Attack and Defense Techniques



Similar documents
How To Understand A Network Attack

Attack and Defense Techniques 2

Denial of Service Attacks

CS 356 Lecture 16 Denial of Service. Spring 2013

CS5008: Internet Computing

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

A Very Incomplete Diagram of Network Attacks

A S B

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

CIT 380: Securing Computer Systems

Security: Attack and Defense

Denial of Service. Tom Chen SMU

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Network and Services Discovery

Chapter 8 Security Pt 2

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SECURING APACHE : DOS & DDOS ATTACKS - I

Acquia Cloud Edge Protect Powered by CloudFlare

Abstract. Introduction. Section I. What is Denial of Service Attack?

Content Distribution Networks (CDN)

CloudFlare advanced DDoS protection

Computer forensics

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

General Network Security

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Network Security CS 192

CSCE 465 Computer & Network Security

Stop that Big Hack Attack Protecting Your Network from Hackers.

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

DoS/DDoS Attacks and Protection on VoIP/UC

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Seminar Computer Security

Linux Network Security

Introduction of Intrusion Detection Systems

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Security of IPv6 and DNSSEC for penetration testers

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Learn Ethical Hacking, Become a Pentester

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Host Fingerprinting and Firewalking With hping

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

co Characterizing and Tracing Packet Floods Using Cisco R

Survey on DDoS Attack in Cloud Environment

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Network Threats and Vulnerabilities. Ed Crowley

Firewalls and Intrusion Detection

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Brocade NetIron Denial of Service Prevention

Application DDoS Mitigation

Firewalls. Pehr Söderman KTH-CSC

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

How To Protect A Dns Authority Server From A Flood Attack

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Survey on DDoS Attack Detection and Prevention in Cloud

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

Attacks and Defense. Phase 1: Reconnaissance


About Firewall Protection

1.0 Introduction. 2.0 Data Gathering

2010 Carnegie Mellon University. Malware and Malicious Traffic

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

Payment Card Industry (PCI) Executive Report. Pukka Software

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

Huawei Traffic Cleaning Solution

Yahoo Attack. Is DDoS a Real Problem?

Network Security Fundamentals

Network Security: Attacks and Defenses

Host Discovery with nmap

Lecture 5: Network Attacks I. Course Admin

IxLoad-Attack: Network Security Testing

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

AntiDDoS1000 DDoS Protection Systems

Firewalls, IDS and IPS

SysSec 7 Network Security. Aurélien Francillon

DDoS Vulnerability Analysis of Bittorrent Protocol

Outline. Outline. Outline

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

How to launch and defend against a DDoS

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

PROFESSIONAL SECURITY SYSTEMS

What is a DoS attack?

Denial of Service Attacks

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

Announcements. No question session this week

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Denial of Service (DoS) Technical Primer

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Remote Network Analysis

Transcription:

Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands

Attack Taxonomy Many different kind of attacks Possible classifications: Attack type (scan, denial of service,...) Attack target (a service, a network, a user,...) Attack goal (crash the target, steal information, modify information,...)...

Scans

Port Scans Scans are information gathering attacks: Find vulnerable services/hosts Discover network topology (used IP addresses, ) System fingerprinting Can be combined with a real attack, e.g., a buffer overflow (Ping Of Death, 1997) Tool for scanning: nmap

TCP port scan: regular connection Attacker SYN Target ACK + Easy to implement Slow SYN/ACK RST accept connection deny connection ignore, block

TCP port scan: SYN scan Attacker SYN Target RST SYN/ACK RST accept connection deny connection + Fast Do-it-your-self ignore, block

UDP port scan UDP is connectionless Two approaches: 1. Wait for negative answer (ICMP message port unreachable ) 2. Wait for positive answer Example: send DNS query to port 53 and wait for DNS response

Types kazaa imaps 1280 1024 768 Vertical scan block scan smb http smtp ftp 512 Horizontal scan 256 1 1.1.1.1 130.89.1.1 130.89.1.255 130.89.2.1

SSH attacker

How to hide The target system knows your IP address Slow scan Distributed scan: multiple, coordinated scanners Indirect scan: idle scan (1998),......

Idle scan Attacker SYN Spoofed IP address ask Target Zombie SYN/ACK How to ask the zombie? Fragment ID field in IP header

Idle scan Attacker SYN Spoofed IP address SYN/ACK RST ID=12345 RST ID=12347 SYN/ACK Target Zombie RST ID=12346

Denial of Service Attacks

Denial-Of-Service (DoS) Goal: overload or crash the server to make the service unavailable Types Brute-force: Send a lot of data (overload network), a lot of queries (overload server CPU), Semantic: Exploit vulnerability (buffer overflow, ) Send heavy requests (triggering complex operations)

DoS against DNS server Overload DNS server with queries Problems: Attacker may be too slow (CPU, network bandwidth,...) Defense: blocking the attacker's IP address is easy

Distributed DoS (DDoS) Coordinated attack from multiple hosts Attacker 1 Attacker 2 DNS server Attacker 3

DDoS against IRC Server ~375 Million SYN packets in 800s

DDoS against IRC Server Attacks can have side effects on your monitoring/defense infrastructure Here: data loss at mirror port and at collector

On Large Scale: Backscatter Analysis with a Network Telescope (Source: Inferring Internet Denial-of-Service Activity, Moore et al., 2001)

Backscatter Analysis for DoS attacks In Moore, 2001, a /8 network was monitored ~24.5 DoS attacks per hour Assuming uniformly distributed spoofed source addresses, this would correspond to 24.5 232 224 = 6272 attacks/h

DNS

Simple DNS Query host query: www.utwente.nl response: 130.89.1.50 (A record) DNS server (UDP port 53)

Recursive DNS Query host www.utwente.nl? response: 130.89.1.50 DNS server X response: 130.89.1.50 www.utwente.nl? DNS server ns1.utwente.nl (authoritative)

DNS Response Cache host www.utwente.nl? response: 130.89.1.50 DNS server X response: 130.89.1.50 Cache: www.utwente.nl = 130.89.1.50 www.utwente.nl? DNS server UT (authoritative)

Cache Poisoning (Variant 1) Goal: compromise the DNS information Based on: 1. Feature: DNS clients and servers cache responses 2. Feature: DNS responses can contain additional entries 3. Bug: some DNS server implementations don't validate the authority of a responder

Cache Poisoning (Variant 1) Attacker www.hacker.com? response: 1.2.3.4 DNS server X Cache: www.utwente.nl = 5.6.7.8 response: 1.2.3.4 additional section: www.utwente.nl=5.6.7.8 www.hacker.com? DNS server hacker.com

Cache Poisoning (Variant 1) host www.utwente.nl? response: 5.6.7.8 DNS server X Cache: www.utwente.nl = 5.6.7.8 also possible for entire domains: modify the cache entry for the nameserver of an another domain

Cache Poisoning (Variant 2) host www.utwente.nl? response: 5.6.7.8 response: 5.6.7.8 with spoofed IP address attacker DNS server X response: 130.89.1.50 Cache: www.utwente.nl = 5.6.7.8 www.utwente.nl? DNS server UT (authoritative)

Cache Poisoning (Variant 2) Not so easy! DNS uses query IDs: queries and responses carry a random ID response ID must match query ID Attacker has to guess query ID brute-force: send thousands of responses with different IDs predict ID: some DNS servers use(d) flawed RNG to generate next ID

Cache Poisoning (Variant 2) Brute-force attacks work! Some DNS servers always use the same source port to query other servers Solution: randomize the source port, too (July 2008) Attacker has to guess ID and source port

Reflected DoS Attack Attacker query with spoofed source IP address DNS server response Target Amplification! usually as distributed attack: multiple attackers, multiple DNS servers (DDos)

Amplification Initial DNS definition: 60 bytes query 512 bytes answer (8.5x) EDNS (RFC 2671) allows larger answers Combining different response types: answers larger than 4000 bytes possible (>60x) In 2006, Vaughn&Garon studied DDoS attacks with up to 140,000 DNS servers, resulting in 10Gbps

DNS tunneling You sit at the airport WLAN provided, but any access to a Web server, FTP, P2P, is chargeable Is there a way to avoid the fee? Would it be an attack? You are bypassing the billing/security policy of your ISP Data exfiltration for cyber-espionage

DNS tunneling: upstream host helloworld.mydomain.nl? DNS server of ISP helloworld.mydomain.nl? DNS server mydomain.nl

DNS tunneling: upstream Query can contain up to 252 characters Character set restricted: not case-sensitive,... ~5 bit/character, ~110 bytes

DNS tunneling: downstream helloworld.mydomain.nl? host DNS server X response: hi! response: hi! helloworld.mydomain.nl? DNS server mydomain.nl

DNS tunneling: downstream Main limitation: Response < 512 bytes to prevent fragmentation Server responds with TXT-record: Character set restricted: 7 bit ASCII ~6 bit/character, ~220 bytes As for amplification, EDNS (RFC 2671) allows larger answers Using MX-records and A-records is possible, too, but more complicated (data may be reordered)

Example of DNS Tunneling (Iodine) 1329812676.512747 IP 192.168.1.2.60531 > 192.168.1.1.3128: Flags [S] 1329812676.515310 IP 1.1.1.1.51823 > 2.2.2.2.53: 22911+ [1au] NULL? 0eaba82M-J2hbM->M-nYM-VwjM-GM-MRbM-^M-^PM-\M- UM-HcvM-DtimMeM-`M-KyM-aM-VM-IM-yM-yM-BM-jdilmnuM-iM-bM-ktaM-^XyUwtf.M- BM-^M-o8M-]M-=M-xM-=M-FouZzM-JwaeM-NaM-u 1329812676.524541 IP 192.168.1.1.3128 > 192.168.1.2.60531: Flags [S.] 1329812676.525743 IP 2.2.2.2.53 > 1.1.1.1.51823: 15184 1/0/1 NULL (140)M-N.test.domain.nl. (130) 1329812676.524573 IP 192.168.1.2.60531 > 192.168.1.1.3128: Flags [.] 1329812676.525189 IP 192.168.1.2.60531 > 192.168.1.1.3128: Flags [P.], (request web page) 1329812676.526742 IP 1.1.1.1.51823 > 2.2.2.2.53: 30638+ [1au] NULL? 0ibbb82M-J2hbM->M-nYM-VgjM-GM-MBbM-^M-^PM-\M-TM- XcvM-DtimMeM-`M-KyM-aM-VM-IM-yM-yM-CDYM-eM-X3qWgM-JM-SM-qSM-?M->M-bYyCU.xpM-_M-VM-`M-HEM-LJM->M-nf6upM-{M- >.test.domain.nl. (126) 1329812676.557242 IP 2.2.2.2.53 > 1.1.1.1.51823: 22911 1/0/1 NULL (144) 1329812676.558096 IP 1.1.1.1.51823 > 2.2.2.2.53: 38365+ [1au] NULL? 0mbbc82M-J2hbM->M-nYM-VhdM-yEM-rdM-?M->M-q5MM- tcvm-dtimm-em-`m-kym-am-vm-im-ym-ym-cdym-em-x3qwmm- JM-SM-CM-CM-DdbM->M-bM-p4.CM-=wM-icOM-x4oM-YM-kM-gM- SiHM-OM-guM-JcPM-<M-=rM-K0M-rf8M-cM-=M-XPgM-@M-HM-RM- \5FM-SM-uM-yM-CM-PM->GM-]M-hiM-?M-wQM-KFM-HM.0M-wM- zm-_um-zm-mwm-rm-c6m-?m-ppwm-trpm-rm-fwyum-\qm- FGtM-NBM-sgM-<huuTNl6NQ1FM-KvSkWM-H9ESaIM-AX.M-OHM- OM-bYM-wM-PM-C3MM-MM-dM-HAM-\3rM-bM-LMM-QfM-^ALM- UM-g18UhM-]CQaM-K6M-lM-mlM-IM-`M-naIDM-NM-cM- >.test.domain.nl. (274)