DoS Attacks ..by Aleksei Zaitsenkov.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Introduction to Security Computer Networks Computer Networks Term B10.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Lecture 15 Denial of Service Attacks
DENIAL OF SERVICE ATTACK
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 A 曾天財 指導教授:梁明章 教授. Types of Attacks  Penetration  Eavesdropping  Man-in-the-Middle  Flooding 2.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service Attacks
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Network Programming and Network Security Lane Thames Graduate Research Assistant.
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
DoS/DDoS attack and defense
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Denial-of-Service Attacks
AP Waseem Iqbal.  DoS is an attack on computer or network that reduces, restricts or prevents legitimate of its resources  In a DoS attack, attackers.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Network security Vlasov Illia
An Introduction To ARP Spoofing & Other Attacks
DDoS Attacks on Financial Institutions Presentation
Distributed Denial of Service (DDoS) Attacks
CS4622 Team 4 Worms, DoS, and Smurf Attacks
Outline Basics of network security Definitions Sample attacks
Distributed Denial of Service (DDoS) Attacks
Presentation transcript:

DoS Attacks ..by Aleksei Zaitsenkov

OUTLINE “DoS Attacks” – What Is History Types of Attacks Main targets today How to Defend Prosecution Conclusion

What Is “DoS Attack” Denial-Of-Service Attack = DOS Attack is a malicious attempt by a single person or a group of people to cause the victim, site or node to deny service to it customers. DoS = when a single host attacks DDoS = when multiple hosts attack simultaneously

Attack Size in Gbits-per-second

Attack Size in Gbits-per-second

Idea of “DoS Attacks” Purpose is to shut down a site, not penetrate it. Purpose may be vandalism, extortion or social action (including terrorism) (Sports betting sites often extorted) Modification of internal data, change of programs (Includes defacement of web sites)

Morris Worm (November 2, 1988) History Morris Worm (November 2, 1988) First DDoS attack to cripple large amounts of network infrastructure Self-replicating, self-propagating. Exploited software commonality (monoculture) Fingerd buffer overflow exploit Sendmail root vulnerability Weak passwords

HISTORY Morris Worm effect Infected systems became “catatonic” Took roughly three days to come under control Ultimately infected 10% of Internet computers (6,000) and cost $ million to clean up. Morris convicted under computer fraud and abuse act, three years probation, fine of $10,000

HISTORY SQL Slammer (January, 25 2003) Exploited common software (Microsoft SQL Server) as well as hardware (Intel x86), spread rapidly in a distinct monoculture. Non-destructive. Modified no data on infected system Extremely simple in construction (376 bytes) Devastating: 120,000 computers infected at peak (1/26/2003) Exhausted network bandwidth Crashed network infrastructure (multicast state creation) Shut down communication (fire-fighting) capability

HISTORY SQL Slammer effect Extremely Virulent Caused economic damage outside of IT infrastructure (multiple ATM outages) Original perpetrators have never been identified or brought to justice

Types of DoS Attacks

Types of DoS Attacks Penetration Eavesdropping Man-In-The-Middle Flooding

Types of DoS Attacks Penetration Attacker gets inside your machine Can take over machine and do whatever he wants Achieves entry via software flaw(s), stolen passwords or insider access

Types of DoS Attacks Eavesdropping Attacker gains access to same network Listens to traffic going in and out of your machine

Types of DoS Attacks Man-in-the-Middle Attacker listens to output and controls output Can substitute messages in both directions

Types of DoS Attacks Flooding Attacker sends an overwhelming number of messages at your machine; great congestion The congestion may occur in the path before your machine Messages from legitimate users are crowded out Usually called a Denial of Service (DoS) attack, because that’s the effect. Usually involves a large number of machines, hence Distributed Denial of Service (DDoS) attack

Main Targets

Estonian Cyberwar April 27, 2007 Weeks of cyber attacks followed, targeting government and banks, ministries, newspapers and broadcasters Web sites of Estonia. Some attacks took the form of distributed denial of service (DDoS) attacks (using ping floods to expensive rentals of botnets). 128 unique DDOS attacks (115 ICMP floods, 4 TCP SYN floods and 9 generic traffic floods). Used hundreds or thousands of "zombie" computers and pelted Estonian Web sites with thousands of requests a second, boosting traffic far beyond normal levels.

Estonian Cyberwar April 27, 2007 Inoperability of the following state and commercial sites: The Estonian presidency and its parliament. Almost all of the country’s government ministries. Political parties. Three news organizations. Two biggest banks and communication’s firms. Governmental ISP. Telecom companies.

Estonian Cyberwar April 27, 2007 The attack heavily affected infrastructures of all network: Routers damaged. Routing tables changed. DNS servers overloaded. Email servers mainframes failure, and etc.

Estonian Cyberwar April 27, 2007

How to defend Firewalls - can effectively prevent users from launching simple flooding type attacks from machines behind the firewall. Switches - Some switches provide automatic and/or system-wide rate limiting, traffic shaping, delayed binding to detect and remediate denial of service attacks Routers - If you add rules to take flow statistics out of the router during the DoS attacks, they further slow down and complicate the matter DDS based defense Clean pipes

Prosecution Different governmental legislation Too expensive National interests Hard to prove who used the computer

CONCLUSION Role of international boundaries - consoles located across international borders, law-enforcement problem In the past, as the present, DDoS has been more a nuisance activity conducted by cyber vandals than an activity with specific socioeconomic aims In the future, DDoS may be used as a disruptive force, with broad destabilization as its aim instead of the targeting of specific targets Destabilization has a high (ROI) Return On Investment when compared to targeted attacks

QUESTIONS? People are talking about the Internet as though it is going to change the world. It's not going to change the world. It's not going to change the way we think, and it's not going to change the way we feel. Peter Davison