DDos. Distributed Denial of Service Attacks. by Mark Schuchter



Similar documents
Denial Of Service. Types of attacks

Denial of Service (DoS)

Firewalls and Intrusion Detection

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CS5008: Internet Computing

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Seminar Computer Security

Strategies to Protect Against Distributed Denial of Service (DD

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Denial of Service. Tom Chen SMU

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Gaurav Gupta CMSC 681

Denial of Service (DoS) Technical Primer

Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures

Secure Software Programming and Vulnerability Analysis

Implementing Secure Converged Wide Area Networks (ISCW)

Denial of Service Attacks

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Network Incident Report

Computer System Security Updates

Security: Attack and Defense

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Stop that Big Hack Attack Protecting Your Network from Hackers.

Installing and Configuring Nessus by Nitesh Dhanjani

How To Attack A Server With A Ddos Attack On A Zombie Army Of Your Computer (For A Free Download)

Attack and Defense Techniques

Distributed Denial of Service Attack Tools

SECURING APACHE : DOS & DDOS ATTACKS - I

Chapter 8 Security Pt 2

Distributed Denial of Service

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

Modern Denial of Service Protection

Yahoo Attack. Is DDoS a Real Problem?

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

CHAPTER 1 DISTRIBUTED DENIAL OF SERVICE

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca

How To Protect Your Network From Attack From A Hacker On A University Server

Network Security - DDoS

Safeguards Against Denial of Service Attacks for IP Phones

Attack Lab: Attacks on TCP/IP Protocols

Distributed Denial of Service (DDoS)

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Queuing Algorithms Performance against Buffer Size and Attack Intensities

SECURING APACHE : DOS & DDOS ATTACKS - II

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Firewall Firewall August, 2003

Understanding the Various Types of Denial of Service Attack By Raja Azrina Raja Othman

Certified Ethical Hacker (CEH)

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

How To Classify A Dnet Attack

International Journal of Advanced Research in Computer Science and Software Engineering

Network Security: Introduction

BotNets- Cyber Torrirism

Security Type of attacks Firewalls Protocols Packet filter

A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

How To Understand A Network Attack

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

NETWORK SECURITY ASPECTS & VULNERABILITIES

Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers

Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

CIAC. Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000, And Stacheldraht CIAC Paul J.

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Introduction of Intrusion Detection Systems

Acquia Cloud Edge Protect Powered by CloudFlare

General Network Security

E-BUSINESS THREATS AND SOLUTIONS

1. Firewall Configuration

Network Security: A Practical Approach. Jan L. Harrington

CloudFlare advanced DDoS protection

1 Introduction. Agenda Item: Work Item:

Network Forensics (DDoS/Distributed Denial of Service Attack)

Overview. Packet filter

Classification of DDoS Attacks and their Defense Techniques using Intrusion Prevention System

Abstract. Introduction. Section I. What is Denial of Service Attack?

Network Monitoring Tool to Identify Malware Infected Computers

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Evolving Optical Transport Network Security

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Network Threats and Vulnerabilities. Ed Crowley

A Very Incomplete Diagram of Network Attacks

Transcription:

DDos Distributed Denial of Service Attacks by Mark Schuchter

Overview Introduction Why? Timeline How? Typical attack (UNIX) Typical attack (Windows)

Introduction limited and consumable resources (memory, processor cycles, bandwidth,...) inet security highly interdependent DDos-Attack prevent and impair computer use

Why? sub-cultural status nastiness revenge to gain access political reasons economic reasons

Timeline <1999: Point2Point (SYN flood, Ping of death,...), first distributed attack tools ( fapi ) 1999: more robust tools (trinoo, TFN, Stacheldraht), auto-update, added encryption 2000: bundled with rootkits, controlled with talk or ÍRC 2001: worms include DDos-features (eg. Code Red), include time synchro., 2002: DrDos (reflected) attack tools 2003: Mydoom infects thousands of victims to attack SCO and Microsoft

How? TCP floods (various flags) ICMP echo requests (eg. Ping floods) UDP floods

SYN-Attack Handshake Attack Client Server Attacker (spoofed IP) Server SYN-ACK SYN SYN SYN-ACK SYN SYN-ACK ACK

Typical attack 1. prepare attack 2. set up network 3. communication

UNIX ( trin00 ) preparation I use stolen account (high bandwidth) for repository of: scanners attack tools (i.e. buffer overrun exploit) root kits sniffers trin00 master and daemon programm list of vulnerable host, previously compromised hosts...

UNIX ( trin00 ) preparation II scan large range of network blocks to identify potential targets (running exploitable service) list used to create script that: performs exploit sets up cmd-shell running under root that listens on a TCP port (1524/tcp) connects to this port to confirm exploit list of owned systems

UNIX ( trin00 ) network I store pre-compiled binary of trin00 daemon on some stolen account on inet script takes owned-list to automate installation process of daemon same goes for trin00 master

UNIX ( trin00 ) network II attacker attacker master master master daemon daemon daemon daemon

UNIX ( trin00 ) communication attacker controls master via telnet and a pw (port 27665/tcp) trin00 master to daemon via 27444/udp (arg1 pwd arg2) daemon to master via 31335/udp dos <pw< pw> > 192.168.0.1 triggers attack

Windows ( Sub7 ) preparation I set up the following things on your home pc: freemail kazaa trojan-toolkit toolkit IRC-client IRC-bot

Windows ( Sub7 ) preparation II assemble different trojans (GUI) define ways of communication name file

Windows ( Sub7 ) network I start spreading via email/news lists IRC P2P-Software

Windows ( Sub7 ) network II attacker client client client client

Windows ( Sub7 ) communication sub7client IRC channel 1 click to launch attack

Development High Intruder Knowledge Attack Sophistication back doors disabling audits packet spoofing denial of service sniffers distributed attack tools www attacks automated probes/scans GUI hijacking burglaries sessions exploiting known vulnerabilities password cracking binary encryption stealth / advanced scanning techniques network mgmt. diagnostics Tools Low password guessing Attackers 1980 1985 1990 1995 2001 Source: CERT/CC

Solutions statistical analyses (i.e. D-ward) D at core routers - not ready yet change awareness of people (firewalls, attachments, V-scanners,...) V

Thanks for your attention!