ΜΕΤΑΠΤΥΧΙΑΚΗ ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ

Size: px
Start display at page:

Download "ΜΕΤΑΠΤΥΧΙΑΚΗ ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ"

Transcription

1 ΜΕΤΑΠΤΥΧΙΑΚΗ ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ Βιβλιογραφική έρευνα σχετικά με Denial of Service επιθέσεις: Σύγκριση των διαφορετικών μορφών DoS επιθέσεων, Ανάλυση των DoS defense schemes σε περιβάλλοντα πληροφοριακών συστημάτων και δικτύων και Επισκόπηση των πολιτικών ασφαλείας κατά των DoS επιθέσεων σε επιχειρησιακά περιβάλλοντα. Literature research about Denial of Service attacks: Comparison of different modes of DoS attacks, Analysis of DoS defense schemes in information system environments and networks and Overview of security policies against DoS attacks on business environments. Ζλάτης Χρήστος Επιβλέπων καθηγητής: κ. Ιωάννης Σταματίου, Αν.Καθηγητής Παν. Πατρών Θεσσαλονίκη, Νοέμβριος 2014

2 2

3 ΜΕΤΑΠΤΥΧΙΑΚΗ ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ Βιβλιογραφική έρευνα σχετικά με Denial of Service επιθέσεις: Σύγκριση των διαφορετικών μορφών DoS επιθέσεων, Ανάλυση των DoS defense schemes σε περιβάλλοντα πληροφοριακών συστημάτων και δικτύων και Επισκόπηση των πολιτικών ασφαλείας κατά των DoS επιθέσεων σε επιχειρησιακά περιβάλλοντα. Literature research about Denial of Service attacks: Comparison of different modes of DoS attacks, Analysis of DoS defense schemes in information system environments and networks and Overview of security policies against DoS attacks on business environments. Ζλάτης Χρήστος Επιβλέπων καθηγητής: κ. Ιωάννης Σταματίου, Αν.Καθηγητής Παν. Πατρών Εγκρίθηκε από την Τριμελή Εξεταστική Επιτροπή την 5 η Νοεμβρίου Ι. Αντωνίου Ι. Σταματίου Ν. Φαρμάκης Καθηγητής Α.Π.Θ. Αν. Καθηγητής Παν.Πατρών Αν. Καθηγητής Α.Π.Θ. Θεσσαλονίκη, Νοέμβριος

4 .. Χρήστος Ι. Ζλάτης Πτυχιούχος Τμήματος Διοίκησης Τεχνολογίας Πανεπιστήμιο Μακεδονίας Copyright Χρήστος Ι. Ζλάτης, 2014 Με επιφύλαξη παντός δικαιώματος. All rights reserved. Απαγορεύεται η αντιγραφή, αποθήκευση και διανομή της παρούσας εργασίας, εξ ολοκλήρου ή τμήματος αυτής, για εμπορικό σκοπό. Επιτρέπεται η ανατύπωση, αποθήκευση και διανομή για σκοπό μη κερδοσκοπικό, εκπαιδευτικής ή ερευνητικής φύσης, υπό την προϋπόθεση να αναφέρεται η πηγή προέλευσης και να διατηρείται το παρόν μήνυμα. Ερωτήματα που αφορούν τη χρήση της εργασίας για κερδοσκοπικό σκοπό πρέπει να απευθύνονται προς τον συγγραφέα. Οι απόψεις και τα συμπεράσματα που περιέχονται σε αυτό το έγγραφο εκφράζουν τον συγγραφέα και δεν πρέπει να ερμηνευτεί ότι εκφράζουν τις επίσημες θέσεις του Α.Π.Θ. 4

5 Abstract Although DoS attacks are launched since the beginning of computer networks, they were not considered a significant topic of research until relatively recently, when they started harming ISPs, governmental websites and the e-commerce infrastructure. The fact that the Internet operates on old networking protocols with limited provision for security is an advantage for the attackers. Of course, the increase in research interest did provide solutions, which have recently managed to halt the escalation of the DoS phenomenon. Distributed defense techniques have been designed and the majority of the DoS attacks can now be countered in networks where some sort of defense has been deployed. Today, attacks have shifted towards economic crime and cyber-warfare, and although less widespread they can be much more harmful. As a result, the new era of DoS research has to produce even more effective solutions with even less overhead in the absence of an attack and as small disruption in the presence of one. Keywords Denial of service attacks, DDoS attacks, DDoS attack mechanisms, DDoS defense schemes, Prevention methods, Security principles, Impacts on the web 5

6 Σύνοψη Αν και οι επιθέσεις DoS ξεκίνησαν από την αρχή των δικτύων υπολογιστών, δεν θεωρήθηκαν σημαντικά θέμα της έρευνας, μέχρι σχετικά πρόσφατα, όταν άρχισαν να βλάπτουν ISPs, κυβερνητικούς δικτυακούς τόπους και υποδομές ηλεκτρονικού εμπορίου. Το γεγονός ότι το Διαδίκτυο λειτουργεί με παλαιά πρωτόκολλα δικτύωσης με περιορισμένες παροχές ασφαλείας είναι ένα πλεονέκτημα για τους επιτιθέμενους. Φυσικά, η αύξηση του ερευνητικού ενδιαφέροντος παρέχει λύσεις, οι οποίες έχουν πρόσφατα καταφέρει να σταματήσουν την κλιμάκωση του φαινομένου DoS. Πλέον, έχουν σχεδιαστεί κατανεμημένες τεχνικές άμυνας και η πλειοψηφία των επιθέσεων DoS μπορεί πλέον να αντιμετωπιστεί σε δίκτυα όπου έχει αναπτυχθεί ένα τουλάχιστον αμυντικός μηχανισμός. Σήμερα, οι επιθέσεις έχουν μετατοπιστεί προς το τομέα του οικονομικού εγκλήματος και τον κυβερνοπόλεμο, και παρόλο που είναι λιγότερο διαδεδομένες μπορεί να είναι πολύ πιο επιβλαβείς. Ως αποτέλεσμα αυτού, η νέα εποχή για τη DoS έρευνα πρέπει να παράγει ακόμα πιο αποτελεσματικές λύσεις με ακόμη λιγότερη ανοχή στην απουσία μιας επίθεσης και τη μικρότερη δυνατή διαταραχή από την παρουσία μιας DoS επίθεσης. Λέξεις Κλειδιά Denial of service επιθέσεις, DDoS επιθέσεις, DDoS attack μηχανισμοί, DDoS defense schemes, Μέθοδοι αποτροπής, Αρχές ασφαλείας, Επιδράσεις στο Web 6

7 Summary The Internet is not stable as it reforms itself rapidly. This means that DDoS countermeasures quickly become obsolete. New services are offered through the Internet, and new attacks are deployed to prevent clients from accessing these services. However, the basic issue is whether DDoS attacks represent a network problem or an individual problem or both. In Chapter 1, there are some definitions about denial of service attacks and presented the vulnerabilities of Internet which can make DDoS attacks inevitable. In Chapter 2, there is an overview of network based attacks which consist of active and passive attacks. In Chapter 3, there is an overview of denial of service attacks referring to some definitions, symptoms and manifestations of this kind of attacks. In addition to that, there is a synopsis of the most well-known categories of denial of service attacks. In Chapter 4, there is an analysis of the different modes of denial of service attacks. In particular, it is presented the two main categories of the denial of service attacks: crashing and bandwidth attacks and there is a more thorough analysis of different types of bandwidth attacks. Furthermore, in this chapter there is a short introduction to distributed denial of service attacks and also referred to the impacts of the bandwidth attacks on the web. In chapter 5, there is an analysis of denial of service attacks giving a description of the overall process of a denial of service attack. In addition to that, there are presented some DDoS attack mechanisms and an analysis and comparison of different modes of DDoS attacks. In chapter 6, there is an overview of other significant modes of DoS attacks such as peer to peer attacks, reflected/spoofed attacks, low rate dos attacks, permanent and unintentional dos attacks. In chapter 7, there is an overview of prevention and response methods against denial of service attacks. In this chapter, we refer to different strategies which can protect a business environment from this kind of attacks. Furthermore, there is an analysis of some general security principles against denial of service attacks. In chapter 8, there is a short presentation of prevention and response tools. Among other tools, there is an analysis of clean pipe DoS protection services. In chapter 9, there is a presentation of two main categories of defense mechanisms which are preventive and reactive mechanisms and there is a short overview of modern tendencies on DDoS diversion systems. 7

8 In chapter 10, there is an overview of DDoS defense schemes which are classified into four broad categories: Prevention, Detection, Source identification and Response. In chapter 11, there is an analysis of these four categories of defense schemes giving more information about different types of filtering schemes. In addition to that, there is an analysis of DoS attack specific and anomaly based detection techniques. In chapter 12, are presented two main IP traceback methods: probabilistic packet marking and deterministic packet marking methods. There is a short analysis of these methods referring to their advantage and disadvantage for each of them. Furthermore, there is a comparison of these two methods with other significant filtering schemes. In chapter 13, there is an overview of statistical analysis of Dos attacks defense schemes. In chapter 14, are presented some statistical approaches to Dos attack detection techniques. In particular, in this chapter are referred two detection algorithms: Entropy and Chi-Square Statistic algorithms and their detector evaluations. In chapter 15, there is an analysis of the impact of DDoS attacks on the web. There are presented some of the most serious incidents of DDoS attacks worldwide and there is an overview of some recent surveys about the impact of DDoS attacks on business environments, retail banks and organizations. 8

9 Περίληψη Το Διαδίκτυο δεν είναι σταθερό καθώς μετασχηματίζεται ραγδαία. Αυτό σημαίνει ότι οι μέθοδοι αντιμετώπισης DDoS επιθέσεων γίνονται γρήγορα ξεπερασμένοι. Νέες υπηρεσίες προσφέρονται συνεχώς μέσω του Διαδικτύου και νέες επιθέσεις αναπτύσονται για να αποτρέψουν την πρόσβαση των πελατών σε αυτές τις υπηρεσίες. Ωστόσο, το βασικό ζήτημα είναι αν οι DDoS επιθέσεις αποτελούν ένα πρόβλημα δικτύου ή ένα μεμονωμένο πρόβλημα ή και τα δύο. Στο πρώτο κεφάλαιο, υπάρχουν μερικοί βασικοί ορισμοί για τις denial of service επιθέσεις και παρουσιάζονται οι αδυναμίες του διαδικτύου οι οποίες μπορούν να κάνουν τις DDoS επιθέσεις αναπόφευκτες. Στο δεύτερο κεφάλαιο, υπάρχη μια σύνοψη των network based attacks οι οποίες αποτελεούνται από ενεργές (active) και παθητικές (passive) επιθέσεις. Στο τρίτο κεφάλαιο, υπάρχει μια γενική περιγραφή των denial of service επιθέσεων με αναφορά σε ορισμούς, συμπτώματα και ενδείξεις αυτού του είδους των επιθέσεων καθώς και μια σύνοψη των κατηγοριών των πιο διαδεδομένων denial of service επιθέσεων. Στο τέταρτο κεφάλαιο, υπάρχει αναλυτική παρουσίαση των denial of service επιθέσεων δίνοντας την περιγραφή της συνολικής διαδικασίας μιας denial of service επίθεσης. Επιπροσθέτως, παρουσιάζονται μερικοί μηχανισμοί DDoS επιθέσεων καθώς επίσης και η ανάλυση και σύγκριση διαφόρων βασικών μορφών DDoS επιθέσεων. Στο πέμπτο κεφάλαιο, υπάρχει ανάλυτική παρουσίαση των διαφόρων μορφών denial of service επιθέσεων. Πιο συγκεκριμένα, παρουσιάζονται οι δύο κύριες κατηγορίες επιθέσεων: crashing και bandwidth επιθέσεις. Επιπροσθέτως, σε αυτό το κεφάλαιο, υπάρχει μαι μικρή εισαγωγή στις distributed denial of service επιθέσεις και ακόμη γίνεται αναφορά στις επιπτώσεις των bandwidth επιθέσεων στο διαδίκτυο. Στο έκτο κεφάλαιο, υπάρχει μια γενική περιγραφή των υπόλοιπων σημαντικών μορφών DoS επιθέσεων όπως peer attacks, reflected/spoofed attacks, low rate dos attacks, παροδικές και μη σκόπιμες DoS επιθέσεις. Στο έβδομο κεφάλαιο, υπάρχει μια γενική περιγραφή των μεθόδων αποτροπής και αντίδρασης (prevention and response methods) ενάντια στις denial of service επιθέσεις. Στο κεφάλαιο αυτό, γίνεται αναφορά σε διαφορετικές στρατηγικές οι οποίες μπορούν να προστατέψουν ένα επιχειρηματικό περιβάλλον από αυτού του είδους τις επιθέσεις. Επιπροσθέτως, υπάρχει ανάλυση μερικών γενικών αρχών ασφαλείας ενάντια στις denial of service επιθέσεις. Στο όγδοο κεφάλαιο, υπάρχει μια σύντομη παρουσίαση εργαλείων αποτροπής και αντίδρασης επιθέσεων. Ανάμεσα σε άλλα εργαλεία, υπάρχει ανάλυση των clean pipe DoS protection εργαλείων. 9

10 Στο ένατο κεφάλαιο, υπάρχει παρουσίαση των δύο κύριων κατηγοριών μηχανισμών άμυνας (defense mechanisms) οι οποίοι είναι: preventive και reactive μηχανισμοί και υπάρχει μια σύντομη αναφορά σε μοντέρνες πρακτικές σχετικά με DDoS diversion συστήματα. Στο δέκατο καφάλαιο, υπάρχει γενική περιγραφή των DDoS defense schemes οι οποίοι κατηγοριοποιούνται σε τέσσερεις γενικές κατηγορίες: Prevention, Detection, Source identification and Response. Στο ενδέκατο κεφάλαιο, υπάρχει αναλυτική παρουσίαση των τεσσάρων παραπάνω κατηγοριών DDoS defense schemes δίνοντας περισσότερες πληροφορίες σχετικά με διάφορους τύπους filtering schemes. Επιπροσθέτως, υπάρχει ανάλυση των DoS attack specific και anomaly based detection τεχνικών. Στο δωδέκατο κεφάλαιο, παρουσιάζονται οι δύο κύριοι IP traceback μέθοδοι: probabilistic packet marking and deterministic packet marking μέθοδοι. Ακόμη, υπάρχει μια μικρή ανάλυση αυτών των μεθόδων κάνοντας αναφορά στα πλεονεκτήματα και τα μειονεκτήματα κάθεμιας από τις δύο μεθόδους. Επιπρόσθετα, υπάρχει σύγκριση μεταξύ των δύο παραπάνω μεθόδοων με άλλα σημαντικά filtering schemes. Στο δέκατοτρίτο κεφάλαιο, υπάρχει μια σύνοπτική παρουσίαση στατιστικής ανάλυσης των Dos attacks defense schemes. Στο δέκατοτέταρτο κεφάλαιο, παρουσιάζονται μερικές στατιστικές προσεγγίσεις σχετικά με Dos attack detection τεχνικές. Πιο συγκεκριμένα, στο κεφάλαιο αυτό γίνεται αναφορά σε δύο αλγορίθμους ανίχνευσης (detection algorithms): την εντροπία και τον Chi-Square Statistic αλγόριθμο. Στο δέκατοπέμπτο κεφάλαιο, υπάρχει ανάλυση των επιπτώσεων των DDoS επιθέσεων στο διαδίκτυο. Παρουσιάζονται μερικά από τα πιο σημαντικά περιστατικά DDoS επιθέσεων σε παγκόσμιο επίπεδο και υπάρχει μια επισκόπηση μερικών πρόσφατων ερευνών σχετικά με τις επιπτώσεις των DDoS επιθέσεων σε επιχειρηματικά περιβάλλοντα, τραπεζικά συστήματα και οργανισμούς. 10

11 Ευχαριστίες Θα ήθελα να εκφράσω τις ευχαριστίες μου στο Δρ. Ιωάννη Σταματίου για την πρόταση του παρόντος θέματος, την υπομονή και την πολύτιμη υποστήριξή του, τόσο επιστημονική όσο και ηθική σ ολόκληρη την πορεία της διπλωματικής όπως και στους καθηγητές του Μεταπτυχιακού και ιδιαίτερα στους κ. Ιωάννη Αντωνίου, Πολυχρόνη Μωυσιάδη και Νικόλαο Φαρμάκη για την ευκαιρία που μου έδωσαν να ασχοληθώ με το Σημασιολογικό Ιστό μέσω του μεταπτυχιακού προγράμματος Web Science στο Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης. Θα ήθελα ακόμη να ευχαριστήσω την οικογένειά μου για το κουράγιο, την υπομονή και την συμπαράστασή τους καθ όλη τη διάρκεια της παρούσης διπλωματικής. 11

12 12

13 Contents Abstract...5 Summary...7 Ευχαριστίες...11 Chapters 1. Introduction The historical timeline Definitions Vulnerabilities of Internet and DoS Attacks Overview of Networked based attacks Passive Attacks Active Attacks Overview of Denial of Service Attacks Introduction Definitions Symptoms and manifestations Well-Known DoS Attacks Analysis of Denial of Service Attacks Crashing attacks Bandwidth attacks Protocol-based Bandwidth Attacks ICMP flood Ping of Death SSPing Smurf SYN flood Land Exploit UDP flood Distributed Denial of Service (DDoS) Attacks Impacts of Bandwidth Attacks

14 5. Analysis of DDoS Attacks Description of DDoS attacks Attack mechanisms Types of DDoS attacks Typical DDoS Attacks Distributed Reflector (DRDoS) attacks Comparison of two types of DDoS Attacks Other DoS Attacks Peer-to-peer attacks Reflected / Spoofed attacks Low-rate DoS attacks Permanent DoS attacks Unintentional DoS attacks Prevention and Response Introduction Protection on business environments Security policies against DoS attacks Prevention from DDoS Attacks Prevention and Response tools Firewalls Switches/routers Application front end hardware Clean pipe DoS protection services Analysis of Clean Pipe DoS protection services Black holing/sink holing IPS/ DDS defense systems Categories of DoS attack defense mechanisms Preventive Mechanisms Reactive Mechanisms Modern Tendencies

15 10. Overview of DoS Attack Defense schemes Attack Prevention Attack Detection DoS-attack-specific Detection Anomaly-based Detection Attack Source Identification Attack Reaction Overview of existing DDoS defense schemes Analysis of Attack defense schemes Attack Prevention Ingress Filtering Router-based Packet Filtering Source Address Validity Enforcement Protocol Attack Detection DoS-attack-specific Detection Analysis of DoS-attack-specific detection techniques Anomaly-based Detection Analysis of anomaly-based DoS detection techniques Attack Source Identification Active IP Traceback Probabilistic IP Traceback Hash-based IP Traceback Attack Reaction Bottleneck Resource Management Conclusions Analysis of IP Traceback methods Introduction Probabilistic Packet Marking (PPM) Advantages and disadvantages of PPM method Deterministic Packet Marking (DPM) Comparison of DPM to full path traceback Comparison of DPM to ingress address filtering Overview of IP traceback approaches Suggestions for research

16 13. Statistical analysis of DDoS defense schemes Introduction Analysis of DDoS attack defense schemes Detection of a Dos attack Classification of traffic Passive tests Active tests Response to an attack DoS response in conventional networks DoS response in Self-Aware Networks Conclusions Statistical Approaches to DDoS Attack Detection Introduction Detection algorithms Entropy Chi-Square Statistic DDoS detectors Entropy Detector Chi-Square Detector Detectors Evaluation Suggestions for research The impact of DDoS attacks on the web Overview of serious incidents of DDoS attacks Timeline of recent DDoS attacks Recent surveys about the impact of DDoS attacks Protection of retail banks and DDoS attacks Cyber security and organizations Latest trends on DDoS attacks Conclusions References

17 1. Introduction The historical timeline Although DoS attacks are launched since the beginning of computer networks, they were not considered a significant topic of research until relatively recently [6], when they started harming ISPs, governmental websites and the e-commerce infrastructure. The fact that the Internet operates on old networking protocols with limited provision for security is an advantage for the attackers. Of course, the increase in research interest did provide solutions, which have recently managed to halt the escalation of the DoS phenomenon. Distributed defense techniques have been designed and the majority of the DoS attacks can now be countered in networks where some sort of defense has been deployed. Today, attacks have shifted towards economic crime and cyber-warfare, and although less widespread they can be much more harmful [2]. As a result, the new era of DoS research has to produce even more effective solutions with even less overhead in the absence of an attack and as small disruption in the presence of one Definitions A Denial of Service (DoS) attack aims to stop the service provided by a target. A DoS attack is a malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. When this attempt derives from a single host of the network, it constitutes a DoS attack. [22] A DoS attack can be launched in two forms. The first form is to exploit software vulnerabilities of a target by sending malformed packets and crash the system. The second form is to use massive volumes of useless traffic to occupy all the resources that could service legitimate traffic. On the other hand, when the traffic of a DoS attack comes from multiple sources, we call it a Distributed Denial of Service (DDoS) attack. In this case, a lot of malicious hosts coordinate to flood the victim with an abundance of attack packets, so that the attack takes place simultaneously from multiple points. [22] 17

18 1.3. Vulnerabilities of Internet and DDoS Attacks There exist few reasons which make DDoS attacks inevitable [5]. First of all, the Internet is designed to keep intermediate network as simple as possible to optimize it for packets forwarding. This pushes the complexity to the end hosts and causes one unfortunate implication. If one party in two-way communication misbehaves, it can result in arbitrary damage to its peer. No one in the intermediate network will step in and stop it because Internet is not designed to police traffic. Moreover, the Internet security is highly interdependent. At the maximum we can make victim secure with firewalls etc. but still the degree of its susceptibility to DDoS attacks depends on the position of security in the rest of the global Internet. The limited availability of resources acts as additional benefit for DDoS attackers. To add on, accountability is not enforced which lead to attacks comparable to reflector attacks such as the Smurf attacks. Thus there exists no way out to enforce global deployment of a particular security mechanism. 2. Overview of Networked based attacks... A high-level breakdown of network-based attacks consists of Active and Passive attacks [1]. Active attacks, such as breaking into a site (Intelligence gathering, Resource usage, Deception) and denial of Service attacks. On the other hand, Passive attacks are, commonly, Sniffing (Passwords, Network traffic, Sensitive information) and Information gathering attacks. In other words, at the highest level, the preceding attacks can be broken down into two main areas: active and passive Active attacks Active attacks involve a deliberate action on the part of the attacker to gain access to the information he is after. An example is trying to telnet to port 25 on a given machine to find out information about the mail server that a company is running. An attacker is actively doing something against a site to get in. These attacks are fairly easy to detect, if we are looking for them. However, active attacks often go undetected because companies do not know what to look for or are looking at the wrong thing. 18

19 2.2. Passive attacks Passive attacks, on the other hand, are geared toward gathering information as opposed to gaining access. This is not to say that active attacks cannot gather information or that passive attacks cannot be used to gain access in most cases, the two types are used together to compromise a site. Unfortunately, most passive attacks do not necessarily involve traceable activity and therefore are much harder to detect. As we mentioned before, active attacks are easier to detect and most companies are missing them; therefore, the chances of detecting a passive attack are almost zero. 3. Overview of Denial of Service attacks Introduction A Denial of Service attack (DOS) is an attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the resources so no one else can access it. This can also result in someone damaging or destroying resources, so they cannot be used. [3] The main aim of DoS attacks is to prevent the victim either from the benefit of a particular service (in case of client being victim) or from providing its services to others (in case of server being victim). Denial of Service attacks can either be deliberate or accidental. It is caused deliberately when an unauthorized user actively overloads a resource. It is caused accidentally when an authorized user unintentionally does something that causes resources to become unavailable. An organization should take precautions to protect a system against both types of Denial of Service attacks. In general, DOS attacks are difficult to prevent, and from an attacker s standpoint, they are very easy to launch. To put Denial of Service attacks in perspective, we should examine the three main areas of security: confidentiality, integrity, and availability [1]. Denials of Service attacks are attacks against the third component, availability. Availability is preventing, detecting, or deterring the unauthorized denial of access to information and systems. However, restricting access to critical accounts, resources, and files and protecting them from unauthorized users can hinder many DOS attacks. 19

20 3.2. Definitions In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. [6] One common method of attack involves saturating the target machine with external communications requests, so much so that it cannot respond to legitimate traffic or responds so slowly as to be rendered essentially unavailable. Such attacks usually lead to a server overload. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root name servers Symptoms and manifestations The United States Computer Emergency Readiness Team (US-CERT) [23] defines symptoms of denial-of-service attacks to include: Unusually slow network performance (opening files or accessing web sites) Unavailability of a particular web site Inability to access any web site Dramatic increase in the number of spam s received ( bomb) Denial-of-service attacks can also lead to problems in the network 'branches' around the actual computer being attacked. For example, the bandwidth of a router between the Internet and a LAN may be consumed by an attack, compromising not only the intended computer, but also the entire network. If the attack is conducted on a sufficiently large scale, entire geographical regions of Internet connectivity can be compromised without the attacker's knowledge or intent by incorrectly configured or flimsy network infrastructure equipment Well-known DoS attacks Some of the most famous documented DoS attacks are the following: [22] Land: In Land attacks, the attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system. 20

21 SYN Flood: A SYN flood attack occurs during the three-way handshake that marks the onset of a TCP connection. [33] If an attack occurs, however, the attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them. Then the attacker does not execute the third step of the three-way handshake that follows, rendering the victim unable to accept any new incoming connections, because its queue is full of half-open TCP connections. Ping of Death: In Ping of Death attacks, the attacker creates a packet that contains more than 65,536 bytes, which is the limit that the IP protocol defines. This packet can cause different kinds of damage to the machine that receives it, such as crashing and rebooting. Smurf Attack: In a "smurf" attack, the victim is flooded with Internet Control Message Protocol (ICMP) "echo-reply" packets. [21] The attacker sends numerous ICMP "echo-request" packets to the broadcast address of many subnets. These packets contain the victim's address as the source IP address. Every machine that belongs to any of these subnets responds by sending ICMP "echo-reply" packets to the victim. Smurf attacks are very dangerous, because they are strongly distributed attacks. UDP Storm: In a User Datagram Protocol (UDP) connection, a character generation "chargen" service generates a series of characters each time it receives a UDP packet, while an echo service echoes any character it receives. [3] Exploiting these two services, the attacker sends a packet with the source spoofed to be that of the victim to another machine. Then, the echo service of the former machine echoes the data of that packet back to the victim's machine and the victim's machine, in turn, responds in the same way. Hence, a constant stream of useless load is created that burdens the network. The impact of these attacks is catastrophic, especially when victims are not individuals but companies. DDoS attacks prevent victims either from using the Internet, or from being reached by other people. Consequently, when the victim is an ISP, the results of such an attack are far more severe. ISPs' clients will not be served. E-business is also top on the "hit list." Being off line for a few hours could result in the loss of large sums of money for an ISP. 4. Analysis of Denial of Service Attacks. A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. There are two general 21

22 types of DoS attacks [3]: those that crash services and those that flood services. It is important to note that both of these attacks can be launched from a local system or over a network Crashing attacks The first type of DoS attack involves crashing a system or network and has the aim of disrupting the services provided by the victim by exploiting a software vulnerability of the system. If an attacker can send a victim data or packets it is not expecting, and it causes the system to either crash or reboot, then in essence, the attacker has performed a Denial of Service attack because no one will be able to get to the resources. From an attacker s standpoint, what is nice about these attacks is that you can render a system inaccessible with a couple of packets. In most cases, for the system to get back online would require intervention from an administrator to reboot or power off the system. So, this first type of attack is the most damaging because it requires little to perform and human interaction to fix Bandwidth attacks The second type of attack involves flooding the system or network with so much information that it cannot respond. This type of DoS attack is based on the volume of traffic, which is known as a bandwidth attack. The bandwidth attack can be defined as any activity that aims to disable the services provided by the victim by sending an excessive volume of useless traffic. With this attack, an attacker has to constantly flood the system with packets. After the attacker stops flooding the system with packets, the attack is over and the machine resumes operation. This type of attack requires a lot more energy on the part of the attacker because he has to keep actively flooding the system. In some cases, this type of attack could crash the machine, however in most cases, recovering from this attack requires minimal human intervention. Bandwidth attacks are classified according to the way the attack power is magnified [3]. The first category is protocol-based bandwidth attacks that take advantage of the Internet protocols. The second category is DDoS attacks that amplify attack power using a large number of distributed attack sources. In practice, a real attack can belong to both of these categories at the same time. 22

23 Protocol-based Bandwidth Attacks The protocol bandwidth attack can normally be launched effectively from a single attack source. Its attack power is based on the weaknesses of the Internet protocols. It can be broadly categorized as ICMP flood, SYN flood or UDP flood attacks ICMP flood An ICMP flood is a type of bandwidth attack that uses ICMP packets. The Internet Control Message Protocol (ICMP) is based on the IP protocol and is used to diagnose network status. [1] The Internet Control Message Protocol (ICMP) is used to handle errors and exchange control messages. ICMP can be used to determine if a machine on the Internet is responding. [21] To do this, an ICMP echo request packet is sent to a machine. If a machine receives that packet, that machine will return an ICMP echo reply packet. A common implementation of this process is the "ping" command, which is included with many operating systems and network software packages. ICMP is used to convey status and error information including notification of network congestion and of other network transport problems. ICMP can also be a valuable tool in diagnosing host or network problems. [34] On IP networks, a packet can be directed to an individual machine or broadcast to an entire network. When a packet is sent to an IP broadcast address from a machine on the local network, that packet is delivered to all machines on that network. When a packet is sent to that IP broadcast address from a machine outside of the local network, it is broadcast to all machines on the target network (as long as routers are configured to pass along that traffic). IP broadcast addresses are usually network addresses with the host portion of the address having all one bits. For example, the IP broadcast address for the network is If we have sub netted our class A network into 256 subnets, the IP broadcast address for the subnet would be Network addresses with all zeros in the host portion, such as , can also produce a broadcast response. [19] An IP broadcast address is a single address used to send a packet to all hosts on a network segment. This is done by making the host portion of an IP address all ones. This address then sends the packet to all machines on the network. If there are a large number of machines on a network segment using a broadcast address, it will use up a lot of network bandwidth because the system will generate individual packets for each machine on that network segment. [21] 23

24 Ping flood attacks are based on sending the victim an overwhelming number of ping packets, usually using the "ping" command from unix-like hosts. It is very simple to launch and the primary requirement is gaining access to greater bandwidth than the victim. [34] Ping of Death A Ping of death DoS attack involves sending a very large Internet ICMP or ping packets to a host machine. The ping of death attack is a category of network-level attacks against hosts with the goal of denying service to that host. [1] A perpetrator sends a large ping packet to the victim s machine. Most operating systems do not know what to do with a packet that is larger than the maximum size, as a result, it causes most operating systems to either hang or crash. [21] The best way to fix this problem is to apply the latest patch from the appropriate vendor. [1] If applying the patch is not an option, or additional protection is desired, large ping packets can be blocked at routers or firewalls, which stop them from getting to the victim s machine SSPing An SSPing DoS attack involves sending a series of highly fragmented, oversized ICMP data packets. [1] If a machine attempts to send a large packet on a network or over the Internet, there is a good chance that one of the routers that processes the packet will break it up into smaller pieces, so it can be properly routed to its destination. When this occurs, the destination machine receives the pieces and puts them back together. This process occurs all the time on the Internet and is called fragmentation. The SSPing program sends the victim s computer a series of highly fragmented, oversized ICMP data packets over the connection. The computer receiving the data packets locks when it tries to put the fragments together. Highly fragmented packets require the TCP/IP stack to keep track of additional information to reassemble the packets. [21] If the TCP/IP stack was not built properly, when it tries to keep track and put together several packets, the result is a memory overflow, which in turn causes the machine to stop responding. Usually, the attacker only needs to send a few packets, locking the victim s computer instantaneously. When the victim restarts his computer, the connection with the attacker is lost, so in some cases, the attacker is able to remain anonymous. This attack mainly impacts Microsoft operating systems so the only way to protect against this attack is to download the latest patches from its web site. To prevent this type of attack, Microsoft has updated the TCP/IP protocol stack. 24

25 Smurf attacks Smurf attacks are a type of ICMP flood, where attackers use ICMP echo request packets directed to IP broadcast addresses from remote locations to generate denialof-service attacks. The Smurf attack is a category of network-level attacks against hosts with the goal of denying service to the hosts. [19] A smurf attack is one particular variant of a flooding DoS attack on the public Internet. The two main components to the smurf denial-of-service attack are the use of forged ICMP echo request packets and the direction of packets to IP broadcast addresses. [34] This causes every machine on the broadcast network to receive the reply and respond back to the source address that was forged by the attacker. With this type of attack, there are three parties involved: the attacker, the intermediary (the broadcast address to which the packets are sent), and the victim (the forged source IP address). In this type of attack, the intermediary can also be a victim. This is the case because when all the machines on the intermediary start replying back to the forged address, it can generate so many packets that it uses up all the bandwidth of the intermediary network. [1] To start a smurf attack, the attacker generates an ICMP echo request (which is the same as a ping) using a forged source address and a broadcast address as the destination. The intermediary receives the ICMP echo request, which is directed to the broadcast address of its network. This causes the packet to be sent to all machines on that network segment, with each machine replying to the request and sending an ICMP echo reply back. When all the machines on the network reply, this could potentially result in degraded service or Denial of Service for that network segment due to the high volume of traffic generated. When the attackers create these packets, they do not use the IP address of their own machine as the source address. Instead, they create forged packets that contain the spoofed source address of the attacker's intended victim. The result is that when all the machines at the intermediary's site respond to the ICMP echo requests, they send replies to the victim's machine. [3] The victim is subjected to network congestion that could potentially make the network unusable. Even though we have not labeled the intermediary as a "victim," the intermediary can be victimized by suffering the same types of problem that the "victim" does in these attacks. To sum up, smurf attacks use forged ICMP packets to cause a Denial of Service attack. In such an attack, the perpetrators will send large numbers of IP packets with the source address faked to appear to be the address of the victim. The network's bandwidth is quickly used up, preventing legitimate packets from getting through to their destination. 25

26 The Smurf attack s cousin is called fraggle, which uses UDP echo packets in the same fashion as the ICMP echo packets. [34] Currently, the machines most commonly hit are IRC servers and their providers. Because Smurf is a Denial of Service attack, it impacts most devices that process packets. As for the matter of protection [1], the most common way of preventing a smurf attack is to ensure that our systems are not used as an amplified network against another victim. This can be achieved by turning off all replies to ICMP broadcast requests. Disabling all ICMP, though, may break some of the features of IPv4 like IP fragmentation. One solution to prevent our site from being used as an intermediary in this attack is to disable IP-directed broadcasts at our router. By disabling these broadcasts, we configure our router to deny IP broadcast traffic onto our network from other networks. Some operating systems can be configured to prevent the machine from responding to ICMP packets sent to IP broadcast addresses. Configuring machines so they do not respond to these packets can prevent our machines from being used as intermediaries in this type of attack. We could also block the ICMP echo reply traffic at the victim s router; however, that will not necessarily prevent congestion that occurs between the victim s router and the victim s Internet service provider. Victim s receiving this traffic may need to consult with their Internet service provider to temporarily block this type of traffic in the ISP s network SYN flood In order to describe the SYN flood attack, we first need to define several aspects of TCP connections. We define the client as the one who initiates the TCP connection, and the server as the one who receives the connection request. At the beginning of each TCP connection, the client will negotiate with the server to set up a connection, which is called three-way handshake. When a system (called the client) attempts to establish a TCP connection to a system providing a service (the server), the client and server exchange a set sequence of messages known as a three-way handshake. [1] Firstly, the client will send a SYN packet to the server, requesting a connection. Then the server will respond to the connection request using a SYN-ACK packet, and store the request information in the memory stack. After receiving the SYN-ACK packet, the client will confirm the request using an ACK packet. When the server receives the ACK packet, it checks the memory stack to see whether this packet is used to confirm an existing request. If it is, the server will remove the request information from the memory stack and start actual data communication. The connection between the client and the server is then opened, and the service-specific data can be exchanged between the client and the server. 26

27 The potential for abuse arises at the point where the server system has sent an acknowledgment (SYN-ACK) back to the client, but it has not yet received the final ACK message. This is what is meant by a half-opened connection. [19] The server has in its system memory a built-in data structure describing all pending connections. This data structure is of finite size, and it can be made to overflow by intentionally creating too many partially opened connections. Creating half-open connections is easily accomplished with IP spoofing. The half-open connections saturate the number of available connections the server is able to make, keeping it from responding to legitimate requests until after the attack ends. The SYN flood attack exploits a vulnerability of the TCP/IP protocol and is one of the most powerful and commonly seen attacks in the Internet. During SYN flood attacks, the attacker sends SYN packets with source IP addresses that do not exist or are not in use. [21] A SYN flood occurs when a host sends a flood of TCP/SYN packets, often with a forged sender address. Each of these packets is handled like a connection request, causing the server to spawn a half-open connection, by sending back a TCP/SYN-ACK packet (Acknowledge), and waiting for a packet in response from the sender address (response to the ACK Packet). However, because the sender address is forged, the response never comes. During the 3-way handshake, when the server puts the request information into the memory stack, it will wait for the confirmation from the client that sends the request. Before the request is confirmed, it will remain in the memory stack. Since the source IP addresses used in SYN flood attacks are non-existent, the server cannot receive confirmation packets for requests created by the SYN flood attack. Thus, more and more requests will accumulate and fill up the memory stack. [3] Therefore, no new request, including legitimate requests, can be processed and the services of the system are disabled. Generally, the space for the memory stack allocated by the operating system is small, and even a small scale SYN flood attack can be dangerous. The location of the attacker s system is obscured because the source addresses in the SYN packets are often set to an IP address that is currently not online. [2] This way it is not able to reply to the SYN-ACK request sent by the server. Because the source address is spoofed, there is no way to determine the identity of the true attacker when the packet arrives at the victim s system. SYN Floods exploit the underlying structure of TCP/IP. A SYN Flood can't be stopped by modifying the TCP protocol. Any modifications to the protocol may damage the core functionality of TCP/IP. There are various methods approaches to lessen the effect of a SYN flood by changing how the host reacts to the attack. [33] The three most common ways are: 1. to increase the size of the TCP backlog queue for half open connections, 2. to decrease the amount of time the TCP driver keeps half open connections and 3. to enable TCP cookies. 27

28 Currently, there is not a generally accepted solution to this problem with the current IP protocol technology. However, proper router or firewall configuration can reduce the likelihood that our site will be the source of one of these attacks. [19] A router or firewall can block this type of attack by allowing only a limited number of half-opened connections to be active at any given time. However, this approach is not perfect because legitimate user s requests could still be blocked. It just reduces the chances of the destination machine crashing. The use of Netstat helps us to look for a large number of half-opened connections so as to try to detect such an attack. Linux and Solaris have come out with a solution to SYN flooding known as SYN cookies. [33] The way SYN cookies work is after a machine s queue starts getting full with half-open connections, it stops storing the information in the queue. It does this by setting the initial sequence number as a function of the sender s IP address Land Exploit attacks A Land exploit attack is a DoS attack in which a program sends a TCP SYN packet where the target and source address are the same and the port numbers are the same. The land attack is a program used to launch a Denial of Service attack against various TCP implementations. The program sends a TCP SYN packet (which is the first part of the three-way handshake) where the source and destination addresses are the same and the source and destination port numbers are the same. [1] IP packets are used to send information across the Internet. IP packets contain information that specifies who the recipient and sender of the packets are. IP packets also contain port numbers that specify which TCP service the packet should be sent to. The key fields that an IP packet contains are: Source address, Source port number, Destination address, Destination port number. The above information as a whole is also referred to as a socket because this is what is needed to make a successful connection to a remote host. It is important to point out that the destination port number also indicates what protocol is being used. Under normal circumstances, the source and destination address and source and destination port numbers are different. [2] In these cases, IP works as designed. Unfortunately, when IP packets contain unconventional information, most TCP/IP stacks do not know how to handle it and they crash. One instance where this is true is when someone sets the source and destination addresses and source and destination ports to the same value. Some implementations of TCP/IP are vulnerable to SYN packets when the source address and port are the same as the destination. For this to occur, an attacker has to spoof both the source address and port number. The following are the properties of a 28

29 land attack: [1] Source and destination address have the same value and Source and destination port numbers have the same value TCP is a reliable connection-oriented protocol that operates at layer 4, the transport layer. Because TCP is reliable, it requires a three-way handshake to initiate new connections. [3] When a new connection is opened, it uses SYN packets to synchronize the two machines. SYN packets are similar to normal packets, except they have the SYN bit set, which means it is one of the first packets in a new connection. Because land attacks occur when a new session is opened, attackers use SYN packets. When an attacker wants to attack a machine using the land exploit, he sends a packet to the target machine opening a new connection. The packet has the source address and port number spoofed by setting the source address and port number to be the same as the destination address and port number. The destination machine receives the packet and replies to the source address and port number. Because this is the destination machine, most machines will crash or hang because they do not know how to handle it. As for the matter of protection, the easiest way to protect against this type of attack is to apply the latest patches from our vendor. If applying the latest vendor patch is not an option, there is a workaround. [21] Any packet that is coming into our network from the Internet should not have a source address from our internal network. This is the case because any packets originating on our internal network never come in on the external interface of our router. Therefore, our router can block all incoming packets that have a source address that matches an address on our internal network. However, this does not protect against an attacker who breaks into an internal host and launches an attack against another internal host UDP flood The User Datagram Protocol (UDP) is a connectionless protocol that does not have flow control mechanisms, i.e., there is no built-in mechanism for the sender and receiver to be synchronized to adapt to changing network conditions. The UDP flood is a type of bandwidth attack that uses UDP packets. [3] Since UDP does not have flow control mechanisms, when traffic congestion happens, both legitimate and attack flows will not reduce their sending rates. Hence, the victim is unable to decide whether a source is an attack source or legitimate source by just checking the source's sending rate. Moreover, unlike TCP, UDP does not have a negotiation mechanism before setting up a connection. Therefore, it is easier to spoof UDP traffic without being noticed by the victim. [1] The attacker sends a UDP packet to victim 1, claiming to be from victim 2, requesting the echo service. Since victim 1 does not know this is a spoofed 29

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Denial Of Service. Types of attacks

Denial Of Service. Types of attacks Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

SECURING APACHE : DOS & DDOS ATTACKS - I

SECURING APACHE : DOS & DDOS ATTACKS - I SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial

More information

Gaurav Gupta CMSC 681

Gaurav Gupta CMSC 681 Gaurav Gupta CMSC 681 Abstract A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing Denial of Service for users of the

More information

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals Denial of Service Attacks Notes derived from Michael R. Grimaila s originals Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident

More information

Denial of Service. Tom Chen SMU tchen@engr.smu.edu

Denial of Service. Tom Chen SMU tchen@engr.smu.edu Denial of Service Tom Chen SMU tchen@engr.smu.edu Outline Introduction Basics of DoS Distributed DoS (DDoS) Defenses Tracing Attacks TC/BUPT/8704 SMU Engineering p. 2 Introduction What is DoS? 4 types

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Frequent Denial of Service Attacks

Frequent Denial of Service Attacks Frequent Denial of Service Attacks Aditya Vutukuri Science Department University of Auckland E-mail:avut001@ec.auckland.ac.nz Abstract Denial of Service is a well known term in network security world as

More information

Denial of Service (DoS)

Denial of Service (DoS) Intrusion Detection, Denial of Service (DoS) Prepared By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT), Amman s campus-2006 Denial of Service (DoS) What is DoS

More information

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding? Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against

More information

Acquia Cloud Edge Protect Powered by CloudFlare

Acquia Cloud Edge Protect Powered by CloudFlare Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....

More information

Seminar Computer Security

Seminar Computer Security Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example

More information

CloudFlare advanced DDoS protection

CloudFlare advanced DDoS protection CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com

More information

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method

More information

1. Firewall Configuration

1. Firewall Configuration 1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets

More information

Denial of Service Attacks

Denial of Service Attacks 2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,

More information

Security Technology White Paper

Security Technology White Paper Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

CS 356 Lecture 16 Denial of Service. Spring 2013

CS 356 Lecture 16 Denial of Service. Spring 2013 CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview

More information

Project 4: (E)DoS Attacks

Project 4: (E)DoS Attacks Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015 Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,

More information

Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory

Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory Denial of Service (DoS) attacks and countermeasures Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory Definitions of DoS/DDoS attacks Denial of Service is the prevention of authorised access

More information

Brocade NetIron Denial of Service Prevention

Brocade NetIron Denial of Service Prevention White Paper Brocade NetIron Denial of Service Prevention This white paper documents the best practices for Denial of Service Attack Prevention on Brocade NetIron platforms. Table of Contents Brocade NetIron

More information

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment Keyur Chauhan 1,Vivek Prasad 2 1 Student, Institute of Technology, Nirma University (India) 2 Assistant Professor,

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

How To Protect A Dns Authority Server From A Flood Attack

How To Protect A Dns Authority Server From A Flood Attack the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

Denial of Service Attacks, What They are and How to Combat Them

Denial of Service Attacks, What They are and How to Combat Them Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001

More information

Safeguards Against Denial of Service Attacks for IP Phones

Safeguards Against Denial of Service Attacks for IP Phones W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)

More information

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended

More information

Chapter 7 Protecting Against Denial of Service Attacks

Chapter 7 Protecting Against Denial of Service Attacks Chapter 7 Protecting Against Denial of Service Attacks In a Denial of Service (DoS) attack, a Routing Switch is flooded with useless packets, hindering normal operation. HP devices include measures for

More information

How To Classify A Dnet Attack

How To Classify A Dnet Attack Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia Nenad.stojanovski@gmail.com 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

A Study of DOS & DDOS Smurf Attack and Preventive Measures

A Study of DOS & DDOS Smurf Attack and Preventive Measures A Study of DOS & DDOS Smurf Attack and Preventive Measures 1 Sandeep, 2 Rajneet Abstract: The term denial of service (DOS) refers to a form of attacking computer systems over a network. When this attack

More information

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks Sau Fan LEE (ID: 3484135) Computer Science Department, University of Auckland Email: slee283@ec.auckland.ac.nz Abstract A denial-of-service

More information

Attack Lab: Attacks on TCP/IP Protocols

Attack Lab: Attacks on TCP/IP Protocols Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

A1.1.1.11.1.1.2 1.1.1.3S B

A1.1.1.11.1.1.2 1.1.1.3S B CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security

More information

Strategies to Protect Against Distributed Denial of Service (DD

Strategies to Protect Against Distributed Denial of Service (DD Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics

More information

SECURITY FLAWS IN INTERNET VOTING SYSTEM

SECURITY FLAWS IN INTERNET VOTING SYSTEM SECURITY FLAWS IN INTERNET VOTING SYSTEM Sandeep Mudana Computer Science Department University of Auckland Email: smud022@ec.auckland.ac.nz Abstract With the rapid growth in computer networks and internet,

More information

A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS

A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS , pp-29-33 Available online at http://www.bioinfo.in/contents.php?id=55 A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS SHUCHI JUYAL 1 AND RADHIKA PRABHAKAR 2 Department of Computer Application,

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

Chapter 28 Denial of Service (DoS) Attack Prevention

Chapter 28 Denial of Service (DoS) Attack Prevention Chapter 28 Denial of Service (DoS) Attack Prevention Introduction... 28-2 Overview of Denial of Service Attacks... 28-2 IP Options... 28-2 LAND Attack... 28-3 Ping of Death Attack... 28-4 Smurf Attack...

More information

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor

More information

DDoS Basics. internet: unique numbers that identify areas and unique machines on the network.

DDoS Basics. internet: unique numbers that identify areas and unique machines on the network. DDoS Basics Introduction Distributed Denial of Service (DDoS) attacks are designed to prevent or degrade services provided by a computer at a given Internet Protocol 1 (IP) address. This paper will explain,

More information

Announcements. No question session this week

Announcements. No question session this week Announcements No question session this week Stretch break DoS attacks In Feb. 2000, Yahoo s router kept crashing - Engineers had problems with it before, but this was worse - Turned out they were being

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities

More information

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business & Preventing (Distributed Denial of Service) A Report For Small Business According to a study by Verizon and the FBI published in 2011, 60% of data breaches are inflicted upon small organizations! Copyright

More information

Firewalls Netasq. Security Management by NETASQ

Firewalls Netasq. Security Management by NETASQ Firewalls Netasq Security Management by NETASQ 1. 0 M a n a g e m e n t o f t h e s e c u r i t y b y N E T A S Q 1 pyright NETASQ 2002 Security Management is handled by the ASQ, a Technology developed

More information

How To Prevent DoS and DDoS Attacks using Cyberoam

How To Prevent DoS and DDoS Attacks using Cyberoam How To Prevent DoS and DDoS Attacks using Cyberoam How To Prevent DoS and DDoS Attacks using Cyberoam Applicable Version: 10.00 onwards Overview Denial of Service (DoS) A Denial of Service (DoS) attack

More information

How To Defend Against A Distributed Denial Of Service Attack (Ddos)

How To Defend Against A Distributed Denial Of Service Attack (Ddos) International Journal of Science and Modern Engineering (IJISME) Survey on DDoS Attacks and its Detection & Defence Approaches Nisha H. Bhandari Abstract In Cloud environment, cloud servers providing requested

More information

Content Distribution Networks (CDN)

Content Distribution Networks (CDN) 229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the

More information

Security: Attack and Defense

Security: Attack and Defense Security: Attack and Defense Aaron Hertz Carnegie Mellon University Outline! Breaking into hosts! DOS Attacks! Firewalls and other tools 15-441 Computer Networks Spring 2003 Breaking Into Hosts! Guessing

More information

Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers

Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers Abstract Hang Chau DoS/DDoS attacks are a virulent, relatively new type of Internet attacks, they have caused some biggest web

More information

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks

More information

Networks: IP and TCP. Internet Protocol

Networks: IP and TCP. Internet Protocol Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments

More information

CMS Operational Policy for Firewall Administration

CMS Operational Policy for Firewall Administration Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for Firewall Administration July 16, 2008 Document Number: CMS-CIO-POL-INF11-01

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

Network Security - DDoS

Network Security - DDoS Network Security - DDoS What is computer network security and why is important Types and Strategies of DDoS Attacks DDoS Attack Prevention Conclusion What is Network Security Network Security is a huge

More information

A Very Incomplete Diagram of Network Attacks

A Very Incomplete Diagram of Network Attacks A Very Incomplete Diagram of Network Attacks TCP/IP Stack Reconnaissance Spoofing Tamper DoS Internet Transport Application HTTP SMTP DNS TCP UDP IP ICMP Network/Link 1) HTML/JS files 2)Banner Grabbing

More information

2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks

2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks Distributed Denial of Service Attacks Felix Lau Simon Fraser University Burnaby, BC, Canada V5A 1S6 fwlau@cs.sfu.ca Stuart H. Rubin SPAWAR Systems Center San Diego, CA, USA 92152-5001 srubin@spawar.navy.mil

More information

How To Stop A Ddos Attack On A Website From Being Successful

How To Stop A Ddos Attack On A Website From Being Successful White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service

More information

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE 51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;

More information

Network Threats and Vulnerabilities. Ed Crowley

Network Threats and Vulnerabilities. Ed Crowley Network Threats and Vulnerabilities Ed Crowley Objectives At the end of this unit, you will be able to describe and explain: Network attack terms Major types of attacks including Denial of Service DoS

More information

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE WE ARE NOT FOR EVERYONE JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME Don t let a DDoS attack bring your online business to a halt we can protect any server in any location DON T GET STUCK ON THE ROAD OF

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic

More information

Yahoo Attack. Is DDoS a Real Problem?

Yahoo Attack. Is DDoS a Real Problem? Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them

More information

Analysis and optimization of Cloud software in shared environment with adaptive resource allocation

Analysis and optimization of Cloud software in shared environment with adaptive resource allocation NATIONAL TECHNICAL UNIVERSITY OF ATHENS SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING COMPUTING SCIENCE DIVISION COMPUTING SYSTEMS LABORATORY Analysis and optimization of Cloud software in shared environment

More information

On the Deficiencies of Active Network Discovery Systems

On the Deficiencies of Active Network Discovery Systems On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized

More information

Voice Over IP (VoIP) Denial of Service (DoS)

Voice Over IP (VoIP) Denial of Service (DoS) Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Denial of Service (DoS) is an issue for any IP network-based

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

General Network Security

General Network Security 4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those

More information

VALIDATING DDoS THREAT PROTECTION

VALIDATING DDoS THREAT PROTECTION VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to

More information

DDoS Overview and Incident Response Guide. July 2014

DDoS Overview and Incident Response Guide. July 2014 DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

How To Defend Against A Ddos Attack On A Web Server

How To Defend Against A Ddos Attack On A Web Server [main] Hello, My name is Kanghyo Lee, I m a member of infosec. Today, I am here to present about A taxonomy of DDoS attack and DDoS defense mechanisms. [index] this is the procedure of my presentation

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

Mitigation of DDoS Attack using a Probabilistic Approach & End System based Strategy. Master of Technology. Computer Science and Engineering

Mitigation of DDoS Attack using a Probabilistic Approach & End System based Strategy. Master of Technology. Computer Science and Engineering Mitigation of DDoS Attack using a Probabilistic Approach & End System based Strategy A thesis submitted in partial fulfillment of the requirements for the degree of Master of Technology in Computer Science

More information

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS : DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

A Seminar Report on Denial of Service Attack

A Seminar Report on Denial of Service Attack A Seminar Report on Denial of Service Attack Submission Date: October 18, 2011 Prepared by: Ram Chandra Bhushan M.Tech (ICT) 10IT61B07 IIT Kharagpur Attack: Is anything which imposes the harm on the system.

More information

How Cisco IT Protects Against Distributed Denial of Service Attacks

How Cisco IT Protects Against Distributed Denial of Service Attacks How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN

More information

DDoS Attack and Defense: Review of Some Traditional and Current Techniques

DDoS Attack and Defense: Review of Some Traditional and Current Techniques 1 DDoS Attack and Defense: Review of Some Traditional and Current Techniques Muhammad Aamir and Mustafa Ali Zaidi SZABIST, Karachi, Pakistan Abstract Distributed Denial of Service (DDoS) attacks exhaust

More information

A Layperson s Guide To DoS Attacks

A Layperson s Guide To DoS Attacks A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4

More information

Modern Denial of Service Protection

Modern Denial of Service Protection Modern Denial of Service Protection What is a Denial of Service Attack? A Denial of Service (DoS) attack is generally defined as a network-based attack that disables one or more resources, such as a network

More information

FIREWALLS IN NETWORK SECURITY

FIREWALLS IN NETWORK SECURITY FIREWALLS IN NETWORK SECURITY A firewall in an information security program is similar to a building s firewall in that it prevents specific types of information from moving between the outside world,

More information

Network Security and DoS Attacks

Network Security and DoS Attacks Network Security and DoS Attacks 0. Document History Author: Sílvia Farraposo Laurent Gallon Philippe Owezarski Date Status Comments February 2005 Draft March 2005 1.0 April 2005 2.0 Page 1 1. Introduction

More information

Surviving DNS DDoS Attacks. Introducing self-protecting servers

Surviving DNS DDoS Attacks. Introducing self-protecting servers Introducing self-protecting servers Background The current DNS environment is subject to a variety of distributed denial of service (DDoS) attacks, including reflected floods, amplification attacks, TCP

More information