Denial Of Service. Types of attacks



Similar documents
Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Abstract. Introduction. Section I. What is Denial of Service Attack?

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Gaurav Gupta CMSC 681

SECURING APACHE : DOS & DDOS ATTACKS - I

Denial of Service (DoS)

Frequent Denial of Service Attacks

Firewalls and Intrusion Detection

Denial of Service. Tom Chen SMU

1. Firewall Configuration

Denial of Service Attacks

A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS

Chapter 8 Security Pt 2

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Secure Software Programming and Vulnerability Analysis

Strategies to Protect Against Distributed Denial of Service (DD

Chapter 28 Denial of Service (DoS) Attack Prevention

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

CS 356 Lecture 16 Denial of Service. Spring 2013

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

How To Protect A Dns Authority Server From A Flood Attack

Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory

Distributed Denial of Service

Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Network Security - DDoS

Denial of Service (DoS) Technical Primer

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks

Seminar Computer Security

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

co Characterizing and Tracing Packet Floods Using Cisco R

Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures

CS5008: Internet Computing

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

Brocade NetIron Denial of Service Prevention

What is a DoS attack?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Security Technology White Paper

Modern Denial of Service Protection

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Distributed Denial of Service (DDoS)

CHAPTER 1 DISTRIBUTED DENIAL OF SERVICE

How To Classify A Dnet Attack

AN INFRASTRUCTURE TO DEFEND AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACK. Wan, Kwok Kin Kalman

Network Security and DoS Attacks

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Firewall Firewall August, 2003

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Classification of Distributed Denial of Service Attacks Architecture, Taxonomy and Tools

Yahoo Attack. Is DDoS a Real Problem?

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Cloud-based DDoS Attacks and Defenses

Implementing Secure Converged Wide Area Networks (ISCW)

Attack Lab: Attacks on TCP/IP Protocols

Announcements. No question session this week

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Acquia Cloud Edge Protect Powered by CloudFlare

Project 4: (E)DoS Attacks

Lecture 6: Network Attacks II. Course Admin

CIAC. Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000, And Stacheldraht CIAC Paul J.

Introduction of Intrusion Detection Systems

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Chapter 7 Protecting Against Denial of Service Attacks

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

Protecting Web Servers from DoS/DDoS Flooding Attacks A Technical Overview. Noureldien A. Noureldien College of Technological Sciences Omdurman, Sudan

General Network Security

CSCE 465 Computer & Network Security

CloudFlare advanced DDoS protection

A S B

Networks: IP and TCP. Internet Protocol

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Surviving DNS DDoS Attacks. Introducing self-protecting servers

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks

Understanding the Various Types of Denial of Service Attack By Raja Azrina Raja Othman

Network and Services Discovery

Denial of Service Attacks, What They are and How to Combat Them

DDoS Protection Technology White Paper

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Network Forensics (DDoS/Distributed Denial of Service Attack)

How To Secure Network Threads, Network Security, And The Universal Security Model

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Queuing Algorithms Performance against Buffer Size and Attack Intensities

Firewalls Netasq. Security Management by NETASQ

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Honeypots for Distributed Denial of Service Attacks

Lecture 5: Network Attacks I. Course Admin

10 Configuring Packet Filtering and Routing Rules

Chapter 8 Network Security

SCALABLE SCHEMES AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACKS

Network Threats and Vulnerabilities. Ed Crowley

McAfee Network Security Platform [formerly IntruShield] Denial-of-Service [DoS] Prevention Techniques Revision C Revised on: 18-December-2013

Distributed Denial of Service Attack Tools

Transcription:

Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service to a computer or network resource. Resource exhaustion (consume all bandwidth, disk space) Types of attacks There are three general categories of attacks. Against users Against hosts Against networks

Local DOS against hosts fork() bomb intentionally generate errors to fill logs, consuming disk space, crashing The power switch!! Local DOS:Countermeasures partition disks disk quotas set process limits monitor system activity/cpu/disk Usage Physical Security

Network Based Denial of Service Attacks UDP bombing tcp SYN flooding ping of death smurf attack Most involve either resource exhaustion or corruption of the operating system runtime environment. UDP bombing Two UDP services: echo (which echos back any character received) and chargen (which generates character) were used in the past for network testing and are enabled by default on most systems. These services can be used to launch a DOS by connecting the chargen to echo ports on the same or another machine and generating large amounts of network traffic.

UDP service denial: Countermeasures Disable echo, chargen and all other unused services whenever possible, such /etc/inetd.conf on Unix, and no udp smallservices on Cisco IOS. Filter UDP traffic at the firewall level. Only allow legitimate traffic such as UDP port 53 (DNS) Of course, remember the firewalls lecture Windows UDP attacks NewTear, Newtear2, Bonk, and Boink are tools that exploit the same weakness in the Microsoft Windows 9.x/NT TCP/IP stack. The attacker sends the victim a pair of malformed IP fragments which get reassembled into an invalid UDP datagram. Upon receiving the invalid datagram, the victim host blue-screens and freezes or reboots (The pathologic offset attack) Countermeasure: Apply vendor patches

TCP SYN Flooding Also referred to as the TCP half-open attack To establish a legitimate TCP connection: the client sends a SYN packet to the server the server sends a SYN-ACK back to the client the client sends an ACK back to the server to complete the three-way handshake and establish the connection TCP SYN Flooding (cont d) The attack occurs by the attacker initiating a TCP connection to the server with a SYN. (using a legitimate or spoofed source address) The server replies with a SYN-ACK The client then doesn t send back a ACK, causing the server to allocate memory for the pending connection and wait. (If the client spoofed the initial source address, it will never receive the SYN-ACK)

TCP SYN Flooding: Results The half-open connections buffer on the victim server will eventually fill The system will be unable to accept any new incoming connections until the buffer is emptied out. There is a timeout associated with a pending connection, so the half-open connections will eventually expire. The attacking system can continue sending connection requesting new connections faster than the victim system can expire the pending connections. TCP SYN Flooding: Countermeasures Apply vendor s patches. Most OS vendors have minimized the risks in newer OS releases and have patches for older releases. Install Ingress/Egress router filters to prevent some IP spoofing locally.

Ping of Death The TCP/IP specification allows for a maximum packet size of 65,536 octets. The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim. Some systems, upon receiving the oversized packet, will crash, freeze, or reboot, resulting in denial of service. Countermeasures: Most systems are now immune, but apply vendor patches if needed. When Smurfs go bad!! A smurf attack consists of a host sending an ICMP echo request (ping) to a network broadcast address.(usually network addresses with the host portion of the address having all 1s) Every host on the network receives the ICMP echo request and sends back an ICMP echo response inundating the initiator with network traffic.

Is it much farther Papa Smurf? There are 3 players in the smurf attack the attacker,the intermediary (which can also be a victim) and the victim In most scenarios the attacker spoofs the IP source address as the IP of the intended victim to the intermediary network broadcast address. Every host on the intermediary network replies, flooding the victim and the intermediary network with network traffic. Result: Performance may be degraded such that the victim, the victim and intermediary networks become congested and unusable Smurf Attack Example

Smurf Example 192.168.1.0/24 10.1.2.0/24 Cloud Victim 1. Attacker sends ICMP packet with spoofed source IP Victim 10.1.2.255 2. Attacker sends ICMP packet with spoofed source IP Victim 192.168.1.255 Attacker 3. Victim is flooded with ICMP echo responses 4. Victim hangs? Smurf: Countermeasures Configure routers to deny IP broadcast traffic onto your network from other networks. In almost all cases, IP-directed broadcast functionality is not needed. Configure hosts (via kernel variable) to NOT reply to a packet sent to a broadcast address Configure Ingress/Egress filters on routers to counteract IP address spoofing.

Distributed Denial of Service Attacks (DDOS) Attacker logs into Master and signals slaves to launch an attack on a specific target address (victim). Slaves then respond by initiating TCP, UDP, ICMP or Smurf attack on victim. Distributed Denial of Service Attacks (DDoS) trin00 (WinTrinoo) Tribe Flood Netowrk (TFN) (TFN2k) Shaft stacheldraht Mstream

Trin00 Affects Windows and many Unix OS s Attacker scans for exploits, gains root, and downloads Trin00 programs. Attacker->Master->Daemon hierarchy (One -> More -> Many) Attacker can telnet into a Master to initiate commands, which are distributed amongst its Daemons. Trin00 (con t) Communication between Master->Daemon through a password-protected cleartext UDP-based protocol. Daemons attack the target with a UDP or TCP packet bombardment. Used in the February 2000 attacks on ebay, Amazon, CNN, etc.

Real World DDoS 4081 0.224610 119.226.89.96 -> poor.student.1.83 TCP 33081 > 60785 [SYN] Seq=3693150756 Ack=0 Win=32768 Len=0 4082 0.224610 poor.student.1.83 -> 223.144.66.65 TCP 52284 > 19586 [RST, ACK] Seq=0 Ack=423694111 Win=0 Len=0 4083 0.224610 3.41.60.116 -> poor.student.2.231 TCP 5594 > 40940 [SYN] Seq=2132997225 Ack=0 Win=32768 Len=0 4084 0.224610 poor.student.1.83 -> 50.180.94.71 TCP 33289 > 11952 [RST, ACK] Seq=0 Ack=1790973261 Win=0 Len=0 4085 0.224610 244.214.39.108 -> poor.student.2.231 TCP 38802 > 23759 [SYN] Seq=747020069 Ack=0 Win=32768 Len=0 4086 0.224610 poor.student.1.83 -> 198.183.172.81 TCP 57223 > 43146 [RST, ACK] Seq=0 Ack=3749566807 Win=0 Len=0 4087 0.224610 64.81.138.119 -> poor.student.1.83 UDP Source port: 1026 Destination port: 24661 4088 0.224610 poor.student.2.231 -> 96.247.9.94 TCP 48931 > 50749 [RST, ACK] Seq=0 Ack=1188357973 Win=0 Len=0 4089 0.224610 103.227.64.42 -> poor.student.1.83 TCP 45715 > 63366 [] Seq=3389528594 Ack=0 Win=16384 Len=0 4090 0.224610 poor.student.1.83 -> 211.107.218.23 TCP 12666 > 48183 [RST, ACK] Seq=0 Ack=2803931407 Win=0 Len=0 4091 0.224610 87.29.46.64 -> poor.student.1.83 TCP 17092 > 47365 [SYN] Seq=3446572548 Ack=0 Win=32768 Len=0 4092 0.224610 poor.student.1.83 -> 58.24.148.57 TCP 26667 > 9797 [RST, ACK] Seq=0 Ack=3710546447 Win=0 Len=0 4093 0.224610 8.116.40.43 -> poor.student.1.83 TCP 38367 > 32889 [SYN] Seq=1914703987 Ack=0 Win=32768 Len=0 4094 0.225448 poor.student.1.83 -> 68.132.173.125 TCP 64470 > 35524 [RST, ACK] Seq=0 Ack=1819819023 Win=0 Len=0 4095 0.225448 75.115.186.26 -> poor.student.1.83 TCP 4082 > 29772 [SYN] Seq=4245878839 Ack=0 Win=32768 Len=0 TFN (2k) Smurf attack ICMP flood SYN flood UDP flood All three at once

Stackeldraht ICMP flood SYN flood UDP flood Smurf attack Shaft ICMP flood SYN flood UDP flood All three at once

DDOS: Countermeasures RID: Sends out packets and listens for reply Detects Trinoo, TFN, Stacheldraht NIPC - find_ddos tool Runs on local system Detects Trinoo, TFN, TFN2k Bindview s Zombie Zapper Tells DDOS slave to stop flooding traffic