Xenia Mountrouidou (Dr. X)

Slides:



Advertisements
Similar presentations
REFLEX INTRUSION PREVENTION SYSTEM.. OVERVIEW The Reflex Interceptor appliance is an enterprise- level Network Intrusion Prevention System. It is designed.
Advertisements

Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Network Attacks Mark Shtern.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Introduction to Security Computer Networks Computer Networks Term B10.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Lecture 15 Denial of Service Attacks
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DNS POISONING + CENSORSHIP LAB DUSTIN VANDENBERG, VIPUL AGARWAL, LIANG ZHAO.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
DNS POISONING + CENSORSHIP LAB DUSTIN VANDENBERG, VIPUL AGARWAL, LIANG ZHAO 1.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Team Member: Xinjie Guan, University of Missouri Kansas City; Xili Wan, University of Missouri Kansas City; Ruiling Gao, Tufts University; Date: June 2,
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Sponsored by the National Science Foundation Lab Zero: A First Experiment using GENI Sarah Edwards, GENI Project Office.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Sponsored by the National Science Foundation Lab Zero: A First Experiment using GENI.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
DoS/DDoS attack and defense
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denial-of-Service Attacks
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Denial of Service detection and mitigation on GENI
An Introduction To ARP Spoofing & Other Attacks
GENI, Pen Testing, & other stories
Denial of Service detection and mitigation on GENI
Cybersecurity + Liberal Arts Workshop
GENI, Cybersecurity, and Liberal Arts
Intrusion Detection Systems
DDoS Attacks on Financial Institutions Presentation
Footprinting (definition 1)
Domain 4 – Communication and Network Security
Outline Basics of network security Definitions Sample attacks
Defending Against DDoS
CONTRA Camouflage of Network Traffic to Resist Attack (Intrusion Tolerance Using Masking, Redundancy and Dispersion) DARPA OASIS PI Meeting – Hilton Head.
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Network Security: DoS Attacks, Smurf Attack, & Worms
Lab 2: TCP IP Attacks ( Indirect)
Defending Against DDoS
Intro to Denial of Serice Attacks
Outline Basics of network security Definitions Sample attacks
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Net 412 (Practical Part) Networks and Communication Department LAB 1.
IP Spoofing Sometimes on the internet, a girl named Alice is really a man named Yves.
Intro Cyber Security Labs on GENI
COVERT STORAGE CHANNEL MODULE
DDoS Attack and Its Defense
Outline Basics of network security Definitions Sample attacks
COVERT STORAGE CHANNEL MODULE
Intrusion Detection Systems
Intro Cyber Security Labs on GENI
Presentation transcript:

Xenia Mountrouidou (Dr. X) Denial of Service Xenia Mountrouidou (Dr. X)

Outline Start reserving your topology Learning Goals Audience Background Variations

Reserve topology Go to: https://goo.gl/OuDw8M Use RSpec http://mountrouidoux.people.cofc.edu/Cyb erPaths/files/DoS_RSpec.txt Normally this file should be saved with .xml extension Let’s look into an RSpec Change Clemson to some other aggregate

Learning Goals Apply IT components knowledge Produce network traffic Hypothesize about effects of network attack Create and analyze a network attack Use Wireshark, GENI

Audience Freshmen, Sophomores Non-CS and CS majors Some background work is needed

Background IT Components Computer Networks Command Line GENI DoS OVS

IT Components Have the students research: what is a workstation, what is a server, switch, router etc. Kahoot quiz on IT Components

Computer Networks Khan Academy Internet 101 Sans Cyber Aces Tutorials on Networking … and of course a Kahoot quiz

GENI & Command line GENI Command line class from code academy GENI map Simulation vs Emulation Programmable network Command line class from code academy In class demonstration and application of command line: navigating through folders, edit, copy, move.

What is Denial of Service? A computer network attack that is designed to deplete resources and prevent legitimate users from accessing a site Can target small and large businesses Traffic flood, large payloads sent slowly, amplification attack Resources: Memory CPU Bandwidth

Digital attack map

Computer Network Attacks Passive: Scanning, Reconnaissance Active: Distributed Denial of Service Spoofing Man in the middle

Denial of Service Lab for non-CS Majors Pre-installed topology ping - verification Iperf - performance Hping3 - DoS Hypothesis testing Experiments on GENI GENI: Virtual laboratory for networking and distributed systems research and education

DDoS TCP SYN Flood Insights: Traffic pattern Spoofed IPs Send Spoofed SYN Send SYN-ACK Resend SYN-ACK Attacker Server Spoofed Client Insights: Traffic pattern Spoofed IPs

Simulating Denial of Service Real machines Small network Attack traffic Regular internet traffic You control all these!

Variations GENI Desktop More than one attackers Analyze packets, find SYN

Questions? Let’s experiment!

Useful source: FYE Security 101 site: http://mountrouidoux.people.cofc.edu/fye_cysec/index.html