Network attack and defense



Similar documents
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

CS 356 Lecture 16 Denial of Service. Spring 2013

Denial of Service Attacks

Seminar Computer Security

SECURING APACHE : DOS & DDOS ATTACKS - I

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

How To Stop A Ddos Attack On A Website From Being Successful

CS5008: Internet Computing

TLP WHITE. Denial of service attacks: what you need to know

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

DoS/DDoS Attacks and Protection on VoIP/UC

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

Security A to Z the most important terms

DDoS Attacks Can Take Down Your Online Services

Chapter 8 Security Pt 2

How To Protect A Dns Authority Server From A Flood Attack

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

co Characterizing and Tracing Packet Floods Using Cisco R

Robotics Core School 1

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Firewalls and Intrusion Detection

BotNets- Cyber Torrirism

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Denial of Service Attacks

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

DDoS Protection on the Security Gateway


COSC 472 Network Security

Acquia Cloud Edge Protect Powered by CloudFlare

Threat Events: Software Attacks (cont.)

surviving DDoS attacks

Stop DDoS Attacks in Minutes

CloudFlare advanced DDoS protection

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

TDC s perspective on DDoS threats

Distributed Denial of Service (DDoS) Attacks: The Big Threat in the War on Downtime

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Denial of Service (DoS)

Countering SYN Flood Denial-of-Service (DoS) Attacks. Ross Oliver Tech Mavens

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Denial of Service. Tom Chen SMU

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Firewall Firewall August, 2003

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Yahoo Attack. Is DDoS a Real Problem?

Firewalls & Intrusion Detection

Korea s experience of massive DDoS attacks from Botnet

The Anatomy of a Distributed Denial of Service Attack (DDoS) How Zombies Can Take Down Giants

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

DDoS Protection Technology White Paper

How To Protect Yourself From A Dos/Ddos Attack

Denial Of Service. Types of attacks

STATISTICS ON BOTNET-ASSISTED DDOS ATTACKS IN Q1 2015

Secure Software Programming and Vulnerability Analysis

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

Overview of computer and communications security

How Cisco IT Protects Against Distributed Denial of Service Attacks

How To Block A Ddos Attack On A Network With A Firewall

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Strategies to Protect Against Distributed Denial of Service (DD

Denial of Service (DoS) Technical Primer

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

DDoS Attacks & Mitigation

Attack and Defense Techniques

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Arbor s Solution for ISP

Current Threat Scenario and Recent Attack Trends

2010 Carnegie Mellon University. Malware and Malicious Traffic

CS Network Security: Botnets

Network Threats and Vulnerabilities. Ed Crowley

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

Stop DDoS Attacks in Minutes

Surviving DNS DDoS Attacks. Introducing self-protecting servers

Cloud-based DDoS Attacks and Defenses

A S B

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Detailed Description about course module wise:

DoS: Attack and Defense

A Very Incomplete Diagram of Network Attacks

Frequent Denial of Service Attacks

INTRODUCTION OF DDOS ALGORITHMS: A SURVEY. S.Nagarjun. Siddhant College of Engineering, Pune

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

Four Steps to Defeat a DDoS Attack

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

Transcription:

Network attack and defense CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan 1

Outline 1. Overview of attacks involving network 2. Bots and DoS 3. Firewalls 4. Logs and auditing logs 2

Specific network attacks Snooping/sniffing: passively reading packets bound for other machines IP spoofing: falsify source IP address so it appears to come from different computer Man-in-the-middle attacks and replay attacks Denial-of-service (DoS): saturation of 3

Common points of attack Web Server DNS Server Mail server (SMTP) Firewall itself; especially DOS Test/Development Systems 4

Who attacks and why The Challenge (So 1999) Fame (ditto) Industrial Espionage Profit, especially by organized crime Ideology: Hacktivism/Cyberterroism 5

DOS/DDoS DOS: Attack on availability Distributed Denial of Service (DDoS) attack is mounted from multiple platforms Successful attacks two pronged: 1. Attack the protection of computers 2. Used the compromised systems for DOS attacks on intended victim 6

Denial of Service Attacks in general Keep the system so busy that it does not have time to respond to legitimate requests Exhaust something: Network bandwidth System resources either at transport layer or in some application (e.g., web server) 7

For example Flooding attacks using the SYN start of TCP connection formerly very popular; still around. Floods the buffer that is used in the middle of the 3-way SY handshake Various attacks against DNS itself popular 8

2007: DNS Backbone There are 13 highest-level (above.com,.org, etc.) DNS root name servers. Some are in fact distributed. As of March 2007: 9

Attack: Feb 6, 2007 5 hour attack starting around 11 a.m. Central time by botnet allegedly traced to South Korea against all the root name servers. None crashed, but two suffered badly ; rest had heavy traffic. At height of attack; 94% of DNS queries answered as opposed to usual near 100% 10

Bots, botnets Bot (robot) or zombie or drone is program that secretly takes over another Internet-attached computer and uses it for no good Difficult to trace to bot s creator In botnet of hundreds to (often) 10,000+ to (sometimes) 1.5 million controlled by herder. 11

Botnets Got started in serious way around 2004; explosive growth since then Jan. 2008 estimate: 3.7 million instances per day of bot doing something no good Rental prices dropping; $1,000/day for 2,000 12

Botnet prognosis There's no economic incentive for [a smaller] ISP to sit on the phone for an hour and a half to help a customer get [his or her machine] disinfected. The cost of that is more than the subscription cost, said Stewart. That fact, coupled with the large percentage of computer users running Windows versions without up-to-date patches, creates an environment that's ripe for abuse. Is the Botnet Battle already Lost?, eweek.com, 13

That was optimistic view. On a typical day, 40% of the 800 million computers connected to the Internet are bots engaged in distributing e-mail spam, stealing sensitive data typed at banking and shopping websites, bombarding websites as part of extortionist denial-ofservice attacks, and spreading fresh infections Rick Wesson, CEO of Support Intelligence, quoted in USA Today, March 2008 14

Bot Uses DDoS Spamming Keylogging and packet sniffing Spreading new malware Installing adware for profit Click fraud; manipulating online polls 15

230 dead as storm batters Europ Botnet of the Year: Storm. Born Jan. 2007 Run for profit; 100% on Windows Sept. 2007 Info Week article claimed 2 million distinct computers sending spam per day; others: 0.15 50 million computers 16

What to do about DDoS attacks Protect machines against compromise! Turn off/refuse connections from attacking machines First have to identify the attacking machines 17

Identification of attacking machines Volume protects the attackers More machines in attack fewer packets per attacking machine suffice Really hard to distinguish low-level DOS attack from increase in business Impossible to prevent very large DDoS 18