Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers
|
|
|
- Virgil Brooks
- 10 years ago
- Views:
Transcription
1 Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers Abstract Hang Chau DoS/DDoS attacks are a virulent, relatively new type of Internet attacks, they have caused some biggest web sites on the world -- owned by the most famous E-Commerce companies such as Yahoo, ebay, Amazon -- became inaccessible to customers, partners, and users, the financial losses are very huge. On the other hand, if the international terrorist organizations use the DoS/DDoS to attack successfully the web sites or Internet systems of U.S. government and military, the results and losses will be disastrous and unimaginable. Cisco routers are said to have a market share of over 90% in the Internet. They are used widely by most large companies and agencies all over the world, and are considered as the most important building blocks of the Internet. But, Cisco routers have several vulnerabilities that could allow hackers to disrupt Internet traffic, intercept sensitive information such as passwords and credit card numbers or redirect traffic from web sites. Securing the router is the first thing that network administrators need to do. Therefore, for guarding both American national security and commercial security, it is really important to detecting, preventing and mitigating the DoS/DDoS attacks on the Cisco routers. 1. Introduction DoS/DDoS attacks are a virulent, relatively new type of Internet attacks, they have caused some biggest web sites on the world -- owned by the most famous E-Commerce companies such as Yahoo, ebay, Amazon -- became inaccessible to customers, partners, and users, sometimes for up to twenty-four hours; some web sites have experienced several days of downtime while trying to restore services, the financial losses are very huge. From a latest important report 2003: CSI/FBI [1] Computer Crime and Security Survey, we know the following information about the DoS/DDoS attacks in America: percent of respondents of the survey suffered the Denial of Service (DoS) attacks (from 1999 to 2002, only percent of respondents suffered the DoS attacks) of 398 respondents reported the financial losses caused by the DoS attacks. 3. The total losses by DoS attacks was over 65 million US dollars, or average losses million dollars, it is the 4.8 times of average losses on 2002 (from 2000 to 2002, the average losses caused by the DoS attacks are only 0.108, 0.122, million dollars respectively). 4. In WWW Site Incidents: What Types of Unauthorized Access or Misuse, 35% are Denial of Service attacks. 5. In addition, on the 2001 s version of the CSI/FBI Survey, when the DoS attacks increased by an astonishing 33 percent on network, where firewalls had been installed in 90 percent of instances. Hang Chau Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers 1
2 DoS/DDoS attacks are also easy to launch. For example, a teenager using very simple DoS tools managed to cripple the web sites of large E-Commerce companies like Yahoo and Amazon, during a series of DoS/DDoS attacks in February 2000 [2]. Cisco routers are said to have a market share of over 90% in the Internet. They are used by most large companies and agencies all over the world, and are considered as the most important building blocks of the Internet. Cisco routers provide physical connectivity between networks by virtue of their physical attachments to either local area networks (LANs) or wide area networks (WANs). But, Cisco routers have several vulnerabilities that could allow hackers to disrupt Internet traffic, intercept sensitive information such as passwords and credit card numbers or redirect traffic from web sites. Securing the router is the first thing that network administrators need to do. Therefore, for guarding both American national security and commercial security, it is really important to detecting, preventing and mitigating the DoS/DDoS attacks on the Cisco routers. 2. Three DoS/DDoS Attack Types to Cisco Routers Denial of Service (DoS) attacks to Cisco routers are common on the Internet. The first step in responding to such an attack is to find out exactly what sort of attack it is. In general, there are three DoS/DDoS attack types Smurf Smurf attacks are network amplification attacks, it is usually noticed because a network link becomes overloaded, so it is a network level attack. The attacker sends ICMP Echo Requests (pings) to the broadcast address of a network, so the victim is hit by many more packets. Smurf attacks cause each machine on the subnet to respond to the Echo Request with an Echo Reply. The attacker forges the source address of the ICMP Echo Request with the victim s IP address Fraggle The Fraggle (UDP Packet Magnification) attack is the cousin of Smurf attack, Fraggle attack uses UDP echo packets in the same fashion as the ICMP echo packets. Fraggle usually achieves a smaller amplification factor than Smurf, so it is much less popular. On the other hand, the UDP echo is a less important service in most network than the ICMP echo, and can therefore be disabled completely with fewer negative consequences SYN flood Another common attack is the SYN flood, in which a target machine is flooded with TCP connection requests. The source addresses and source TCP ports of the connection request packets are randomized; the purpose is to force the target host to maintain state information for many connections that will never be completed. SYN flood attacks are usually noticed because the target host (frequently an HTTP or SMTP server) becomes extremely slow, crashes, or hangs. It s also possible for the traffic returned from Hang Chau Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers 2
3 the target host to cause trouble on routers; because this return traffic goes to the randomized source addresses of the original packets, it lacks the locality properties of real IP traffic, and may overflow route caches. On Cisco routers, this problem often manifests itself in the router running out of memory Summary Together, the Smurf and SYN flood attacks account for the vast majority of the flooding DoS attacks reported to Cisco, and recognizing them quickly is very important. A wide variety of DoS/DDoS attacks are possible, but many attacks are similar. Attackers choose common exploits because they are particularly effective, particularly hard to trace, or because tools are available. Many DoS/DDoS attackers lack the skill or motivation to create their own tools, and use programs found on the Internet; these tools tend to fall in and out of fashion. Many of the commonly used DoS/DDoS attacks are based on high-bandwidth packet floods, or on other repetitive streams of packets. The packets in many DoS/DDoS attack streams can be isolated by matching them against Cisco IOS software access list entries. This is valuable for filtering out attacks, but is also useful for characterizing unknown attacks, and for tracing spoofed packet streams back to their real sources. 3. Four Programs to Launch Attacks In general, the attackers use four programs (or tools) to launch DoS/DDoS attacks to Cisco routers: 3.1. Trinoo It is a master/slave programs, Trinoo daemons were originally found in binary form on a number of Solaris 2.x systems, which were identified as having been compromised by exploitation of buffer overrun bugs in the RPC services statd, cmsd and ttdbserverd. The Trinoo uses UDP for communication between handlers and agents. Trinoo only initiates UDP attacks to random ports. Communication between master and slave is via unencrypted TCP and UDP. No IP spoofing. Uses following default ports to communication: 1524 TCP TCP UDP UDP The Trinoo uses the ports listed above for orientation and example only, because the port numbers can easily be changed TFN (Tribal Flood Network) Hang Chau Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers 3
4 It uses IP spoofing. Uses ICMP Echo reply packets to communicate between zombie and master (agent and handler). One of the weaknesses of TFN was that the attacker s connection to the master(s) that control the network was in clear-text form, and was subject to standard TCP attacks TFN 2K Same as TFN but the slave is silent so difficult to spot. No return information from the slave. Zombie to master communication is encrypted. TFN 2K does not use any specific port (it may be supplied on run time or it will be chosen randomly by a program), but it is a combination of UDP, ICMP and TCP packets Stacheldracht Stacheldraht (German for barbed wire ) is a DDoS tool based on source code from the TFN, it combines features of the Trinoo DDoS tool, with those of the original TFN, and adds encryption of communication between the attacker and Stacheldraht masters and automated update of the agents. Stacheldracht uses TCP and ICMP for communication handlers and agents. Stacheldracht uses following default ports to communication: TCP TCP ICMP Echo ICMP Echo Reply The Stacheldracht uses the ports listed above for orientation and example only, because the port numbers can easily be changed. Remote control of a Stacheldraht network is accomplished using a simple client that uses symmetric key encryption for communication between itself and the handler. The client accepts a single argument, the address of the handler to which it should connect. It then connects using a TCP port (default tcp in the analyzed code). 4. Controlling Directed Broadcasts -- Against the DoS/DDoS Attacks (Smurf) IP directed broadcasts are used in the Smurf Denial of Service (DoS) attacks, and can also be used in related attacks. An IP directed broadcast is a datagram which is sent to the broadcast address of a subnet to which the sending machine is not directly attached. The directed broadcast is routed through the network as a unicast packet until it arrives at the target subnet, where it is converted into a linklayer broadcast. Because of the nature of the IP addressing architecture, only the last router in the chain, the one that is connected directly to the target subnet, can conclusively identify a directed Hang Chau Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers 4
5 broadcast. The directed broadcasts are occasionally used for legitimate purposes, but such use is not common. The Smurf attacks send ICMP echo requests from a spoofed source address to a directed broadcast that cause all hosts to respond to the ping echo request, creating a lot of traffic on the network. So by default on IOS version 12.0 and higher, command ip directed broadcast is disabled; if you are running any version lower than 12.0, the command should be applied to every LAN interface that isn t known to forward legitimate directed broadcasts. It is imperative that you disable IP directed broadcasts on the router by issuing the following command in interface configuration mode: Router(config-if)#no ip directed-broadcast If a Cisco interface is configured with the no ip directed-broadcast command, directed broadcast that would otherwise be exploded into link-layer broadcasts at that interface are dropped instead. Note that this means that no ip directed-broadcast must be configured on every interface of every router that might be connected to a target subnet; it is not sufficient to configure only firewall routers. 5. Tracing If you setup the access list as follows: access-list 169 permit udp any any eq echo access-list 169 permit udp any eq echo any access-list 169 permit icmp any any echo access-list 169 permit icmp any any echo-reply access-list 169 permit tcp any any established access-list 169 permit tcp any any Then this list doesn t filter out any traffic, all the entries are permits. However, the list categorizes packets in useful ways, the list can be used to tentatively diagnose all three types of attacks: Smurf, Fraggle and SYN Floods. 5.1 Tracing with log-input If you choose to trace an attack passing through a Cisco router, the most effective way of doing so is to construct an access list entry that matches the attack traffic, attach the log-input keyword to it, and apply the access list outbound on the interface through which the attack stream is being sent toward its ultimate target. The log entries produced by the access list will identify the router interface through which the traffic is arriving, and, if the interface is a multipoint connection, will give the Layer 2 address of the device from which it is being received. The Layer 2 address can then be used to identify the next router in the chain, for example, the show ip arp mac-address command. 5.2 Tracing SYN Flood To trace a SYN flood, you might create an access list similar to the following: Hang Chau Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers 5
6 access-list 169 permit tcp any any established access-list 169 permit tcp any host victim-host log-input access-list 169 permit ip any any This will log all SYN packets destined for the target host, including legitimate SYNs. To identify the most likely actual path toward the attacker, examine the log entries in detail. In general, the source of the flood will be the source from which the largest number of matching packets are arriving. Remember that the source IP addresses themselves mean nothing; you are looking for source interfaces and source MAC addresses. Sometimes it is possible to distinguish flood packets from legitimate packets because flood packets may have invalid source addresses; any packet whose source address is not valid is likely to be part of the flood. Remember that the flood may be coming from multiple sources, although this is relatively unusual for SYN floods. 5.3 Tracing Smurf To trace Smurf stimulus stream, use an access list like this: access-list 169 permit icmp any any echo log-input access-list 169 permit ip any any The first entry doesn t restrict itself to packets destined for the reflector (the second victim) address. The reason for this is that most Smurf attacks use multiple reflector networks. If you are not in contact with the ultimate target, you may not know all the reflector addresses. As your trace gets closer to the source of the attack, you may begin to see echo requests going to more and more destinations; this is a good sign. However, if you are dealing with a great deal of ICMP traffic, this may generate too much logging information for you to read. If this happen, you can restrict the destination address to be one of the reflectors that s known to be used. Another useful tactic is to use an entry that takes advantage of the fact that netmasks of are very common in the Internet. And because of the way that attackers find the Smurf reflectors, the reflector addresses actually used for Smurf attacks are even more likely to match that mask. Host addresses ending in.0 or.255 are very uncommon in the Internet, so you can build a relatively specific recognizer for Smurf stimulus streams like this: access-list 169 permit icmp any host known-reflector echo log-input access-list 169 permit icmp any echo log-input access-list 169 permit icmp any echo log-input access-list 169 permit ip any any With this list, you can eliminate many of the noise packets from your log, while still having a good chance of noticing additional stimulus streams as you get closer to the attacker. Hang Chau Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers 6
7 5.4 Tracing without log-input The log-input keyword exists in Cisco IOS Software Releases 11.2 or later. Older software does not support this keyword. If you are using a router with older software, you have three viable options: 1. Create an access list without logging, but with entries that match the suspect traffic. Apply the list on the input side of each router interface, and watch the counters. Look for interfaces with high match rates. This method has a very small performance overhead, and is good for identifying source interfaces. But it has a biggest drawback: it doesn t give the link-layer source addresses, so it is only useful mostly for point-to-point lines. 2. Create access list entries with the log keyword. Apply the list to the incoming side of each interface of a router. This method still doesn t give source MAC addresses, but can be useful for seeing IP data, for instance to verify that a packet stream really is part of an attack. Performance impact can be moderate to high; newer software performs better than older software. 3. Use debug ip packet detail command to collect information about packets. This method gives MAC addresses, but it can have serious performance impact. It s easy to make a mistake with this method and make a router unusable. If you use this method, make sure that the router is switching the attack traffic in fast, autonomous, or optimum mode. Use an access list to restrict debugging to only the information you really need. Log debugging information to the local log buffer, but turn off logging of debug information to Telnet sessions and to the console. If possible, arrange for someone to be physically near the router, so that it can be power cycled as necessary. 6. References Cisco Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks: Magnification Attacks: Smurf, Fraggle, and Other: Denial of Service Attacks DDOS, SMURF, FRAGGLE, TRINOO, infosyssec: Cisco Characterizing and Tracing Packet Floods Using Cisco Routers: Improving Security on Cisco Router: Network Security Library: Cisco Router Security Overview Hang Chau Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers 7
8 Securing Cisco Routers: Author: Joshua L. Wright, John N. Stewart; Publisher: SANS Institute; Issue: November 1, 2002; ISBN: =========== Hang Chau Senior Network/System Administrator, Ming Plaza Development (909) Clear Spring Lane, Highland, CA 92346, U.S.A. Degree and IT Certifications: M.S. on Computer Science, California State University, Fresno, California, USA; CCIE, CCNP, CCNA (Cisco/CCIE: passed the Qualification Exam); SCSA, SCNA (Sun/Solaris 8: Certified System and Network Administrators); SCJP, SCWCD (Sun/Java 2: Certified Programmer and Web Component Developer); MCSE, MCSA (Microsoft 2000 Certified System Engineer and System Administrator). Also research on Network Attacks and Network Security: Cisco IDS/Secure PIX (Intrusion Detection Systems and Firewall); DoS/DDoS (Denial of Service/Distributed Denial of Service); Mydoom/Doomjuice Worms and DoS/DDoS attacks. Hang Chau Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers 8
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Network Security Defense Against DoS/DDoS Attacks
Abstract Network Security Defense Against DoS/DDoS Attacks Hang Chau DoS/DDoS attacks are a virulent, relatively new type of Internet attacks, they have caused some biggest web sites on the world -- owned
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Document ID: 13634 Contents Introduction Understanding the Basics of DDoS Attacks Characteristics of Common Programs Used to Facilitate
Denial of Service. Tom Chen SMU [email protected]
Denial of Service Tom Chen SMU [email protected] Outline Introduction Basics of DoS Distributed DoS (DDoS) Defenses Tracing Attacks TC/BUPT/8704 SMU Engineering p. 2 Introduction What is DoS? 4 types
Implementing Secure Converged Wide Area Networks (ISCW)
Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet
Gaurav Gupta CMSC 681
Gaurav Gupta CMSC 681 Abstract A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing Denial of Service for users of the
Denial of Service (DoS)
Intrusion Detection, Denial of Service (DoS) Prepared By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT), Amman s campus-2006 Denial of Service (DoS) What is DoS
Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals
Denial of Service Attacks Notes derived from Michael R. Grimaila s originals Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
8 steps to protect your Cisco router
8 steps to protect your Cisco router Daniel B. Cid [email protected] Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment
Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment Keyur Chauhan 1,Vivek Prasad 2 1 Student, Institute of Technology, Nirma University (India) 2 Assistant Professor,
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Network Forensics (DDoS/Distributed Denial of Service Attack)
GITG342 Network Forensics (DDoS/Distributed Denial of Service Attack) Hyundo Park Index DDoS attacks DDoS attacks taxonomy Types of DDoS attacks Current DDoS Attacks DDoS attacks tools DDoS countermeasures
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
Frequent Denial of Service Attacks
Frequent Denial of Service Attacks Aditya Vutukuri Science Department University of Auckland E-mail:[email protected] Abstract Denial of Service is a well known term in network security world as
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno
CSE 490K Lecture 14 Botnets and Spam Tadayoshi Kohno Some slides based on Vitaly Shmatikov s Botnets! Botnet = network of autonomous programs capable of acting on instructions Typically a large (up to
Denial of Service Attacks: Classification and Response
Security Event Trust and Confidence in a Fast and Mobile Environment, July 2004 Denial of Service Attacks: Classification and Response Christos Douligeris, Aikaterini Mitrokotsa Department of, University
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 1, January 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Protecting Against
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
Router Attacks-Detection And Defense Mechanisms
Router Attacks-Detection And Defense Mechanisms Saili Waichal, B.B.Meshram Abstract: Router is one of the most important components of any network. Their main aim is taking routing decision to forward
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Denial of Service (DoS) Technical Primer
Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited [email protected] Topics Covered What is Denial of Service? Categories and types of Denial of
How To Secure Network Threads, Network Security, And The Universal Security Model
BUILDING AN UNIVERSAL NETWORK SECURITY MODEL Zahari Todorov Slavov, Valentin Panchev Hristov Department of Computer Systems and Technology, South-West University Neofit Rilski, Blagoevgrad, Bulgaria, e-mail:
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Chapter 7 Protecting Against Denial of Service Attacks
Chapter 7 Protecting Against Denial of Service Attacks In a Denial of Service (DoS) attack, a Routing Switch is flooded with useless packets, hindering normal operation. HP devices include measures for
Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top
Output Interpreter You have chosen to display errors warnings general information, and helpful references. Headings are displayed for all supported commands that you submitted. SHOW RUNNING-CONFIG SECURITY
CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24
Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
Modern Denial of Service Protection
Modern Denial of Service Protection What is a Denial of Service Attack? A Denial of Service (DoS) attack is generally defined as a network-based attack that disables one or more resources, such as a network
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
IP Filter/Firewall Setup
CHAPTER 9 IP Filter/Firewall Setup 9.1 Introduction The IP Filter/Firewall function helps protect your local network against attack from outside. It also provides a way of restricting users on the local
Packet Sniffing on Layer 2 Switched Local Area Networks
Packet Sniffing on Layer 2 Switched Local Area Networks Ryan Spangler [email protected] Packetwatch Research http://www.packetwatch.net December 2003 Abstract Packet sniffing is a technique of monitoring
Network Security - DDoS
Network Security - DDoS What is computer network security and why is important Types and Strategies of DDoS Attacks DDoS Attack Prevention Conclusion What is Network Security Network Security is a huge
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
DDos. Distributed Denial of Service Attacks. by Mark Schuchter
DDos Distributed Denial of Service Attacks by Mark Schuchter Overview Introduction Why? Timeline How? Typical attack (UNIX) Typical attack (Windows) Introduction limited and consumable resources (memory,
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
10 Configuring Packet Filtering and Routing Rules
Blind Folio 10:1 10 Configuring Packet Filtering and Routing Rules CERTIFICATION OBJECTIVES 10.01 Understanding Packet Filtering and Routing 10.02 Creating and Managing Packet Filtering 10.03 Configuring
Firewalls Netasq. Security Management by NETASQ
Firewalls Netasq Security Management by NETASQ 1. 0 M a n a g e m e n t o f t h e s e c u r i t y b y N E T A S Q 1 pyright NETASQ 2002 Security Management is handled by the ASQ, a Technology developed
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
IP Filter/Firewall Setup
IP Filter/Firewall Setup Introduction The IP Filter/Firewall function helps protect your local network against attack from outside. It also provides a method of restricting users on the local network from
Stop that Big Hack Attack Protecting Your Network from Hackers. www.lauraknapp.com
Stop that Big Hack Attack Protecting Your Network from Hackers Laura Jeanne Knapp Technical Evangelist 1-919-224-2205 [email protected] www.lauraknapp.com NetSec_ 010 Agenda Components of security threats
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example
Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Document ID: 91672 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS
, pp-29-33 Available online at http://www.bioinfo.in/contents.php?id=55 A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS SHUCHI JUYAL 1 AND RADHIKA PRABHAKAR 2 Department of Computer Application,
Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory
Denial of Service (DoS) attacks and countermeasures Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory Definitions of DoS/DDoS attacks Denial of Service is the prevention of authorised access
Distributed Denial of Service
Distributed Denial of Service Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc7502_04/ Louisiana
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack
DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack Sugih Jamin EECS Department University of Michigan [email protected] Internet Design Goals Key design goals of Internet protocols:
AN INFRASTRUCTURE TO DEFEND AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACK. Wan, Kwok Kin Kalman
AN INFRASTRUCTURE TO DEFEND AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACK by Wan, Kwok Kin Kalman MSc in Information Technology The Hong Kong Polytechnic University June 2001 i Abstract of dissertation
CMS Operational Policy for Firewall Administration
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for Firewall Administration July 16, 2008 Document Number: CMS-CIO-POL-INF11-01
DDoS Attack and Defense: Review of Some Traditional and Current Techniques
1 DDoS Attack and Defense: Review of Some Traditional and Current Techniques Muhammad Aamir and Mustafa Ali Zaidi SZABIST, Karachi, Pakistan Abstract Distributed Denial of Service (DDoS) attacks exhaust
Queuing Algorithms Performance against Buffer Size and Attack Intensities
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 141-157 Research India Publications http://www.ripublication.com Queuing Algorithms Performance against
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
Security Audit CHAPTER21. Perform Security Audit
CHAPTER21 Perform is a feature that examines your existing router configurations and then updates your router in order to make your router and network more secure. is based on the Cisco IOS AutoSecure
Passive Vulnerability Detection
Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow
IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing. 3203 1346_06_2000_c1_sec3
Securing E-Commerce 1 Agenda The Security Problem IC Security: Key Elements Designing and Implementing 2 The Security Dilemma Internet Business Value Internet Access Corporate Intranet Internet Presence
Chapter 28 Denial of Service (DoS) Attack Prevention
Chapter 28 Denial of Service (DoS) Attack Prevention Introduction... 28-2 Overview of Denial of Service Attacks... 28-2 IP Options... 28-2 LAND Attack... 28-3 Ping of Death Attack... 28-4 Smurf Attack...
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
Looking for Trouble: ICMP and IP Statistics to Watch
Looking for Trouble: ICMP and IP Statistics to Watch Laura Chappell, Senior Protocol Analyst Protocol Analysis Institute [[email protected]] www.packet-level.com www.podbooks.com HTCIA Member,
Survey on DDoS Attack in Cloud Environment
Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 p-issn: 2394-5494 Survey on DDoS in Cloud Environment Kirtesh Agrawal and Nikita
