AP Waseem Iqbal.  DoS is an attack on computer or network that reduces, restricts or prevents legitimate of its resources  In a DoS attack, attackers.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Availability Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Aspects of Computer.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Firewalls and Intrusion Detection Systems
Introduction to Security Computer Networks Computer Networks Term B10.
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Web server security Dr Jim Briggs WEBP security1.
Lecture 15 Denial of Service Attacks
DENIAL OF SERVICE ATTACK
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Evil DDos Attacks and Strong Defenses Group 6: Yisi Lu, YuanTong Lu, Hao Wu, YuChen Liu, Hua Li.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Introduction to Honeypot, Botnet, and Security Measurement
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
BotNet Detection Techniques By Shreyas Sali
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Final Introduction ---- Web Security, DDoS, others
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
NetTech Solutions Protecting the Computer Lesson 10.
DoS/DDoS attack and defense
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Role Of Network IDS in Network Perimeter Defense.
Information Systems Design and Development Security Risks Computing Science.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Denial-of-Service Attacks
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
DDoS Attacks on Financial Institutions Presentation
Instructor Materials Chapter 7 Network Security
Domain 4 – Communication and Network Security
Presentation transcript:

AP Waseem Iqbal

 DoS is an attack on computer or network that reduces, restricts or prevents legitimate of its resources  In a DoS attack, attackers flood victim system with non-legitimate service requests or traffic to overload its resources  The objective of the attacker is not to steal any information from the target; rather, it is to render its services useless  In the process, the attacker can compromise many computers (called zombies) and virtually control them. The attack involves deploying the zombie computers against a single machine to overwhelm it with requests and finally crash the target in the process.

 A distributed denial-of-service (DDoS) attack is a large-scale, coordinated attack on the availability of services on a target's system or network resources, launched indirectly through many compromised computers on the Internet  The services under attack are those of the ״ primary target," while the compromised systems used to launch the attack are often called the "secondary target.“ The use of secondary targets in performing a DDoS attack provides the attacker with the ability to wage a larger and more disruptive attack, while making it more difficult to track down the original attacker

 Unavailability of a particular website  Inability to access any website  Dramatic increase in the amount of spam s received  Unusually slow network performance

 Bandwidth Attacks  Service Request Floods  SYN Flooding attacks  ICMP Flood Attack  Peer-to-Peer attacks  Permanent DoS attack  Application level flood attacks

 A bandwidth attack floods a network with a large volume of malicious packets in order to overwhelm the network bandwidth  The aim of a bandwidth attack is to consume network bandwidth of the targeted network to such an extent that it starts dropping packets. The dropped packets may include legitimate users  A single machine cannot make enough requests to overwhelm network equipment; therefore, DDoS attacks were created where an attacker uses several computers to flood a victim.  All the bandwidth of the target network is used by the malicious computers and no bandwidth remains for legitimate use. Attackers use botnets and carry out DDoS attacks by flooding the network with ICMP ECHO packets.

 Service request floods work based on the connections per second principle  In this method or technique of a DoS attack, the servers are flooded with a high rate of connections from a valid source. In this attack, an attacker or group of zombies attempt to exhaust server resources by setting up and tearing down TCP connections.  This probably initiates a request on each connection, e.g., an attacker may use his or her zombie army to fetch the home page from a target web server repeatedly. The resulting load on the server makes it sluggish.

 A SYN attack is a simple form of DoS attack. In this attack, an attacker sends a series of SYN requests to target machine (victim). When a client wants to begin a TCP connection to the server, the client and the server exchange a series of messages as follows: ◦ The attacker sends a fake TCP SYN request to the target system (victim) ◦ The target machine sends back a SYN ACK in response to the request and waits for the ACK to complete the session setup ◦ The target machine never gets the response because the source’s address is fake

 Internet Control Message Protocol (ICMP) packets are used for locating network equipment and determining the number of hops to get from the source location to the destination  A DDoS ICMP flood attack occurs when zombies send large volumes of ICMP_ECHO packets to a victim system. These packets signal the victim's system to reply, and the combination of traffic saturates the bandwidth of the victim's network connection. The source IP address may be spoofed.  In this kind of attack the perpetrators send a large number of packets with fake source addresses to a target server in order to crash it and cause it to stop responding

 Unlike a botnet based attack, a peer to peer attack eliminates the need of attackers to communicate with clients.  In this attack the attacker instructs the clients of peer to peer file sharing hubs to disconnect from their network and connect to the victim’s website.  With this, several thousand computers may try to connect to the target website, which causes a drop in the performance of the target website.

 Phlashing ◦ Phlashing, refers to attacks that cause irreversible damage to system hardware. ◦ This attack damages the system and makes the hardware unusable for its original purpose until it is either replaced or reinstalled. A PDoS attack exploits security flaws. This allows remote administration on the management interfaces of the victim's hardware such as printers, routers, and other networking hardware

 Some DoS attacks target software and applications. The attacks that exploit the software cause confusion in the application, causing it to fill the disk space or consume all available memory or CPU cycles.  Application level flood attacks have become a conventional threat for doing business on the internet as web application security is more critical than ever.

 A botnet is a huge network of compromised systems. It can compromise huge numbers of machines without the intervention of machine owners. They consist of a set of compromised systems that are monitored for a specific command infrastructure  Botnets have the following purposes ◦ Allows the intruder to operate remotely ◦ Scans environment automatically, spreads through vulnerable areas, gaining access via weak passwords and other means ◦ Allow compromising a host’s machine through a variety of tools ◦ Create DoS attacks ◦ Enables spam attacks ◦ Enables online fraud and other illegal actvities

 Shark  Poison Ivy  Illusion Bot  NetBot Attacker  LOIC  DoSHHTP  Sprut: TCP DoS  PHP DoS  JaniDoS  Supernove  BanglaDoS  Mega DDoS Attack

 Most of the DDoS today are carried out by attack tools, botnets, and with the help of other malicious programs. These attack techniques employ various forms of attack packets to defeat defense systems. All these problems together lead to the requirement of defense systems featuring various detection methods to identify attacks.  The detection techniques for DoS attacks are based on identifying and discriminating the illegitimate traffic increases and flash events from legitimate packet traffic

 An activity profile can be obtained by monitoring header information of a network packet. An activity profile is defined as the average packet rate for network flow. It consists of consecutive packets with similar packet fields.  Monitoring all the protocol packets in isolation would be a gigantic task which can be avoided by clustering the individual flows exhibiting similar characteristics  Based on this concept, an attack is indicated by ◦ Increase in activity level among clusters ◦ Increase in overall number of distinct clusters

 Change point detection algorithms isolate a traffic statistic’s change caused by attacks  They initially filter the target traffic data by address, port, or protocol and store the resultant flow as a time series  To identify and localize a DoS attack, deviations in the actual versus expected local average in traffic is identified  It is also beneficial for identifying other network behaviours like scanning etc.

 Systems that are set up with limited security, also known as Honeypots, act as an enticement for the attacker  Serves as means for gaining information about attackers by storing a record of their activities and learning what type of attacks and software tools the attacker used  Diverting suspicious DoS traffic to honeypots is a good approach for identifying attack patterns  Tool: KFSensor

 DDoS attack traffic patterns can help the network administrators to develop new filtering techniques for preventing it from entering or leaving their networks  Analyze router, firewall, and IDS logs to identify the source o f the DoS traffic. Although attackers generally spoof their source addresses, an IP trace back with the help of intermediary ISPs and law enforcement agencies may enable to book the perpetrators  Traffic pattern analysis: Data can be analyzed ־ post-attack - to look for specific characteristics within the attacking traffic  Using these characteristics, data can be used for updating load-balancing and throttling countermeasures

 D-Guard  FortiDDoS  DDoS Defend  DoSArrest  Anti DDoS Guardian  WANGuard Sensor

 ZAP   HTTPRecon