a varied and larger data sample. 2. Attack Coverage There are several general categories of DoS attacks. The CERT Coordination Center (CERT/CC), a federally funded research and development center operated by Carnegie Mellon University, divides attacks into three classes: bandwidth (or flood) attacks, protocol attacks, and logic attacks. Bandwidth attacks are relatively straightforward attempts to consume resources, such as network bandwidth or equipment throughput. Protocol attacks take advantage of the inherent design of common network protocols. These attacks use the expected behavior of protocols such as TCP, UDP, and ICMP to the attacker s advantage, and essentially befuddle the victim with specially crafted packets, as it tries to conform to standard protocol practice. Logic attacks exploit specific known vulnerabilities in network software, such as a Web server, or the underlying TCP/IP stack. While the categorization of DoS attacks is not well standardized, an effective IDS must be able to detect a DoS attack regardless of the actual means of attack Network Associates

5 3. Granularity of Attack Detection To cover all of one s myriad, vulnerable bases, an effective IDS would protect the entire network. However, most sensorbased IDS products today are limited in their scope of coverage, in that one sensor is able to protect one link on the network. Thus to deploy enough IDS hardware to provide adequate coverage for the entire network would be costprohibitive. Worse, even when enough sensors are available for adequate coverage, there is no way to distinguish or protect a subset of the traffic analyzed by a single sensor. These products analyze all traffic or no traffic. This is a problem with many existing systems claiming anomaly-based detection, because their limited processing capacity forces them to work only with highly aggregated traffic. Today s networks are extremely heterogeneous, comprised of so many environments, systems, and servers that a much more granular approach to detection is necessary. The IDS must be able to monitor, with distinct and specialized security policies, each subset of the aggregate network traffic. Granular profiling is necessary in order to learn the normal traffic behavior accurately. Furthermore, only with granular separation will it be feasible to accurately isolate the attacking traffic and take countermeasures with little side effect. 4. Consolidation of Alarms It s not just a matter of detecting an attack, it s how the alarm is raised. Given the tendencies of DoS and DDoS attacks to last for more than a minute or two, imagine the number of alarms raised if your IDS issued alerts every second throughout the duration of a DDoS attack. CAIDA, the Cooperative Association for Internet Data Analysis at the University of California, San Diego, published a paper in 2001 called Inferring Internet Denial-of-Service Activity. Using a technique they call backscatter analysis, over a three-week-long time period they attempted to provide an estimate of worldwide denial-of-service activity. Their findings, which include more than 12,000 distinct attacks against 5,000 hosts belonging to more than 2,000 organizations worldwideæsites such as or Hotmail to small foreign ISPsæshow that 50 percent of attacks are less than ten minutes in duration, 80 percent are less than thirty minutes, and 90 percent last less than an hour. Two percent of attacks are greater than five hours, 1 percent are greater than ten hours, and dozens spanned multiple days. Approximately.5 percent lasted less than one minute. An effective IDS must recognize the episodes of attacks and provide consolidated alerts without losing critical attack information. 5. Response Actions How fast you respond to an attack could make the difference between being buried under a mountain of packets and escaping unscathed. Accurate detection is the first step. Having your IDS respond in real time, particularly at wire speed, is the goal. Application of ingress and egress filtering using ACLs is a standard recommended response. Imagine if your IDS did this automatically, selectively, and in real-time. Of course, the user must be in control and you will enable this automatic response only upon reliable detection. VI. IntruShield System: Next-Generation Network IDS Designed for Effective DoS/DDoS Protection The industry s first real-time network intrusion prevention platform that has taken intrusion detection in general, and DoS and DDoS specifically to a new level. McAfee IntruShield network security products deliver an integrated hardware and software solution, which delivers comprehensive protection from known, first strike (unknown), DoS, and DDoS attacksæfrom several hundred Mbps to multi-gigabit speeds. The award-winning IntruShield architecture integrates patented signature, anomaly, and Denial of Service detection on a single purpose-built appliance. The IntruShield architecture not only enables highly accurate detection, but also empowers administrators with smart tools and processes, and enables flexible and scalable deployment for global businesses and vital government agencies Network Associates

6 IntruShield Architecture The IntruShield architecture employs a combination of threshold-based and patented self-learning, profile-based detection techniques that delivers unmatched intelligence to detecting DoS and DDoS attacks and to blocking them. With straightforward threshold-based detection, IntruShield administrators can configure data traffic limits to ensure their servers will not become unavailable due to overload. These thresholds are selected based on coverage of different DDoS attacks and on the availability of statistics that will help the users to configure them. Meanwhile, self-learning methodologies enable IntruShield to study the patterns of network usage and traffic over time; thus understanding the wide variety of lawful, though unusual, usage patterns that may occur during legitimate network operations. The learning algorithm takes into account the bursty behavior that is common in all network traffic, and differentiates it from the real onset of DDoS traffic. In addition to learning the intensity behavior, it also learns the correlational behavior of different types of packets, which reliably captures TCP/IP protocol behavior, route configuration, and so on. Highly accurate DoS detection techniques are essential because popular Web sites and networks do experience legitimateæand sometimes unexpectedætraffic surges during external events, such as those which news sites experienced following the September 11 disaster, or for a particularly compelling new program, service, or application. The combination of these two techniques yields the highest accuracy of detection for the full spectrum of DoS and DDoS attacks, when hundreds or even thousands of hosts are co-opted by a malicious programmer to strike against a single victim. IntruShield DoS and DDoS Detection Mechanisms IntruShield sensors support two detection mechanisms: Learning-based and Threshold-based. IntruShield administrators can select either or both approaches for DoS/DDoS policy application. 1. Learning-Based Detection: IntruShield sensors can detect DoS and DDoS attacks by learning your network s normal traffic behaviors and detecting attacks based on deviations from these normal behaviors using a patent-pending algorithm. When a sensor is first installed or upon administrator instruction, the sensor enters a Learning Mode, during which normal traffic behaviors are learned by observing traffic for a short period of time. (The initial Learning Mode lasts 48 hours.) Example behaviors include relative distribution of ICMP echo request and echo reply, and bursty rate distribution of TCP SYN, TCP RST, and UDP packets. After the initial learning period, a long-term traffic profile is created and the sensor enters DoS/DDoS Detection Mode. In DoS/DDoS Detection Mode, the sensor compiles short-term traffic profiles to match against the learned longterm profile. Alerts are generated based precisely on deviations from the long-term profile using algorithms. Once operating in DoS/DDoS Detection Mode, the sensor continues to learn (at a more gradual rate) and automatically updates the long-term traffic profile. The system learns and models the traffic behavior on a two-week sliding window. When the onset of an attack is detected, the sensor suspends learning until the attack desists, thereby protecting the integrity of the profile. The learned profile is also saved on the sensor at configurable intervals, and the detection engine can be rolled back to a saved profile at any time. The administrator can discard the current long-term profile and roll back to an earlier state, or simply enter Learning Mode once again using the IntruShield Manager console. Long-term profiles can also be uploaded to the Manager from the sensor for archival purposes. An uploaded profile can be pushed to the sensor from the Manager at any time. Multiple profiles based on different behavioral aspects of the traffic provide the ability to differentiate between typical flash-crowd scenarios and real DDoS attacks. For example, in a typical Web-traffic flash crowd situation (i.e., all users logging in to the network at 9:00 A.M. Monday morning), there may be a legitimate traffic volume surge that could trigger a volume-based anomaly alert, assuming that the surge has reached a level of significance; however, since all of the traffic is legitimate with the proper three-way TCP handshake, there is no TCP control segment anomaly that typically comes with a SYN-flood attack Network Associates

7 2. Threshold-Based Detection: IntruShield sensors can detect DoS/DDoS attacks based on administrator-configured thresholds by packet counts and rates for various types of packets such as ICMP, TCP SYN, UDP, IP fragments, and so forth. These threshold types have been selected so that a typical network administrator will be able to determine a reasonable threshold based on what is seen in normal operation and the limits of their resources (link bandwidth, server processing capacity, etc.). IntruShield users can also utilize some of the packet count statistics gathered by the IntruShield sensor (available from the IntruShield Manager) to guide the setting of these thresholds. In general, it does not make sense to use default thresholds because different environments have very different traffic mixes (packet types) and volume behaviors. IntruShield: DoS and DDoS Detection Coverage IntruShield sensors provide coverage for logic, and can detect the following DoS and DDoS attacks: Logic attacks, for example: o Land attack o Ping of Death o Teardrop Bandwidth, or Flood attacks, for example: o ICMP echo request Flood o TCP data segment Flood o TCP SYN/RST Flood o IP fragment Flood Protocol attacks, for example: o SYN flood o ICMP echo reply flood (aka Smurf) o UDP Flood (aka Fraggle) Additionally, the sensor is able to detect activity indicative of DDoS flooding attack tools, based on signatures detected in the traffic between the Attack Handler (master) and Attack Zombies (slaves). This can accurately detect zombie machines within your network. For example, IntruShield can detect traffic indicating the presence of the following tools: Trinoo TFN TFN2K Stacheldraht shaft mstream IntruShield is also able to detect reflective DDOS attacks. These are insidious attacks wherein a zombie sends Request packets (e.g., TCP SYN requests) to a reflector host with the source IP of the victim, thereby causing a huge number of response packets (e.g., SYN+ACK) from the reflector to the victim. In a reflective attack, it might seem to the victim, for example, that is actually under attack by a Web site. In general, the learning measures deployed in the IntruShield system accounts for all packets on the IPv4 network. Therefore, DDoS attacks based on any such packets are detectable Network Associates

8 IntruShield: Unmatched Granularity of Detection IntruShield sensors are unique in that they provide multiple detection ports, enabling a single sensor to monitor multiple of a network. Thus a single sensor provides broad detection coverage. On a more granular level, an IntruShield sensor can detect attacks either at the aggregate link level or for a protected network, where a protected network is a subset of the traffic carried by the link. A protected network is defined using Virtual LAN (VLAN) tags, if the link is carrying VLAN traffic, or by specifying one or more Classless Inter-Domain Routing (CIDR) blocks that identify a subset of the traffic. Thus a protected network could be a single critical host such as DNS, Mail Relay, etc., or a subnetwork of the enterprise such as the enterprise's Web servers, HR servers, data center, desktop PCs, and so forth. For every protected network, the IntruShield sensor will learn the traffic behavior, and provide detection and response independently for that corresponding subset of traffic. This feature allows enterprise networks to specifically detect which hosts or group of hosts are under attack as well as the type of attack. Furthermore, it allows the administrator to be able to configure different detection policies (either Threshold- or Learning-based) and different response actions for each of the protected networks. IntruShield can support a few thousand protected networks, enabling a DoS/DDoS profile to be created for each protected network. IntruShield: Data Management and Consolidation of Alarms The IntruShield system recognizes the onset of attacks and understands how an ongoing attack manifests in observable traffic behavior. It consolidates the attack into a single episode, and will only issue alarms based on consolidated information of attack episodes and types. For example, it does not make sense to generate the same alert every second if a DDoS attack has occurred and is ongoing, since, as discussed earlier, a DDoS attack typically lasts longer than one minute. The IntruShield system recognizes such an onset of attacks and reports at the episode level to avoid overwhelming the users with repeated alerts. IntruShield: DoS/DDoS Response Actions IntruShield supports a rich set of response actions for DoS/DDoS attacks. IntruShield can accurately discriminate between good and bad traffic based on full protocol state maintenance and a patent-pending algorithm, which allows IntruShield to take the user-configurable response actions on only the bad traffic. Examples of bad traffic might include packets with illegal TCP/IP header information, application packets with illegal content fields (e.g., DNS), TCP packets without proper connections, and an abnormally large volume of packets of a given type from a previously unknown source that may overwhelm a protected resource. IntruShield can generate an alert with detailed DDoS attack information, which can be used by your firewalls to modify their ACLs and block the attack traffic in real time. For example, is it a flood of TCP SYN, ICMP, or fragmented IP? Drop DDoS traffic (available when the IntruShield sensor is operating in In-line Mode) based on what is outside the learned profile. The sensor can discriminate between DDoS (bad) traffic and non-ddos (good) traffic based on full protocol state maintenance and a patent pending algorithm. VII. About the Author Dr. Fengmin Gong is the Chief Scientist for the McAfee Network Security Technologies Group, where he is responsible for driving the continued innovation of IntruShield s security architectureæleveraging his expertise in areas such as signature, anomaly, and denial of service detection. Before to his work on IntruShield, Dr. Gong was Director of Advanced Networking Research at MCNC, a provider of sophisticated electronic and information technologies and services aimed at businesses and government agencies Network Associates

9 While at MCNC and earlier at Washington University, he was involved in advanced security and networking projects for agencies such as DARPA, NSA, NSF, NLM, and NASA. During his time at MCNC he was also Adjunct Assistant Professor of Computer Science at North Carolina State University. In a distinguished academic and research career, Dr. Gong has written and contributed to nearly forty research papers on network intrusion, anomaly detection, secure collaboration, multi-media content delivery, and network quality of service. Dr. Gong has presented his research at industry events such as IEEE technical forums, as well as SIGGRAPH, DISCEX, NOMS, and ISCEX. VIII. About McAfee Network Protection Services McAfee Network Protection Solutions keep both large and smaller distributed networks up and protected from attacks. Best-of-breed network protection solutions in the portfolio include the Sniffer Network Protection Platform for performance management and fault identification, InfiniStream performing security forensics on network activity, Network Performance Orchestrator (npo) for centralizing and managing network activity, and McAfee IntruShield delivering network-based intrusion prevention. McAfee IntruShield McAfee IntruShield, a part of Network Associates McAfee Network Protection Solutions family of products, is a unique cutting-edge technology that prevents intrusions on the wire before they hit critical systems. Highly automated and easily managed, McAfee IntruShield is designed with such flexibility that it can be implemented in a phased approach - that overcomes the false positives inherent with today s legacy intrusion detection systems - and thus enables you to develop the right policy for blocking in your unique IT infrastructure. For example, you can deploy in-line to notify and block known attacks, and to notify-only on unknown attacks. Or you can implement complete blocking but just for business-critical network segments. IntruShield is delivered in a high-speed appliance which is able to scan traffic and assess threat levels with blinding speed, even on gigabit networks. It can be used at the edge or in front of key core resources. IntruShield has been crafted to satisfy both the security and network administrators as it stops a wide range of network attacks but does so with network latencies typically less than 10 milliseconds. IntruShield also looks for anomalous behavior and includes specialized analysis to find new denial of service mass attacks. IX. About Network Associates With headquarters in Santa Clara, California, Network Associates, Inc. is a leading supplier of network security and availability solutions. Network Associates comprises three product groups: McAfee Security, delivering world-class anti-virus and security products; Sniffer Technologies, a leader in network availability and system security; and Magic Solutions,a leader in innovative service management solutions. For more information, Network Associates can be reached in the United States at or on the Internet at All Network Associates products are backed by our PrimeSupport program and Network Associates Laboratories. Tailored to fit your company s needs, PrimeSupport service offers essential product knowledge and rapid, reliable technical solutions to keep you up and running. Network Associates Laboratories, a world leader in information systems and security, is your guarantee of the ongoing development and refinement of all our technologies. Network Associates, Sniffer, McAfee, Magic Soultions, IntruShield, and PrimeSupport are either registered trademarks or trademarks of Network Associates, Inc. and/or its affiliates in the US and/or other countries. Sniffer brand products are made only by Network Associates, Inc. All other registered and unregistered trademarks in this document are the sole property of their respective owners Networks Associates Technology, Inc. All Rights Reserved. 6-avd-ins-DoS-001/ Network Associates

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

McAfee Network Security Platform [formerly IntruShield] Denial-of-Service [DoS] Prevention Techniques Revision C Revised on: 18-December-2013

McAfee Network Security Platform [formerly IntruShield] Denial-of-Service [DoS] Prevention Techniques Revision C Revised on: 18-December-2013 McAfee [formerly IntruShield] Denial-of-Service [DoS] Prevention Techniques Revision C Revised on: 18-December-2013 2 Contents 1. Overview...4 2. Types of DoS/DDoS Attacks...4 2.1. Volume-based DoS attacks...5

More information

Strategies to Protect Against Distributed Denial of Service (DD

Strategies to Protect Against Distributed Denial of Service (DD Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics

More information

Modern Denial of Service Protection

Modern Denial of Service Protection Modern Denial of Service Protection What is a Denial of Service Attack? A Denial of Service (DoS) attack is generally defined as a network-based attack that disables one or more resources, such as a network

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

SECURING APACHE : DOS & DDOS ATTACKS - I

SECURING APACHE : DOS & DDOS ATTACKS - I SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial

More information

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method

More information

Next Generation Intrusion Detection Systems (IDS)

Next Generation Intrusion Detection Systems (IDS) Next Generation Intrusion Detection Systems (IDS) By Dr. Fengmin Gong, Chief Scientist, McAfee Network Security Technologies Group March 2002 networkassociates.com Table of Contents I. Introduction...

More information

White Paper February 2005. McAfee Network Protection Solutions. IntruShield Virtualization Delivering Real Benefits. www.mcafee.

White Paper February 2005. McAfee Network Protection Solutions. IntruShield Virtualization Delivering Real Benefits. www.mcafee. White Paper February 2005 McAfee Network Protection Solutions IntruShield Virtualization Delivering Real Benefits Delivering Real Benefits 2 Introduction Virtualization The IntruShield Approach 3 4 Virtualization

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

McAfee Intrusion Prevention System

McAfee Intrusion Prevention System McAfee Protection-in-Depth Strategy Internal Use Only IntruShield 1200 and 1400 Appliances Pioneering and Industry-Leading, Next-Generation s Features and Details What Is Intrusion Prevention? Intrusion

More information

Security Technology White Paper

Security Technology White Paper Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

Denial Of Service. Types of attacks

Denial Of Service. Types of attacks Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service

More information

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended

More information

Gaurav Gupta CMSC 681

Gaurav Gupta CMSC 681 Gaurav Gupta CMSC 681 Abstract A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing Denial of Service for users of the

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

Denial of Service (DoS) Technical Primer

Denial of Service (DoS) Technical Primer Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited chris.mcnab@trustmatta.com Topics Covered What is Denial of Service? Categories and types of Denial of

More information

Denial of Service Attacks, What They are and How to Combat Them

Denial of Service Attacks, What They are and How to Combat Them Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001

More information

White Paper. November 2003. McAfee Network Protection Solutions. Next Generation Intrusion Detection Systems (IDS) www.mcafee.com

White Paper. November 2003. McAfee Network Protection Solutions. Next Generation Intrusion Detection Systems (IDS) www.mcafee.com White Paper November 2003 McAfee Network Protection Solutions Next Generation Intrusion Detection Systems (IDS) 2 Table of Contents I. Introduction 3 II. The Need for IDS 3 III. Understanding IDS 4 Signature

More information

Denial-of-Service. McAfee Network Security Platform

Denial-of-Service. McAfee Network Security Platform Denial-of-Service McAfee Network Security Platform COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Document ID: 13634 Contents Introduction Understanding the Basics of DDoS Attacks Characteristics of Common Programs Used to Facilitate

More information

How To Protect A Dns Authority Server From A Flood Attack

How To Protect A Dns Authority Server From A Flood Attack the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

A Layperson s Guide To DoS Attacks

A Layperson s Guide To DoS Attacks A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4

More information

SECURITY FLAWS IN INTERNET VOTING SYSTEM

SECURITY FLAWS IN INTERNET VOTING SYSTEM SECURITY FLAWS IN INTERNET VOTING SYSTEM Sandeep Mudana Computer Science Department University of Auckland Email: smud022@ec.auckland.ac.nz Abstract With the rapid growth in computer networks and internet,

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

Yahoo Attack. Is DDoS a Real Problem?

Yahoo Attack. Is DDoS a Real Problem? Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them

More information

Denial of Service (DoS)

Denial of Service (DoS) Intrusion Detection, Denial of Service (DoS) Prepared By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT), Amman s campus-2006 Denial of Service (DoS) What is DoS

More information

Complete Protection against Evolving DDoS Threats

Complete Protection against Evolving DDoS Threats Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion

More information

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks

More information

The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System

The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System Top Layer Networks, Inc. Enterprises without a sound intrusion prevention strategy across the three threat

More information

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc. TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...

More information

Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse

Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse Technology Blueprint Defend Against Denial of Service (DOS and DDOS) Attacks Protect each IT service layer against exploitation and abuse LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor

More information

Surviving DNS DDoS Attacks. Introducing self-protecting servers

Surviving DNS DDoS Attacks. Introducing self-protecting servers Introducing self-protecting servers Background The current DNS environment is subject to a variety of distributed denial of service (DDoS) attacks, including reflected floods, amplification attacks, TCP

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015) s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware

More information

Application Security Backgrounder

Application Security Backgrounder Essential Intrusion Prevention System (IPS) & DoS Protection Knowledge for IT Managers October 2006 North America Radware Inc. 575 Corporate Dr., Lobby 1 Mahwah, NJ 07430 Tel: (888) 234-5763 International

More information

Survey on DDoS Attack in Cloud Environment

Survey on DDoS Attack in Cloud Environment Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 p-issn: 2394-5494 Survey on DDoS in Cloud Environment Kirtesh Agrawal and Nikita

More information

CS 356 Lecture 16 Denial of Service. Spring 2013

CS 356 Lecture 16 Denial of Service. Spring 2013 CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

Survey on DDoS Attack Detection and Prevention in Cloud

Survey on DDoS Attack Detection and Prevention in Cloud Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform

More information

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment Keyur Chauhan 1,Vivek Prasad 2 1 Student, Institute of Technology, Nirma University (India) 2 Assistant Professor,

More information

NSP DoS Prevention Techniques Revision D. McAfee Network Security Platform

NSP DoS Prevention Techniques Revision D. McAfee Network Security Platform NSP DoS Prevention Techniques Revision D McAfee Network Security Platform COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals Denial of Service Attacks Notes derived from Michael R. Grimaila s originals Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

First Line of Defense

First Line of Defense First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible

More information

CloudFlare advanced DDoS protection

CloudFlare advanced DDoS protection CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com

More information

Distributed Denial of Service Attack Tools

Distributed Denial of Service Attack Tools Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

IntruPro TM IPS. Inline Intrusion Prevention. White Paper IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

Safeguards Against Denial of Service Attacks for IP Phones

Safeguards Against Denial of Service Attacks for IP Phones W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)

More information

Acquia Cloud Edge Protect Powered by CloudFlare

Acquia Cloud Edge Protect Powered by CloudFlare Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Fifty Critical Alerts for Monitoring Windows Servers Best practices Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite

More information

Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers

Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers Abstract Hang Chau DoS/DDoS attacks are a virulent, relatively new type of Internet attacks, they have caused some biggest web

More information

Denial of Service Attacks

Denial of Service Attacks 2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding? Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against

More information

Chapter 15. Firewalls, IDS and IPS

Chapter 15. Firewalls, IDS and IPS Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet

More information

Frequent Denial of Service Attacks

Frequent Denial of Service Attacks Frequent Denial of Service Attacks Aditya Vutukuri Science Department University of Auckland E-mail:avut001@ec.auckland.ac.nz Abstract Denial of Service is a well known term in network security world as

More information

How To Design An Intrusion Prevention System

How To Design An Intrusion Prevention System INTRUSION PREVENTION SYSTEMS (IPS): NEXT GENERATION FIREWALLS A Spire Research Report March 2004 By Pete Lindstrom, Research Director SP i RE security Spire Security, LLC P.O. Box 152 Malvern, PA 19355

More information

McAfee IntruShield Network IPS Sensor Pioneering and Industry-Leading, Next-Generation Network Intrusion Prevention Solution

McAfee IntruShield Network IPS Sensor Pioneering and Industry-Leading, Next-Generation Network Intrusion Prevention Solution Data Sheet McAfee Network Protection Solutions McAfee Network IPS Sensor Network Intrusion Prevention Solution The Challenge The risks to enterprise and service provider security continue to grow, as the

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS) Denial of Service Attacks and Countermeasures Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS) Student Objectives Upon successful completion of this module,

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

AntiDDoS1000 DDoS Protection Systems

AntiDDoS1000 DDoS Protection Systems AntiDDoS1000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.

More information

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks Sau Fan LEE (ID: 3484135) Computer Science Department, University of Auckland Email: slee283@ec.auckland.ac.nz Abstract A denial-of-service

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

SURE 5 Zone DDoS PROTECTION SERVICE

SURE 5 Zone DDoS PROTECTION SERVICE SURE 5 Zone DDoS PROTECTION SERVICE Sure 5 Zone DDoS Protection ( the Service ) provides a solution to protect our customer s sites against Distributed Denial of Service (DDoS) attacks by analysing incoming

More information

Denial of Service. Tom Chen SMU tchen@engr.smu.edu

Denial of Service. Tom Chen SMU tchen@engr.smu.edu Denial of Service Tom Chen SMU tchen@engr.smu.edu Outline Introduction Basics of DoS Distributed DoS (DDoS) Defenses Tracing Attacks TC/BUPT/8704 SMU Engineering p. 2 Introduction What is DoS? 4 types

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

Network Security - DDoS

Network Security - DDoS Network Security - DDoS What is computer network security and why is important Types and Strategies of DDoS Attacks DDoS Attack Prevention Conclusion What is Network Security Network Security is a huge

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker

More information

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against

More information

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of

More information

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE WE ARE NOT FOR EVERYONE JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME Don t let a DDoS attack bring your online business to a halt we can protect any server in any location DON T GET STUCK ON THE ROAD OF

More information

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: info@cs3-inc.com The Reverse Firewall: Defeating

More information

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015 Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,

More information

TLP WHITE. Denial of service attacks: what you need to know

TLP WHITE. Denial of service attacks: what you need to know Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

Barracuda Intrusion Detection and Prevention System

Barracuda Intrusion Detection and Prevention System Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques

More information

FortiDDos Size isn t everything

FortiDDos Size isn t everything FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One

More information

Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory

Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory Denial of Service (DoS) attacks and countermeasures Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory Definitions of DoS/DDoS attacks Denial of Service is the prevention of authorised access

More information

Firewalls, IDS and IPS

Firewalls, IDS and IPS Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep

More information

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013 the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered

More information