Denial of Service By: Samarth Shah and Navin Soni.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Firewalls and Intrusion Detection Systems
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Web server security Dr Jim Briggs WEBP security1.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Lecture 15 Denial of Service Attacks
DENIAL OF SERVICE(DOS) Prepared By: Ram Chandra Bhushan M.Tech(ICT) 10IT61B07 IIT Kharagpur 1.
DENIAL OF SERVICE ATTACK
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
FIREWALL Mạng máy tính nâng cao-V1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Final Introduction ---- Web Security, DDoS, others
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Presented by: Dr. Munam Ali Shah
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Security at NCAR David Mitchell February 20th, 2007.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
DoS/DDoS attack and defense
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
AP Waseem Iqbal.  DoS is an attack on computer or network that reduces, restricts or prevents legitimate of its resources  In a DoS attack, attackers.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
An Introduction To ARP Spoofing & Other Attacks
DDoS Attacks on Financial Institutions Presentation
Domain 4 – Communication and Network Security
DDoS Attack and Its Defense
Presentation transcript:

Denial of Service By: Samarth Shah and Navin Soni

Contents Introduction Symptoms Method of Attacks Prevention and Response Side-effects Downfall Conclusion

Introduction Denial-of-service (DoS) attack aims at disrupting the authorized use of networks, systems, or applications by sending messages which exhaust service providers resources Distributed denial-of-service (DDoS) attacks employ multiple compromised computers to perform a coordinated and widely distributed DoS attack Victims service-providers legitimate service-seekers

WHO?? Their Motives Who Highly proficient attackers who are rarely identified or caught The motive Earlier attacks were proofs of concepts or simple pranks Pseudo-supremacy feeling upon denying services in large scale to normal people DoS attacks on Internet chat channel moderators Political disagreements Competitive edge

Victim Daemon Master Real Attacker

Symptoms Unusually slow network performance. Unavailability of a particular web site. Inability to access any web site. Dramatic increase in the number of spam s received. Also lead to problems in the network 'branches' around the actual computer being attacked.

Methods of attack The five basic types of attack are: – Consumption of computational resources. – Disruption of configuration information. – Disruption of state information. – Disruption of physical network components. – Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

Classification of DoS Attacks AttackAffected AreaExampleDescription Network Level DeviceRouters, IP Switches, FirewallsAscend Kill II, Christmas Tree Packets Attack attempts to exhaust hardware resources using multiple duplicate packets or a software bug. OS LevelEquipment Vendor OS, End-User Equipment. Ping of Death, Teardrop Attack takes advantage of the way operating systems implement protocols. Application Level AttacksFinger Bomb Attack a service or machine by using an application attack to exhaust resources. Data Flood (Amplification, Oscillation, Simple Flooding) Host computer or networkSmurf Attack (amplifier attack)Attack in which massive quantities of data are sent to a target with the intention of using up bandwidth/processing resources. Protocol Feature AttacksServers, Client PC, DNS ServersSYN (connection depletion)Attack in which bugs in protocol are utilized to take down network resources. Methods of attack include: IP address spoofing, and corrupting DNS server cache.

Methods of Attack Peer to Peer Attack Permanent Denial of Service Nuke Degradation of Service attack

Countermeasures AttackCountermeasure Options ExampleDescription Network Level DeviceSoftware patches, packet filtering Ingress and Egress FilteringSoftware upgrades can fix known bugs and packet filtering can prevent attacking traffic from entering a network. OS LevelSYN Cookies, drop backlog connections, shorten timeout time SYN CookiesShortening the backlog time and dropping backlog connections will free up resources. SYN cookies proactively prevent attacks. Application Level AttacksIntrusion Detection SystemGuardDog, other vendorsSoftware used to detect illicit activity. Data Flood (Amplification, Oscillation, Simple Flooding) Replication and Load BalancingAkami/Digital Island provide content distribution. Extend the volume of content under attack makes it more complicated and harder for attackers to identify services to attack and accomplish complete attacks. Protocol Feature AttacksExtend protocols to support security. ITEF standard for itrace, DNSSECTrace source/destination packets by a means other than the IP address (blocks against IP address spoofing). DNSSEC would provide authorization and authentication on DNS information.

Prevention and Response Firewalls Switches Routers Application front end hardware IPS based prevention Blackholing Sinkholing Clean Pipes

Side-Effects Backscatter is a side-effect of a spoofed denial of service attack. The attacker spoofs the source address in IP packets sent to the victim. Response packets are known as backscatter. The backscatter response packets from the victim will be sent back to random destinations. This effect can be used by network telescopes as indirect evidence of such attacks.

Downfalls DoS attacks are unable to attack large bandwidth websites. New distributed server architecture makes it harder for one DoS to take down an entire site. New software protections neutralize existing DoS attacks quickly. Service Providers know how to prevent these attacks from effecting their networks. Old Internet Technology.

Conclusion Attack techniques continue to advance and the number of software vulnerabilities continues to increase. Service providers and vendors are quickly adapting to the new landscape. Prevention is always the best measure. Regular scanning and auditing will prevent configuration errors from exposing infrastructure to known attacks. Preparation is the key for service providers to mitigate attacks as they happen.

THANK YOU