A Real and Rising Concern

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Computer Security and Penetration Testing
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Lecture 15 Denial of Service Attacks
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
--Harish Reddy Vemula Distributed Denial of Service.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
CSE715 Presentation Project Fall 2004 by Michael Alexandrou and Rusty Coleman.
Inferring Denial of Service Attacks David Moore, Geoffrey Volker and Stefan Savage Presented by Rafail Tsirbas 4/1/20151.
DoS/DDoS attack and defense
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
KEYNOTE OF THE FUTURE 3: DAVID BECKETT CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
AP Waseem Iqbal.  DoS is an attack on computer or network that reduces, restricts or prevents legitimate of its resources  In a DoS attack, attackers.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Presentation on ip spoofing BY
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Common System Exploits Tom Chothia Computer Security, Lecture 17.
An Introduction To ARP Spoofing & Other Attacks
Introduction to Information Security
DDoS Attacks on Financial Institutions Presentation
Instructor Materials Chapter 7 Network Security
DDoS.
Distributed Denial of Service Attacks
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Distributed Denial of Service (DDoS) Attacks
Sub-Saturating DDoS Attacks The Silent Bandwidth Thief
BINF 711 Amr El Mougy Sherif Ismail
Introduction to Networking
Who should be responsible for risks to basic Internet infrastructure?
Network Security: DoS Attacks, Smurf Attack, & Worms
CS4622 Team 4 Worms, DoS, and Smurf Attacks
CS 2550 Foundations of Cybersecurity
Defending Against DDoS
Intro to Denial of Serice Attacks
Distributed Denial of Service Attacks
Red Team Exercise Part 3 Week 4
DDoS Attack and Its Defense
Marcial Quinones-Cardona
Distributed Denial of Service Attacks
Hosted Security.
Distributed Denial of Service (DDoS) Attacks
Cybersecurity Simplified: Phishing
Presentation transcript:

A Real and Rising Concern DDoS Attacks Sean Dunn ICS H197 November 19, 2014

Distributed Denial of Service - DDoS A DoS (Denial of Service) attack is a method by which malicious hackers prevent legitimate users from accessing a computer resource by overwhelming that resource with network requests DDoS (Distributed Denial of Service) attacks use arrays of remote or “zombie” computer systems for the same purpose

The Weapon of Choice DDoS attacks are growing in popularity Any company that uses the Internet is at risk Every DDoS success inspires more attacks 2014 DDoS Attacks & Impact Report - Neustar 2014 DDoS Attacks & Impact Report - Neustar

Why Choose DDoS? Distribution makes the attack difficult to isolate Harder to stop the attack without cutting all users out More points of attack allows each to be less conspicuous Fairly easy to implement Attackers can use cookie cutter versions of proven attacks (LOIC) Easier than creating a tailored virus/worm Can provide a “smokescreen” Distracts the victim, leaving the system vulnerable to other virus injections Prevention of all DDoS attacks is expensive and infeasible

Traditional DoS Attacks Internet Control Message Protocol (ICMP) Flood -  ICMP echo request (ping) packets, large ICMP packets, and other ICMP types UDP Flood - resource starvation caused by UDP packets overwhelming the TCP packets in a network SYN Flood - The attacker does not reply to the server with the expected ACK. To do this, the attacker can spoof the source IP address or simply not reply to the SYN-ACK

Modern DDoS Attacks DNS Reflection Zero-Day Encrypted SSL

DNS Reflection Made possible by open DNS resolvers The attacker uses a distributed system to request large DNS zone files Source IP address spoofed as the intended victim DNS zone files are ~100x the size of their requests Attackers can send attacks many times the size of their bandwidth

Zero-Day “One-packet-killers” These attacks make use of a known vulnerability in a network With lower-level workarounds such as firmware bugs, DDoS attacks become extremely stealthy

Encrypted SSL This attack consumes more CPU resources during the encryption and decryption process The impact on the victim’s system is amplified Many DDoS mitigation techniques do not account for this type of attack A large number of these attacks cannot be scrubbed

Fighting Back Preparation Identification Reaction Acquire tools and train a response team Identification Classify the type of attack Identify the appropriate tool to halt the attack Reaction Trace back the attack to better grasp how the network is affected Deploy your tools Assess the entire attack to better tailor your preparations for next time

DDoS Mitigation The most popular mitigation technique is DDoS scrubbing Scrubbing is done by passing network traffic through high- bandwidth networks with traffic filters The filters examine attributes such as: IP addresses Cookie variation HTTP headers Javascript footprints

Enough theory, what happens in the real world?

Infamous DDoS Attacks MafiaBoy, 2000 – 15 year old student launches DDoS against Yahoo, Ebay, CNN, Amazon, and Dell Estonia, 2007 – A slew of Estonian websites (many governmental) is DDoSed SpamHaus, 2013 – Non-profit anti-spam organization

MafiaBoy February, 2000 – Michael Demon Calce (aka MafiaBoy) runs a homemade script meant to take down high-profile networks The websites of Yahoo, Ebay, CNN, Amazon, and Dell were all hit within a week Calce launched his DDoS software from over 50 networks worldwide – many owned by universities Done in the spirit of “hacking” and to build reputation

Estonia Cyberattacks April, 2007 - Many websites of Estonian organizations (banks, ministries, newspapers, etc.) brought offline The attacks ranged from ping floods to sophisticated botnets A leader in the pro-Kremlin youth movement took credit for organizing the attacks – which had political motives Experts believe the attacks had the blessing and help of Russian authorities

SpamHaus Directly or indirectly responsible for filtering up to 80% of daily spam messages March 19, 2013 – SpamHaus servers hit with a DNS Reflection Attack Incoming traffic between 20-100 Gbits/sec The Solution - Scrubbing Routed the attack traffic to a network of 23 different data centers Many to one -> Many to many

The Research Popularity-based front-end cache “IP Fast Hopping” Network-layer architecture for dynamic server IP address change Stochastic model based puzzle controller Compares entropy of a covariance matrix to a behavior threshold

Conclusions Denial of Service is evolving as the major cybersecurity threat to companies and governments DDoS attacks are difficult to detect and isolate Modern DDoS attacks are more precise and dangerous (Zero-Day, Encrypted SSL) Almost every high-profile company that uses the internet must purchase DDoS mitigation services Attacks are only going to increase in sophistication and size

Thank You! Questions?