Denial of Service. Tom Chen SMU tchen@engr.smu.edu



Similar documents
Firewalls and Intrusion Detection

Denial Of Service. Types of attacks

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Gaurav Gupta CMSC 681

Denial of Service (DoS)

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Distributed Denial of Service (DDoS)

Strategies to Protect Against Distributed Denial of Service (DD

Abstract. Introduction. Section I. What is Denial of Service Attack?

Denial of Service (DoS) Technical Primer

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Announcements. No question session this week

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

co Characterizing and Tracing Packet Floods Using Cisco R

Distributed Denial of Service Attack Tools

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Distributed Denial of Service

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Denial of Service Attacks: Classification and Response

Chapter 28 Denial of Service (DoS) Attack Prevention

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Seminar Computer Security

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers

Security Technology White Paper

Frequent Denial of Service Attacks

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Yahoo Attack. Is DDoS a Real Problem?

Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory

Denial of Service Attacks

A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

What is a DoS attack?

SECURING APACHE : DOS & DDOS ATTACKS - I

Network Security - DDoS

CS 356 Lecture 16 Denial of Service. Spring 2013

CS5008: Internet Computing

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Cloud-based DDoS Attacks and Defenses

Modern Denial of Service Protection

AN INFRASTRUCTURE TO DEFEND AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACK. Wan, Kwok Kin Kalman

Security: Attack and Defense

Secure Software Programming and Vulnerability Analysis

Denial of Service Attacks, What They are and How to Combat Them

Attack and Defense Techniques

Network Forensics (DDoS/Distributed Denial of Service Attack)

Stop that Big Hack Attack Protecting Your Network from Hackers.

Acquia Cloud Edge Protect Powered by CloudFlare

NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS

CloudFlare advanced DDoS protection

Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures

Queuing Algorithms Performance against Buffer Size and Attack Intensities

CHAPTER 1 DISTRIBUTED DENIAL OF SERVICE

Implementing Secure Converged Wide Area Networks (ISCW)

How To Protect Your Network From Attack From A Hacker On A University Server

2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks

DDoS Attack and Defense: Review of Some Traditional and Current Techniques

Chapter 8 Security Pt 2

Network Security Algorithms

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Large-Scale IP Traceback in High-Speed Internet

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

A S B

General Network Security

SECURITY FLAWS IN INTERNET VOTING SYSTEM

How To Defend Against A Distributed Denial Of Service Attack (Ddos)

Port Hopping for Resilient Networks

Networks: IP and TCP. Internet Protocol

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Safeguards Against Denial of Service Attacks for IP Phones

Firewalls. Ahmad Almulhem March 10, 2012

DoS and DDoS Attack Types and Preventions

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

Denial of Service Attacks

Understanding the Various Types of Denial of Service Attack By Raja Azrina Raja Othman

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Network Bandwidth Denial of Service (DoS)

Network Threats and Vulnerabilities. Ed Crowley

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Brocade NetIron Denial of Service Prevention

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Honeypots for Distributed Denial of Service Attacks

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

How To Stop A Ddos Attack On A Website From Being Successful

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Very Incomplete Diagram of Network Attacks

Lecture 6: Network Attacks II. Course Admin

A Seminar Report on Denial of Service Attack

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

SECURING APACHE : DOS & DDOS ATTACKS - II

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Transcription:

Denial of Service Tom Chen SMU tchen@engr.smu.edu

Outline Introduction Basics of DoS Distributed DoS (DDoS) Defenses Tracing Attacks TC/BUPT/8704 SMU Engineering p. 2

Introduction

What is DoS? 4 types of DoS attack Resource starvation disrupt a resource on a particular machine Example: consume CPU cycles, memory Bandwidth consumption block all network access by flooding traffic Usually distributed DoS (DDoS) used for flooding TC/BUPT/8704 SMU Engineering p. 4

What is DoS (cont) Programming flaws failure of application or operating system to handle exceptional conditions Example: very long data input Routing and DNS attacks Change routing tables or DNS caches TC/BUPT/8704 SMU Engineering p. 5

Recent Cases August 17, 1999 U. Minnesota campus network shut down by DoS attack February 7, 2000 DoS shut down Yahoo, ebay, Amazon, Buy.com, CNN, other Web sites October 21, 2002 DoS against Internet root name servers (up to 150,000 pings/ second) TC/BUPT/8704 SMU Engineering p. 6

Recent Cases (cont) January 2004 DDoS against SCO Web site SCO unpopular for lawsuits against Linux June 2004 DDoS against Akamai s servers TC/BUPT/8704 SMU Engineering p. 7

Recent Cases (cont) Jan. 2004 today: DDoS attacks against online gambling Web sites, to extort money Nov. 2003 British police arrested suspects in Latvia 20 July 2004 Russian and British police arrested extortion group in St Petersburg Believe many other groups worldwide TC/BUPT/8704 SMU Engineering p. 8

Goals and Motivations Unlike most security attacks, goal is not control of computers Goal is usually revenge or extortion, but any motives are possible DoS attacks get little respect from hackers (because too easy), but can be highly effective TC/BUPT/8704 SMU Engineering p. 9

Prevalence DoS attacks are common % Organizations effected by DoS attacks 31% 27% 36% 40% 42% 1999 2000 2001 2002 2003 *2003 CSI/FBI Computer Crime and Security Survey TC/BUPT/8704 SMU Engineering p. 10

Damage Costs DoS is costly to organizations (second behind theft of proprietary info.) Average loss per organization due to DoS attacks $108K $122K $297K $1.4M 2000 2001 2002 2003 *2003 CSI/FBI Computer Crime and Security Survey TC/BUPT/8704 SMU Engineering p. 11

Basics of DoS

Direct Attacks Land Land attack: IP packet with source address same as destination address Target Windows NT before Service Pack 4 Causes machine to loop, consuming CPU cycles TC/BUPT/8704 SMU Engineering p. 13

Direct Attacks Teardrop Teardrop attack: overlapping IP fragments Target old Linux systems, Windows NT/95 Some systems cannot reassemble overlapping IP fragments properly could cause system to reboot or crash TC/BUPT/8704 SMU Engineering p. 14

Direct Attacks Ping of Death Ping of death attack: ICMP ping message longer than 65,536 bytes Target early versions of various operating systems Some systems could crash or freeze TC/BUPT/8704 SMU Engineering p. 15

Direct Attacks SYN Flood SYN flood attack: many TCP SYN requests but no SYN/ACKs Target any system Target starts to open many TCP (halfopen) connections Number of halfopen connections is limited then machine cannot open any real connections TC/BUPT/8704 SMU Engineering p. 16

SYN Flood (cont) TCP SYN SYN/ACK TCP SYN SYN/ACK Target keeps halfopen connections, waiting for SYN/ACK to complete connections TC/BUPT/8704 SMU Engineering p. 17

Indirect Attacks Smurf Smurf attack: ICMP echo request (ping) with fake source IP address to IP broadcast address Fake source address is target Computers must return ICMP echo replies Works with any systems TC/BUPT/8704 SMU Engineering p. 18

Smurf (Reflector) Attack Ping with forged source address to IP broadcast address LAN Each host sends ping reply to forged address (target) Target TC/BUPT/8704 SMU Engineering p. 19

Smurf (cont) One packet is amplified (multiplied) into many Attacker s address is not seen Many innocent machines are used for attack Some LANs restrict or disable broadcast address TC/BUPT/8704 SMU Engineering p. 20

Distributed DoS (DDoS)

Trend to DDoS Nov. 1999 CERT workshop report warned that new distributed DoS tools will make DDoS attacks easier and more common 7 Feb. 2000 DDoS attacks took down Yahoo, e*trade, ebay, Buy.com, CNN.com for several hours DDoS attacks are now common TC/BUPT/8704 SMU Engineering p. 22

What is DDoS? 2phase attack Stealthy preparation: many computers (often home PCs with broadband) are infected with DoS agent (Trojan horse) Attack: computers are instructed to flood traffic to target TC/BUPT/8704 SMU Engineering p. 23

DDoS network Attacker Some hosts are set up as masters, wait for commands from attacker Flood Many daemons wait for commands from masters Target TC/BUPT/8704 SMU Engineering p. 24

DDoS Concerns Automated DDoS tools easy to find DDoS attack can be launched with single instruction Attacker is not directly involved during attack hard to trace Many innocent computers are compromised (maybe 10,000100,000) TC/BUPT/8704 SMU Engineering p. 25

DDoS Tools Trin00 TFN TFN2K Stacheldraht Worms: Code Red, Nimda, Lion, TC/BUPT/8704 SMU Engineering p. 26

Trin00 Trin00 was used in August 1999 DDoS attack on U. of Minnessota Attacker steals an account to use Takes over Solaris and Linux systems with buffer overflow attack A few are chosen as masters The others are chosen as daemons TC/BUPT/8704 SMU Engineering p. 27

Trin00 network Telnet to TCP port 27665 Attacker UDP ports 27444 and 31335 Masters Daemons TC/BUPT/8704 SMU Engineering p. 28

Trin00 (cont) Masters understand various commands: Start/stop DoS an IP address Set attack time/duration Ping daemons Disable daemons List daemons TC/BUPT/8704 SMU Engineering p. 29

Trin00 (cont) Daemons understand commands: DoS an IP address Set attack time/duration Ping request Shut down DoS attack is UDP flood to random ports TC/BUPT/8704 SMU Engineering p. 30

TFN (Tribe Flood Network) Similar to Trin00 with more capabilities: More ways for attacker to communicate with masters ICMP is used between masters and daemons, instead of TCP, because network monitoring tools sometimes do not look into ICMP data field TC/BUPT/8704 SMU Engineering p. 31

TFN (cont) More types of attacks: UDP flood ICMP echo request flood SYN flood Smurf attack TC/BUPT/8704 SMU Engineering p. 32

TFN2K (TFN 2000) More capabilities added to TFN: Randomly chooses TCP, UDP, or ICMP for messages More difficult to track TFN2K traffic All traffic is one way (attacker to masters, masters to daemons) Daemons never transmit, not even acknowledgements harder to detect TC/BUPT/8704 SMU Engineering p. 33

TFN2K (cont) Masters transmit commands 20 times, hoping daemons will receive at least once Random decoy messages are sent to confuse any network monitoring Messages are encrypted for privacy Teardrop and Land attacks are added TC/BUPT/8704 SMU Engineering p. 34

Stacheldraht Stacheldraht (German for barbed wire ) based on TFN with added features Attacker uses encrypted telnetlike connection to send commands to masters Daemons can upgrade on demand by download new program code TC/BUPT/8704 SMU Engineering p. 35

Defenses

Defenses in General DoS attacks use various methods, so different defenses are needed Land, Teardrop, and ping of death have been fixed in current operating systems Current operating systems can detect SYN floods and implement protection Directed broadcasts are now usually disabled to protect against Smurf attacks TC/BUPT/8704 SMU Engineering p. 37

Defenses in General (cont) Defenses against DDoS attacks is most difficult Prevention: specialized tools are available to detect known DDoS tools, but new DDoS tools may be undetectable During attack: firewalls and routers can filter, block, and slow down attack traffic During and after attack: various ideas proposed for IP traceback TC/BUPT/8704 SMU Engineering p. 38

Proposed Pushback Scheme Backpressure: DDoS traffic Messages to rate limit or drop packets going to target Congested router Target TC/BUPT/8704 SMU Engineering p. 39

Tracing Attacks

Problem and Difficulties IP traceback: to find the real source of DDoS attack when packets are spoofed Difficulties Internet not designed for traceback (routers are stateless) DDoS networks have multiple layers attacking daemons are innocent victims, not real attacker TC/BUPT/8704 SMU Engineering p. 41

Current Traceback Today traceback is completely manual too slow and complicated Log into router A, find traffic coming from router B, log into router B, and so on Find C Find B Find A Router C Router B Router A Target TC/BUPT/8704 SMU Engineering p. 42

Traceback Proposals Routers record information about forwarded packets for later inquiry Routers add information to forwarded packets (packet marking) Routers send information about forwarded packets via another channel (e.g., ICMP) TC/BUPT/8704 SMU Engineering p. 43

MCI DosTrack Automates the manual backtrack process with Perl scripts at routers Perl scripts find upstream interface at each router for packets going to target Find C Find B Find A Perl Perl Perl Router C Router B Router A Target TC/BUPT/8704 SMU Engineering p. 44

CenterTrack DosTrack retraces route hop by hop could take long time CenterTrack proposes overlay network of IP tunnels to reroute traffic through special tracking routers Tracking routers can retrace more quickly to find edge router near source TC/BUPT/8704 SMU Engineering p. 45

CenterTrack Attack traffic is rerouted via tunnels Tracking router Source Target TC/BUPT/8704 SMU Engineering p. 46

CenterTrack Only 2 hops Tracking router Traceback Traceback Source Target TC/BUPT/8704 SMU Engineering p. 47

ICMP Traceback Proposal for IETF Each router chooses a packet randomly, e.g., 1 in 20,000 Generates special ICMP traceback packet to follow chosen packet to same destination ICMP traceback packet carries IP address of router TC/BUPT/8704 SMU Engineering p. 48

ICMP Traceback (cont) ICMP traceback packet identifies router C Random packet Router C Router B Router A Target TC/BUPT/8704 SMU Engineering p. 49

Target discovers a few routers initially Target Routers discovered on attack paths TC/BUPT/8704 SMU Engineering p. 50

More routers discovered Target Routers discovered on attack paths TC/BUPT/8704 SMU Engineering p. 51

ICMP Traceback (cont) With enough ICMP traceback packets, DDoS target can accumulate info. about routes taken by attack Drawbacks: Extra traffic created May be hard to infer routes works best for small number of sources ICMP packets may be blocked by firewalls TC/BUPT/8704 SMU Engineering p. 52

Hashbased Traceback Routers keep a small record of recent packets using a hash function Hash: mathematical thumbprint of packet, virtually unique for every packet To trace back, routers ask their neighbors about a packet s hash Packet can be traced hop by hop TC/BUPT/8704 SMU Engineering p. 53

Hashbased Traceback Packet Hash function H Hash Packet leaves hash H at each router H Router C H Router B H Router A Target TC/BUPT/8704 SMU Engineering p. 54

Hashbased Traceback Find hash Find hash Find hash H H H Router Router Router C B A Target TC/BUPT/8704 SMU Engineering p. 55

Hashbased Traceback No extra traffic Disadvantages: Only most recent packets are remembered Traceback must be soon after an attack Tracing is hop by hop can take long time for long routes Computation burden (hash) for every packet TC/BUPT/8704 SMU Engineering p. 56

Packet Marking Advantages: No extra traffic No state info. for routers No need to interrogate routers Challenge: Mark packets with enough info. to identify route without changing IP header format TC/BUPT/8704 SMU Engineering p. 57

Packet Marking (cont) Packet marking can be Deterministic (all packets) Random (subset of packets) TC/BUPT/8704 SMU Engineering p. 58

Deterministic Packet Marking Each packet is marked upon entry into network to identify source router Proposed to use 16bit identification field for mark, but router IP address is 32 bits Identification field is used for fragmentation, but fragmentation occurs less than 1 percent traffic Need 2 packets to carry router s address TC/BUPT/8704 SMU Engineering p. 59

Deterministic Packet Marking C s IP address half half ID field Source router C Router B Router A Target C s IP address TC/BUPT/8704 SMU Engineering p. 60

Deterministic Packet Marking Computation cost for every packet Lost packets can cause errors in traceback (need 2 packets to reconstruct source router s IP address) TC/BUPT/8704 SMU Engineering p. 61

Probabilistic Packet Marking PPM proposed by U. Washington Routers choose packets randomly for marking with some low probability, e.g., 1/25 Marked packets are random subset of total traffic TC/BUPT/8704 SMU Engineering p. 62

PPM (cont) Instead of router address, proposed mark is an edge (route segment) Edge = <address of first marking router, address of second marking router, distance between the two routers> Edge makes easier to infer entire route than single router address TC/BUPT/8704 SMU Engineering p. 63

PPM Mark = <C s address, A s address, distance 2> C s IP address A s IP address Add to mark Add to mark Router C Router B Router A Target TC/BUPT/8704 SMU Engineering p. 64

PPM (cont) Mark is put into Identification field in IP header 16bit ID field is too short to carry entire mark Mark is divided into parts, spread over 8 packets With enough packets, entire mark can be recovered at destination TC/BUPT/8704 SMU Engineering p. 65

Target discovers a few edges initially Target Edges discovered on attack paths TC/BUPT/8704 SMU Engineering p. 66

Target discovers more edges Target Edges discovered on attack paths TC/BUPT/8704 SMU Engineering p. 67

Small chance that marks will be reconstructed incorrectly (false positives) Target Edges discovered on attack paths False positives TC/BUPT/8704 SMU Engineering p. 68

PPM (cont) We have proposed a random packet marking scheme Router chooses packets at random Mark is a random number, added between packet header and payload Limited to single ISP mark must be removed before packet leaves ISP Router sends number to network manager TC/BUPT/8704 SMU Engineering p. 69

PPM (cont) Network manager Random number N Router C Router B Router A Target TC/BUPT/8704 SMU Engineering p. 70

PPM (cont) Also send number to network manager N Network manager Ask where packet mark N came from N Router C Router B Router A Target TC/BUPT/8704 SMU Engineering p. 71

Conclusions IP traceback for DDoS is an active research area Traceback is also useful to find real sources of other types of attacks Researchers are studying various approaches, e.g., packet marking TC/BUPT/8704 SMU Engineering p. 72