COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Defending against Large-Scale Distributed Denial-of-Service Attacks Department of Electrical and Computer Engineering Advanced Research in Information.
The Latest In Denial Of Service Attacks: “Smurfing” Description and Information to Minimize Effects Craig A. Huegen Cisco Systems, Inc. NANOG 11 Interprovider.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Firewalls and Intrusion Detection Systems
Computer Security and Penetration Testing
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
COEN 252: Computer Forensics Router Investigation.
Lance West.  Just what is a Denial of Service (DoS) attack, and just how can it be used to attack a network.  A DoS attack involves exploiting operating.
Lecture 15 Denial of Service Attacks
Chapter 9 Phase 3: Denial-of-Service Attacks. Fig 9.1 Denial-of-Service attack categories.
Denial of Service attacks. Types of DoS attacks Bandwidth consumption attackers have more bandwidth than victim, e.g T3 (45Mpbs) attacks T1 (1.544 Mbps).
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Network Security Lecture 6 Presented by: Dr. Munam Ali Shah.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
TCP/IP Vulnerabilities
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Packet-Marking Scheme for DDoS Attack Prevention
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Denial of Service Attacks: Methods, Tools, and Defenses Prof. Mort Anvari Strayer University at Arlington.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
DoS/DDoS attack and defense
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Denial-of-Service Attacks
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Domain 4 – Communication and Network Security
Defending Against DDoS
Defending Against DDoS
Intro to Denial of Serice Attacks
Preventing Internet Denial-of-Service with Capabilities
DDoS Attack and Its Defense
Presentation transcript:

COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips

Presentation Overview What are DoS Attacks? DoS Facts and Figures Current Solutions Problems Proposed Solutions Conclusions References Questions

What are DoS Attacks? A malicious attack that consumes resources of remote hosts or networks denying or degrading service to legitimate users, [11].

Types of DoS Attacks Bandwidth Consumption Program Flaw Exploitation Resource Starvation Routing/DNS Attacks SYN Floods DDoS Attacks

Bandwidth Consumption A computer having more bandwidth floods a smaller server with packets. The smaller server can not respond to the overwhelming load. A computer with small bandwidth convinces a network to flood a host with more bandwidth - A 56 Kbps modem can take down a T1 line like this

Program Flaw Exploitation An attacker sends an operating system, application, or hardware exceptional conditions that it cant handle. - OOBPort 139 on Windows 95 boxen - F00FC7C8Pentium Instruction

Resource Starvation Attacker aims to deplete system, rather than network resources. - CPU - Memory - File System Quotas

Routing/DNS Attacks Routing Information Protocol (RIP) and Border Gateway Protocol (BGP) have very weak authentication. Routing tables are changed to route traffic through an attackers network, another network, or a black hole (non-existent network) DNS is similar except DNS tables are falsified

SYN Floods TCP Connection Handshake client sends server TCP SYN server sends client TCP SYN ACK client sends server ACK or RST In case of a spoofed source address, server keeps trying to send SYN ACKs. Connection Queue fills up with these requests and no legitimate traffic is served

DDoS Attacks An attacker compromises many machines (agents or zombies) and installs DoS daemons The attacker uses a controlling machine (handler) to control the zombie machines to attack a server. More than one handler to prevent single point of failure

DoS Facts and Figures One of the hardest security problems Simple to implement Difficult to prevent Difficult to trace 1989 – 95: CERT reports DoS attacks increased 50% per year Tools are easy to find and use – Smurf, Fraggle, Teardrop, Stream, TFN, Trinoo Stacheldracht, Shaft, Plague, Trinity, et al. February 2000 – eBay, Yahoo, Amazon, etc.

Current Solutions Preventative: Make the OS/IP stack more robust Reactive Phone ISPs and trace back manually, call next ISP in the chain… This is time consuming and ISPs are often unwilling to spend time doing this. In addition, the trace has to be done while the attack is still in progress.

Problems The Internet is stateless; destination driven Source addresses can be easily falsified (spoofed) Attackers use connection chains to hide identities Routers can be compromised Login chains and address spoofing have legitimate uses

Proposed Solutions Ingress Filtering Upstream Router Mapping Counter Flooding Trace Probabilistic Packet Marking ICMP Traceback Messages Stepping Stone Tracking Traceback Network (CenterTrack or STM)

Ingress Filtering Defined in RFC 2267 Edge Routers drop and log packets with invalid Source IPs or those coming from outside the network Border Routers should not be allowed to transmit broadcast packets (MAC address FF:FF:FF:FF:FF:FF) to other routers by default

Ingress Filtering (cont) System Diagnostic UDP packets from outside domains should not be allowed into a network Ingress filtering poses problems with Mobile IP. Currently the Mobile IP Working Group is investigating reverse tunneling to solve this problem.

Upstream Router Mapping Network Administrators should make an upstream router map Manually via traceroute Mercator – program that uses hop limited probes and source routers to create upstream maps

Counter Flooding Network Administrators send UDP chargen floods upstream (small scale DoS attack). If a router is perturbed then it is probably being used in the attack. Repeat upstream. Ethical issue – If the trace causes more damage than the attack, should it be used?

PPM PPM – Probabilistic Packet Marking 4 schemes Savage, Wetherall, Karlin & Anderson Song & Perrig Park & Lee Dean, Franklin & Stubblefield

PPM (cont) These schemes overload the IP Identification field used for packet fragmentation In most schemes, a hashing function computes a hash of the routers IP address and writes this hash to the Identification field A distance field is normally included as well that keeps track of how many hops a packet has travelled

PPM (cont) Typical IP Packet

PPM (cont) Dean, etc. employ an algebraic scheme rather than a hash based wherein routers stamp coefficients of their IP addresses % a prime number

PPM (cont) Assumptions: Most paths are less than 25 hops Packets can be addressed to more than one host Duplicate Packets can exist Routers can be compromised Attackers know they can be traced

PPM (cont) PPM schemes must minimize false positives while eliminating false negatives Adding bits to IP headers causes packet fragmentation

PPM (cont) Problems Packets can take more than one path to a destination IPSec requires IP Identification field IP fragmentation is small (<0.25% of traffic) but does exist Routers do not need more overhead

ICMP Traceback Traceroute only works in the forward direction, not in reverse Routers send out ICMP traceback information (interface name, Time stamp) probabilistically (1/1000 – 1/20000) Public key system used to authenticate packets TTL set to 255 to show distance Problem – ICMP is filtered in some networks

Stepping Stone Traceback Stepping Stone – one link in a connection chain If ON/OFF timing between 2 hosts is similar, it is probably a stepping stone Packets often encrypted, check headers Check clear text packets to see if the text from one host is transmitted to another Problem – too much legitimate traffic, not an adequate solution

CenterTrack Edge routers are connected to a special overlay network composed of tracing routers via IP Tunnels In case of attack, the packets are forwarded to the tracking routers which follow the stream back to the source of the attack

CenterTrack (cont) Full packet capture can be added easily to provide attack evidence Problems – Attacks have to be detected to be rerouted TTL is modified and ICMP TTL exceeded messages are sent back, possibly alerting the attacker to the trace

CenterTrack (contd) GW – Gateway CT – CenterTrack Router TR/XR – Transfer Router

STM Network SPIEs (Source Path Isolation Engines) are installed in routers, or connected to them These SPIEs generate packet digests from 28 non changing bits in the packet (20 from the header, 8 from the payload). The digest is stored in router memory or external storage

STM Network (cont) SPIEs transfer data to SCARs (SPIE Collection and Reduction Agents) if interesting traffic occurs A SCAR can produce an attack graph of a local network STMs (SPIE Traceback Managers) can request information from one or more SCARs and generate a complete attack graph

Conclusions ISPs, unless they offer Mobile IP should use Ingress Filtering Network Administrators should make upstream router maps IPv6 should employ better packet tracing methods

References [1]S. Bellovin. ICMP traceback messages. Internet Draft, IETF, Mar draft-bellovin-itrace-05.txt (work in progress). [2] H. Burch and B. Cheswick. Tracing anonymous packets to their approximate source. In Proc. USENIX LISA 00 (Dec. 2000). [3] D. Dean, M. Franklin, and A. Stubblefield, "An Algebraic Approach to IP Traceback," in Network and Distributed System Security Symposium, NDSS '01, February 2001.

References [4]S. Dietrich, N. Long, and D. Dittrich, Analyzing ditributed denial of service attack tools: The shaft case, in 14 th Systems Administration Conference, LISA 2000, 2000, [7]P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. May 2000.RFC IEEE INFOCOM [8]R. Govindan and H. Tangmunarunkit. Heuristics for Internet Map Discovery. In Proc. of the 2000 IEEE INFOCOM Conference, Tel Aviv, Israel, Mar

References [10]K. Park and H. Lee. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In Proc. IEEE INFOCOM 2001, pages , [11]S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. In Proc. of ACM SIGCOMM 00, pages , Aug [12]A. Snoeren, and C. Partridge. Hash-based IP Traceback. In Proc. ACM SIGCOMM 01, pages 3-14, Aug

References [13]D. Song and A. Perrig. Advanced and authenticated marking schemes for IP traceback. Technical Report UCB/CSD , Computer Science Department, University of California, Berkeley, In Proc. IEEE INFOCOM [14]R. Stone. CenterTrack: An IP Overlay Network for Tracking DoS Floods. In Proc. of the 2000 USENIX Security Symposium, Denver, CO, July [15]*J. Scambray, S. McClure, and G. Kurtz. Hacking Exposed: Network Security Secrets and Solutions. Second Edition. New York: Osborne/McGraw-Hill, pages

References [17]Y. Zhang and V. Paxson. Stepping Stone Detection. In Proc. of the 2000 USENIX Security Symposium, Denver, CO, July 2000.

Questions?