DDoS In the Real World Do DDoS attacks really happen?

Slides:



Advertisements
Similar presentations
On the Necessity of Handling DDoS Traffic in the Middle of the Network Peter Reiher UCLA Computer Communications Workshop October 22, 2008.
Advertisements

Why Is DDoS Hard to Solve? 1.A simple form of attack 2.Designed to prey on the Internet’s strengths 3.Easy availability of attack machines 4.Attack can.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
1 A 曾天財 指導教授:梁明章 教授. Types of Attacks  Penetration  Eavesdropping  Man-in-the-Middle  Flooding 2.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Lecture 13 Page 1 CS 236 Online Secure Programming CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
CIS 659 – Introduction to Network Security – Fall 2003 – Class 10 – 10/9/03 1 Simple Denial of Service.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Lecture 2 Page 1 CS 236 Online Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 17 Page 1 CS 236, Spring 2008 Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security.
Lecture 17 Page 1 CS 236 Online Prolog to Lecture 17 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 16 Page 1 CS 239, Spring 2007 Designing Performance Experiments: An Example CS 239 Experimental Methodologies for System Software Peter Reiher.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Lecture 19 Page 1 CS 236 Online Prolog to Lecture 19 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Lecture 8 Page 1 CS 236 Online Prolog to Lecture 8 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
Lecture 10 Page 1 CS 111 Online Memory Management CS 111 On-Line MS Program Operating Systems Peter Reiher.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 14 Page 1 CS 236 Online Secure Programming CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Network Security Lab Jelena Mirkovic Sig NewGrad presentantion.
Blocking Access to Websites. Normal operations We type the URL (e.g., to the browser. So many things happen.
Botnets A collection of compromised machines
DNS Forensics & Protection
Internet Quarantine: Requirements for Containing Self-Propagating Code
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
DDoS In the Real World Do DDoS attacks really happen?
Outline Properties of keys Key management Key servers Certificates.
Firewall Configuration and Administration
Wireless Network Security
Secure Software and the Law
Password Management Limit login attempts Encrypt your passwords
Distributed Denial of Service (DDoS) Attacks
Outline Basics of network security Definitions Sample attacks
Lesson Objectives Aims You should be able to:
Who should be responsible for risks to basic Internet infrastructure?
Botnets A collection of compromised machines
Outline Basics of network security Definitions Sample attacks
Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Faculty of Science IT Department By Raz Dara MA.
CSE 451: Operating Systems Winter Module 22 Distributed File Systems
Protect Your Ecommerce Site From Hacking and Fraud
Governmental Control of Network Activities CS 239 Advanced Topics in Computer Security Peter Reiher September 30, 2010.
FIREWALL.
Computer Security By: Muhammed Anwar.
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Jan Chrillesen, Stofa A/S
EE 122: Lecture 22 (Overlay Networks)
IASP 470 PROJECT PROPOSAL MALWARE DETECTION
Marcial Quinones-Cardona
Outline The spoofing problem Approaches to handle spoofing
Outline Basics of network security Definitions Sample attacks
Outline Why is DDoS hard to handle?
Distributed Denial of Service (DDoS) Attacks
Outline The concept of perimeter defense and networks Firewalls.
Presentation transcript:

Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher

DDoS In the Real World Do DDoS attacks really happen? What responses are taken in real cases? What tools are available and used today to handle DDoS?

Real World Occurrence of DDoS Estonia, Georgia, Iran, Australia governments have all suffered large DDoS attacks in recent years Companies also get attacked fairly often Usually for extortion Group of US banks attacked in late 2012 It’s pretty common

So What Do Victims Do? Generally, either last it out Or pay extortion, if that’s the goal of the attacker Or enlist help from ISP Who may, in turn, enlist help of other parties

How Do ISPs Help? Two approaches: Drop traffic Block attacking machines

Dropping Traffic Drop traffic before it gets to the victim Which traffic? Usually, ISP engineers examine data flows by hand Dropping obvious attack flows Or all traffic from obvious attack sources May need to get upstream ISPs to help Generally a blunt instrument And not quick

Blocking the Bots Can’t just block them near the target Must get them further upstream Generally at their entry to the Internet Requires cooperation of their providers Won’t do it for just anyone A lot of work, if there are lots of bots

Content Distribution Network Approaches Akamai and similar companies can help their customers They maintain cached copies of customer content And have huge server pools spread around the Internet How does that help?

The Resource Multiplication Solution Cache content at vast number of places As demand increases, increase caching Few attackers can overwhelm big enough cache providers Who could charge for the protection A feasible solution, but not cheap

Do Practical Measures Work? If you can get the necessary parties to help, usually yes What’s theoretically hard might not be too bad, in practice If you are important enough Small fry are likely to get squashed