Network Security - DDoS



Similar documents
Denial Of Service. Types of attacks

Abstract. Introduction. Section I. What is Denial of Service Attack?

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Denial of Service. Tom Chen SMU

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Gaurav Gupta CMSC 681

Strategies to Protect Against Distributed Denial of Service (DD

Firewalls and Intrusion Detection

Distributed Denial of Service (DDoS)

Denial of Service (DoS)

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

CS5008: Internet Computing

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Security Technology White Paper

SECURING APACHE : DOS & DDOS ATTACKS - I

CS 356 Lecture 16 Denial of Service. Spring 2013

A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS

Client Server Registration Protocol

Seminar Computer Security

Denial of Service Attacks

Modern Denial of Service Protection

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

Secure Software Programming and Vulnerability Analysis

Denial of Service Attacks: Classification and Response

co Characterizing and Tracing Packet Floods Using Cisco R

AN INFRASTRUCTURE TO DEFEND AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACK. Wan, Kwok Kin Kalman

Protecting Web Servers from DoS/DDoS Flooding Attacks A Technical Overview. Noureldien A. Noureldien College of Technological Sciences Omdurman, Sudan

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security and DoS Attacks

Security vulnerabilities in the Internet and possible solutions

Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory

Frequent Denial of Service Attacks

1. Firewall Configuration

Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers

Announcements. No question session this week

Denial of Service (DoS) Technical Primer

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Safeguards Against Denial of Service Attacks for IP Phones

Depth-in-Defense Approach against DDoS

Mitigation of DDoS Attack using a Probabilistic Approach & End System based Strategy. Master of Technology. Computer Science and Engineering

2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks

Detection and prevention from denial of service attacks (DoS) and distributed denial of service attacks (DDoS)

How To Classify A Dnet Attack

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks

Distributed Denial of Service

Denial of Service Attacks, What They are and How to Combat Them

Queuing Algorithms Performance against Buffer Size and Attack Intensities

How To Protect A Dns Authority Server From A Flood Attack

Chapter 8 Security Pt 2

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

A S B

DDoS Attack and Defense: Review of Some Traditional and Current Techniques

Classification of Distributed Denial of Service Attacks Architecture, Taxonomy and Tools

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

What is a DoS attack?

Yahoo Attack. Is DDoS a Real Problem?

TDDA: Traceback-based Defence against DDoS Attack

Security: Attack and Defense

A Defense Framework for Flooding-based DDoS Attacks

About Firewall Protection

Survey on DDoS Attack Detection and Prevention in Cloud

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

How To Stop A Ddos Attack On A Website From Being Successful

How To Understand A Network Attack

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Brocade NetIron Denial of Service Prevention

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

How To Defend Against A Ddos Attack On A Web Server

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

SECURING APACHE : DOS & DDOS ATTACKS - II

Network Forensics (DDoS/Distributed Denial of Service Attack)

Project 4: (E)DoS Attacks

Attack Lab: Attacks on TCP/IP Protocols

Acquia Cloud Edge Protect Powered by CloudFlare

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

INTRODUCTION OF DDOS ALGORITHMS: A SURVEY. S.Nagarjun. Siddhant College of Engineering, Pune

DDoS Overview and Incident Response Guide. July 2014

CloudFlare advanced DDoS protection

How To Defend Against A Distributed Denial Of Service Attack (Ddos)

Chapter 28 Denial of Service (DoS) Attack Prevention

DoS Network Attacks

CMS Operational Policy for Firewall Administration

Implementing Secure Converged Wide Area Networks (ISCW)

Use of Honeypot and IP Tracing Mechanism for Prevention of DDOS Attack

Defenses Against Distributed Denial of Service Attacks

Chapter 4 Firewall Protection and Content Filtering

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

Distributed Denial of Service Attacks & Defenses

Transcription:

Network Security - DDoS What is computer network security and why is important Types and Strategies of DDoS Attacks DDoS Attack Prevention Conclusion What is Network Security Network Security is a huge topic that can be divided into two categories: - Cryptography - Network Security Services 1

Cryptography A process associated with scrambling plaintext (ordinary text, or clear text) into cipher text (a process called encryption), then back again ( a process called decryption) Network Security Services 1.Secrecy The purpose of secrecy is to keep information out of the hands of unauthorized users. 2. Authentication It deals with determining of whom you are talking to before releasing sensitive information or making a business deal. The sender and the receiver should be able to verify their identity 3. Non Reputation It concerns with signatures. It s purpose it s to prove that the customer placed an order with the correct amount. 4. Message Integrity The sender and the receiver should be able to verify that the message sent by the sender and received by the receiver is the correct one and it s not malicious modified in transit. 5. Denial of Service (DoS) Prevention DoS is a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. 2

WHY DO WE NEED SECURITY? With the rapid development of the Internet, companies build their own LANs and give Internet access to their employees. As a result any Internet user can connect to an insecure LAN. Computer and Network Security is Important To protect company assets Assets can be any information that is housed on a company s computers. To gain a competitive advantage For example no one will use an Internet Banking System if that system is being hacked in the past. To ensure the continuity of the organization. (Some organizations rely on computers for their continuing operations) For the System Administrators and Network Engineers to keep their job. 3

REPORTS February 7-11 2000 The week of the famous attacks CNN, Yahoo, E-Bay, Datek taken down for several hours at a time due to traffic flooding Trinoo, Tribal Flood Network, TFN2K, and Stacheldraht suspected tools used in attacks May 4 th -20 th 2001- The attacks on Gibson Research Corporation http://www.grc.com DDoS Attack from 474 machines completely saturated two T1s, and a 13 th year old claimed responsibility DoS Attacks on the Rise 4

Some Reports from CERT (Internet Security Expertise) February 28, 2000 The CERT received reports indicating intruders are beginning to deploy and utilize windows based denial of service agents to launch distributed denial of service attacks. May 2, 2000 In late April 2000, CERT began receiving reports of sites finding a new distributed denial of service (DDOS) tool that is being called "mstream". This tool enables intruders to use multiple Internetconnected systems to launch packet flooding denial of service attacks against one or more target systems. April 24, 2001 The CERT/CC has received reports that a distributed denial-of-service (DDoS) tool named Carko is being installed on compromised hosts. March 19, 2002 The CERT/CC has received reports of social engineering attacks on users of Internet Relay Chat (IRC) and Instant Messaging (IM) services. Intruders trick unsuspecting users into downloading and executing malicious software, which allows the intruders to use the systems as attack platforms for launching distributed denial-of-service (DDoS) attacks. The reports to the CERT/CC indicate that tens of thousands of systems have recently been compromised in this manner. 5

Denial of Service (DOS) AND Distributed Denial of Service (DDOS) A denial of Service (DOS) attack is an incident in which a user or an organization is not able to use the services of a resource that would normally expect to have. Resource Services can be -Web Access -E-mail -Network Connectivity The bottom line is that the target person or company loses a great deal of time and money A DDOS (Distributed Denial of Service) attack is a sophisticated attack created by a large number of compromised hosts that are instructed to send useless packets to jam a victim or its Internet connection or both. Definition and Strategy of DDOS attacks Architecture Of DDoS Attack 6

Architecture of DDOS Attack A DDOS Attack uses many computers to launch a coordinate DOS attack against one or more targets. Using client/server technology the penetrator is able to multiply the effectiveness of the DoS significantly by harnessing the resources of multiple computers which serve attack platforms. A DDOS is composed of four elements The Real Attacker The Handlers or master compromised hosts, who are capable of controlling multiple agents The Attack daemon agents or zombie hosts who are responsible for generating a stream of packets toward the victim The victim or the target host Step 1: Recruitment The Attacker chooses the vulnerable agents which will be used to perform the attack Step 2: Compromise The Attacker exploits the vulnerabilities of the agents and plants the attack code, protecting it simultaneously from discovery and deactivation. Step 3: Communication The agents inform the attacker via handlers that they are ready Step 4: Attack The Attacker commands the onset of the attack Powerful DDOS toolkits Sophisticated and powerful DDOS toolkits are available to potential attackers such as TRINOO TFN STACHELDRAHT TFN2K MSTREAM SHAFT 7

DDOS ATTACK CLASSIFICATION DDoS can be divided in two main classes 1) Bandwidth Depletion 2) Resource Depletion DoS Attack Classification A Bandwidth Depletion attack is design to flood the victim network with unwanted traffic that prevents legitimate traffic from reaching the victim system. A Resource Depletion attack is an attack that is designed to tie up the resources of a victim system Attack Categories Two General Attack Categories are: 1) Direct Attacks Both of them are flooding attacks 2) Reflector Attacks Direct Attack The Attacker arranges to send out a large number of attack packet directly toward a victim. Attack packets can be TCP,ICMP,UDD or a mixture of them. The source addresses in these attack packets are usually randomly generated (spoofed addresses) and as a result the response packet are send elsewhere in the Internet. 8

Reflector Attack A Reflector attack is an indirect attack in that intermediate nodes (routers and various servers)better known as reflectors are innocently used as attack launchers. An attacker sends packets that require responses to the reflectors with the packets source addresses set to a victims address. Without realizing that the packets are actually spoofed the reflectors return response packets to the victim according to the types of the attack packet. The packets are reflected in the form of normal packets toward the victim. If the numbers of reflectors are large enough the link of the victim is flooded. Bandwidth DoS Attack Example A standard bandwidth DoS attack model, MS-SQL server worm also known as the Slammer is a self-propagating malicious code that employs multiple vulnerabilities of SQL SERVER Resolution Services (SSRS) providing referral services for multiple server instances running on the same machine An attacker creates a forged ping message to one instance of the SSRS (SERVER A),using the IP address of another instance (SERVER B) as the source That will cause SERVER A to respond to SERVER B and cause SERVER A and SERVER B to continuously exchange messages. This cycle will endure to consume resources until nothing left. The attack on January 25 2003, resulted in preventing 13000 Bank of America ATM from providing withdraw services and paralyzed large ISP as Korea Freefell. 9

Memory DoS Attack Every TCP connection establishment requires an allocation of significant memory resources. Typically 280 Bytes on BSD. There is a limit on the number of concurrent TCP half-open connections. The range of the backlog queue size on various Oses is 6 to 128 By sending overdosed connection requests with spoofed source addresses to the victim, an attacker can disable all successive connection establishment attempts including those of legitimate users. DDoS TYPES A. FLOOD ATTACK B. LOGIC OR SOFTWARE ATTACKS 10

FLOOD ATTACKS TCP SYN Flooding SYN flooding is a denial-of-service attack that exploits the three-way handshake that TCP/IP uses to establish a connection. SYN flooding disables a targeted system by creating many half-open connections The client transmits to the server the SYN bit set. This tells the server that the client wishes to establish a connection and what the starting sequence number will be for the client. The server sends back to the client an acknowledgment (SYN-ACK) and confirms its starting sequence number. The client acknowledges (ACK) receipt of the server's transmission and begins the transfer of data. The attacker creates many half-open connections by initiating the connections to a server with the SYN number bit. - The return address that is associated with the SYN would not be a valid address. - The server would send a SYN-ACK back to an invalid address that would not exist or respond. Using available programs, the hacker would transmit many SYN packets with false return addresses to the server. - The server would respond to each SYN with an acknowledgment and then sit there with the connection half-open waiting for the final acknowledgment to come back. Result: - The system under attack may not be able to accept legitimate incoming network connections so that users cannot log onto the system. Each operating system has a limit on the number of connections it can accept. In addition, the SYN flood may exhaust system memory, resulting in a system crash. The net result is that the system is unavailable or nonfunctional. 11

Smurf Attack: Smurf Attack Amplification attack Sends ICMP ECHO to network Network sends response to victim system The "smurf" attack's cousin is called "fraggle", which uses UDP echo packets in the same fashion The attacker wants a result of tons of ping replies flooding the host they intend to exploit. This attack causes a DoS. 12

UDP Flood Attack: UDP Flood Attack: UDP is a connectionless protocol and it does not require any connection setup procedure to transfer data. A UDP Flood attack is possible when an attacker sends a UDP packet to a random port on the victim system. When the victim system receives a UDP packet, it will determine what application is waiting on the destination port. When it realizes that there is no application that is waiting on the port, it will generate an ICMP packet of destination unreachable to the forged source address. If enough UDP packets are delivered to ports on victim, the system will go down. http://www.cert.org/advisories/ca-1996-01.html Attacks similar to Trinno are: - TFN (Tribal Flood Network), - Stacheldraht 13

Logic or Software Attacks Ping of Death: An attacker sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to victim. Since the received ICMP echo request packet is bigger than the normal IP packet size, the victim cannot reassemble the packets. The OS may be crashed or rebooted as a result. ping -l 65510 your.host.ip.address http://www.insecure.org/sploits/ping-o-death.html Teardrop: An attacker sends two fragments that cannot be reassembled properly by manipulating the offset value of packet and cause reboot or halt of victim system. Many other variants such as targa, SYNdrop, Boink, Nestea Bonk, TearDrop2 and NewTear are available. http://www.cert.org/advisories/ca-1997-28.html Land: An attacker sends a forged packet with the same source and destination IP address. The victim system will be confused and crashed or rebooted http://www.cert.org/advisories/ca-1997-28.html 14

Echo/Chargen: The character generator (chargen) service is designed to simply generate a stream of characters. It is primarily used for testing purposes. Remote users/intruders can abuse this service by exhausting system resources. Spoofed network sessions that appear to come from that local system's echo service can be pointed at the chargen service to form a "loop." This session will cause huge amounts of data to be passed in an endless loop that causes heavy load to the system. When this spoofed session is pointed at a remote system's echo service, this denial of service attack will cause heavy network traffic/overhead that considerably slows your network down. It should be noted that an attacker does not need to be on your subnet to perform this attack as he/she can forge the source addresses to these services with relative ease. Defending Measures A. System Self Defense B. Packet Filtering A lot of defensive measures exist, but few of them are effective under DDoS. Actually some of them are vulnerable to DoS themselves. Defending can be very difficult because the syn packets are part of normal traffic, and the source IP can be fake. A. System Self Defense 1. Reduce the number of targets that can be attacked. Stop all unnecessary or nonessential system services or network ports. 2. Increase the difficulty of TCP Syn attacks by : a. Enlarging the length of backlog queue b. Reduce the time-out period in order to cope with more simultaneous halfopen connection 15

B. Packet Filtering It deals on how to continuously monitor TCP/IP traffic in a network, looking for irregularity in packet behavior. Once a packet is determined as being malicious, the monitor agent will either discard it or reset any pending connection request. 1. Ingress Filtering ISPs take actions against DoS/DDoS that include: - Eliminating routing of spoofed packets by discarding any packet that contains any RFC 1918 or reserved IP address RFC 3330 in the IP source or destination address Drop packets with IP addresses outside the range of a customer s network, so they can prevent attackers from using forge source addresses to launch a DoS attack. The weaknesses of applying ingress filtering technique is that, it does nothing to address flooding attacks that originate from valid IP addresses. 2. Egress Filtering Egress Filtering is a source-network mechanism. It prevents one s network from being the source of forged communications used in DoS attacks These filters analyze packets as they are forwarded to their intended destination, looking for forged (spoofed) IP addresses. Since any particular network is assigned a specific subset of IP addresses, any packet containing an invalid IP address is assumed to be spoofed, and the filter drops such packets. This ensures that only IP packets with valid source IP addresses leave the network and thus protects the outside from spoofed packets. Weakness Does not protect the network from attack but it only keeps an attacker from using the network to perform a DDoS Cannot detect internal spoofed IPs. 16

C. Firewall 17

Firewall -A firewall is used to secure the network of an organization. It is a device that attempts to prevent unauthorized access to a network. It is usually located at the boundary where a private network interfaces with the external world -A firewall can block the arrival of potentially malicious TCP connection request at the destination host s packets - It is used as a request proxy that answers the requests on its behalf, or as a TCP connection request monitor The negative points are : a. The firewall causes new delays for every connection, including those for legitimate users. b. A firewall might be vulnerable by itself. c. A specialized firewall can be disabled by a flood of 14000 packets per second State Monitoring D. State Monitoring: Some software agents are used to determine whether or not a packet is malicious RealSecure monitors the local network for SYN packets that are not acknowledged for a period of time defined by the users. Synkill supports a finite state machine that classifies IP addresses as good or bad. Unicast RPF examines all packets received at the input interface to make sure that the source address and the source interface pair is in a special routing table. WATCHER maintains multiple decentralized counters that are exchanged periodically among the neighbors of the suspected router. \ 18

State Monitoring TDSAM describes flow behavior by classifying individual profiles as either short-term or long-term components. All of these software agents need to maintain tremendous states to determine whether or not a packet is malicious. Hence, they are vulnerable to DoS attacks. Congestion Control E. Congestion Control - Pushback is a router-based solution against bandwidth attacks, which employs the concept of aggregate-based congestion control to identify most of the malicious packets. - It uses the destination prefix as a congestion signature to distinguish and protect the legitimate traffic within the aggregate - It adds rate-limiting functionality to the routers to detect and drop suspicious packets -Pushback notifies the upstream routers to rate limiting packets destined to a victim order to let other legitimate traffic move - However, pushback cannot block effectively bad traffic under a DDoS attack that is uniformly distributed on inbound links It cannot distinguish between good and bad traffic going to the destination, and will drop them equally (Aggregate: Is a set of packets with a common feature) 19

Other Defense Approaches Traceback D-Ward NetBouncer Secure Overlay Services (SOS) Proof of Work Hop-Count Filtering Conclusions DDos attacks are very difficult to defend against but following the defensive measures mentioned will greatly reduce the chances of the network to be used as source or as the victim in a DDoS attack. Network engineers should be updated about the new attacking tools, and with the new defending techniques. They should always be in an alert situation A lot of money are spend daily in computer network security, and they will be spend in the future. Computer Network Security is a subject that will always keep be in the headline news. 20

References Analysis of Denial-of-Service Attacks on Denial-of-Service Defensive - Measures Bao-Tung Wang, Henning Schulzrinne Defending against Flooding-Based Distributed Denial-of-Service Attacks - Rocky K. C. Chang, The Hong Kong Polytechnic University On the Defense of the Distributed Denial of Service - Attacks: An On Off Feedback Control Approach Yong Xiong, SteveLiu, and PeterSun, Member, IEEE Protocol Scrubbing: Network Security Through Transparent Flow Modification David Watson, Matthew Smart, G. Robert Malan, Member, IEEE, and Farnam Jahanian, Member, IEEE What Is Computer Security? - Matt Bishop, bishop@cs.ucdavis.edu An Active Network-Based Intrusion Detection and Response Systems Han-Pang Hang and Chia Ming Chang Dos Attacks and Defense Mechanism: A Classification Christos Douligenis, Aikaterini Mitrokotsa Computer Network 4th Edition A.Tanenbaum Dr. Christos Panayiotou Lecture Notes http://www.cert.org http://www.cisco.com 21