Security Physical Layer, DoS and DDoS

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
2005 Stanford Computer Systems Lab Flow Cookies Bandwidth Amplification as Flooding Defense Martin Casado, Pei Cao Niels Provos.
Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing Base on RFC 2827 Lector Kirill Motul.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
1 Denial of Service Attacks Adapted from Dan Boneh, Stanford.
John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Lecture 15 Denial of Service Attacks
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
OSI Model Routing Connection-oriented/Connectionless Network Services.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Internet Control Message Protocol ICMP. ICMP has two major purposes: –To report erroneous conditions –To diagnose network problems ICMP has two major.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Chapter 6: Packet Filtering
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Web Application Firewall (WAF) RSA ® Conference 2013.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
Distributed Denial of Service Attacks
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
DoS/DDoS attack and defense
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Denial-of-Service Attacks
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
DDoS Attacks on Financial Institutions Presentation
Computer Data Security & Privacy
Outline Basics of network security Definitions Sample attacks
Port Scanning (based on nmap tool)
Defending Against DDoS
Filtering Spoofed Packets
Introduction to Networking
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Defending Against DDoS
Unwanted Traffic: Denial of Service Attacks
Unwanted Traffic: Denial of Service Attacks
Outline Basics of network security Definitions Sample attacks
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
IIT Indore © Neminath Hubballi
COS 561: Advanced Computer Networks
DDoS Attack and Its Defense
Advanced Computer Networks
Outline The spoofing problem Approaches to handle spoofing
Outline Basics of network security Definitions Sample attacks
TCP Connection Management
Presentation transcript:

Security Physical Layer, DoS and DDoS - RF FINGERPRINTING - DENIAL of SERVICE

Technopedia says : Radio frequency fingerprinting is a process that identifies the device or signaler from which a radio transmission originated by looking at the properties of its transmission, including specific radio frequencies. Each signal originator has its own specific "fingerprint" based on the location and configuration of its transmitted signals.

RF Fingerprinting Biasa digunakan oleh operator seluler untuk mencegah cloning ponsel Sebuah cloning ponsel memiliki identitas numeric equipment yang sama tapi berbeda radio frequency fingerprinting Setiap transmitter (cellphone) hanya memiliki 1 jenis radio transmitter, ini sangat sulit ditiru Pertama kali cellphone dihidupkan, cellphone akan memiliki “signature” yang berisi variasi-variasi nilai komponen selama proses pembuatan. -> “call sign” Sangat mudah dideteksi kalau ada cellphone yang berbeda “callsign” dan transmitter-nya (RF Fingerprinting) Hal ini menjadikan teknik ini digunakan untuk militer.

DoS

DoS

DoS Impact

DDoS

DDoS

DoS Syimptoms

DoS Technique

SYN Flood (1)

SYN Flood (2)

A classic SYN flood example MS Blaster worm (2003) Infected machines at noon on Aug 16th: SYN flood on port 80 to windowsupdate.com 50 SYN packets every second. each packet is 40 bytes. Spoofed source IP: a.b.X.Y where X,Y random. MS solution: new name: windowsupdate.microsoft.com Infected IP: a.b.c.d. a.b.X.Y avoids ingress filtering ISPs. Note: evades Savage’s /8 backscatter monitor.

SYN Floods II: Massive flood (e.g BetCris.com) Command bot army to flood specific target: (DDoS) 20,000 bots can generate 2Gb/sec of SYNs (2003) At web site: Saturates network uplink or network router Random source IP ⇒ attack SYNs look the same as real SYNs What to do ??? Gambling site in Costa Rica. Defended using PureGig ISP that has 10Gb/sec link. Note: NetScalar boxes process SYN packets in HW.

Mitigation Sample

Prolexic / CloudFlare Lots-of-SYNs Lots-of-SYN/ACKs Web site Few ACKs Idea: only forward established TCP connections to site Lots-of-SYNs Prolexic Proxy Lots-of-SYN/ACKs Web site Few ACKs Note: web site is only accessible through prolexic proxy via leased line Forward to site

Rate: attk/day [ATLAS 2013] Other junk packets Proxy must keep floods of these away from web site Attack Packet Victim Response Rate: attk/day [ATLAS 2013] TCP SYN to open port TCP SYN/ACK 773 TCP SYN to closed port TCP RST TCP ACK or TCP DATA No response TCP NULL ICMP ECHO Request ICMP ECHO Response 50 UDP to closed port ICMP Port unreachable 387 Rate: #attacks detected per 24 hours Filtering some of these, like TCP RST, requires Prolexic to maintain per-flow state. Per-flow state is not easy to maintain.

Stronger attacks: TCP con flood Command bot army to: Complete TCP connection to web site Send short HTTP HEAD request Repeat Will bypass SYN flood protection proxy … but: Attacker can no longer use random source IPs. Reveals location of bot zombies Proxy can now block or rate-limit bots.

A real-world example: GitHub (3/2015) popular server Javascript-based DDoS: honest end user inject imageFlood.js github.com function imgflood() { var TARGET = 'victim-website.com/index.php?’ var rand = Math.floor(Math.random() * 1000) var pic = new Image() pic.src = 'http://'+TARGET+rand+'=val' } setInterval(imgflood, 10) imageFlood.js Would HTTPS prevent this? Not if attacker is trusted to issue certs for GitHub. Would HTTPS prevent this DDoS?

1. CAPTCHAs Idea: verify that connection is from a human Applies to application layer DDoS [Killbots ’05] During attack: generate CAPTCHAs and process request only if valid solution Present one CAPTCHA per source IP address.

2. Source identification Goal: identify packet source Ultimate goal: block attack at the source

1. Ingress filtering (RFC 2827, 3704) Big problem: DDoS with spoofed source IPs Ingress filtering policy: ISP only forwards packets with legitimate source IP (see also SAVE protocol) ISP Internet Other methods to block spoofed source IP: SAVE (Infocomm’02)

Implementation problems ALL ISPs must do this. Requires global trust. If 10% of ISPs do not implement ⇒ no defense No incentive for deployment 2014: 25% of Auto. Systems are fully spoofable (spoofer.cmand.org) 13% of announced IP address space is spoofable Recall: 309 Gbps attack used only 3 networks (3/2013)

2. Traceback [Savage et al. ’00] Goal: Given set of attack packets Determine path to source How: change routers to record info in packets Assumptions: Most routers remain uncompromised Attacker sends many packets Route from attacker to victim remains relatively stable

Simple method Problem: Requires space in packet Path can be long Write path into network packet Each router adds its own IP address to packet Victim reads path from packet Problem: Requires space in packet Path can be long No extra fields in current IP format Changes to packet format too much to expect

Take home message: Denial of Service attacks are real. Must be considered at design time. Sad truth: Internet is ill-equipped to handle DDoS attacks Commercial solutions: CloudFlare, Prolexic Many good proposals for core redesign.