 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.

Slides:



Advertisements
Similar presentations
Why Is DDoS Hard to Solve? 1.A simple form of attack 2.Designed to prey on the Internet’s strengths 3.Easy availability of attack machines 4.Attack can.
Advertisements

IP Masquerading Homes and Businesses: When you only have one IP but you have LOTS of machines.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
Security Awareness: Applying Practical Security in Your World
CIS 659 – Introduction to Network Security – Fall 2003 – Class 10 – 10/9/03 1 What is Distributed Denial of Service?
John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff
Web server security Dr Jim Briggs WEBP security1.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Denial of Service. Denial of Service Attacks Unlike other forms of computer attacks, goal isn’t access or theft of information or services The goal is.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Denial of Service.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
SDN based Network Security Monitoring in Dynamic Cloud Networks Xiuzhen CHEN School of Information Security Engineering Shanghai Jiao Tong University,
CSC8320. Outline Content from the book Recent Work Future Work.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Lecture 12 Page 1 CS 236 Online Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite coasts.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Denial of Service. Denial of Service Attacks Unlike other forms of computer attacks, goal isn’t access or theft of information or services The goal is.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
CIS 659 – Introduction to Network Security – Fall 2003 – Class 10 – 10/9/03 1 Simple Denial of Service.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
1 Defense Strategies for DDoS Attacks Steven M. Bellovin
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
Computer Security By Duncan Hall.
Lecture 17 Page 1 CS 236, Spring 2008 Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Lecture 16 Page 1 CS 239, Spring 2007 Designing Performance Experiments: An Example CS 239 Experimental Methodologies for System Software Peter Reiher.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Role Of Network IDS in Network Perimeter Defense.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
DDoS In the Real World Do DDoS attacks really happen?
Distributed Denial of Service (DDoS) Attacks
Outline Basics of network security Definitions Sample attacks
DDoS In the Real World Do DDoS attacks really happen?
Introduction to Networking
Preventing Internet Denial-of-Service with Capabilities
Outline Basics of network security Definitions Sample attacks
Outline The spoofing problem Approaches to handle spoofing
Outline Basics of network security Definitions Sample attacks
Outline Why is DDoS hard to handle?
Distributed Denial of Service (DDoS) Attacks
Presentation transcript:

 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they will let anything through o End to end paradigm means routers will enforce no security or authentication – they will let anything through  It works real well when both parties play fair  It creates opportunity for DDoS when one party cheats

 You can make yourself harder to attack  But you can’t make it impossible  And, if you haven’t made it hard enough, there’s not much you can do when you are attacked o There are no patches to apply o There is no switch to turn o There might be no filtering rule to apply o Grin and bear it

1. A simple form of attack 2. Designed to prey on the Internet’s strengths 3. Easy availability of attack machines 4. Attack can look like normal traffic 5. Lack of Internet enforcement tools 6. Hard to get cooperation from others 7. Effective solutions hard to deploy

 Basically, just send someone a lot of traffic  More complicated versions can add refinements, but that’s the crux of it  No need to find new vulnerabilities  No need to worry about timing, tracing, etc.  Toolkits are readily available to allow the novice to perform DDoS  Even distributed parts are very simple

 The Internet was designed to deliver lots of traffic o From lots of places, to lots of places  DDoS attackers want to deliver lots of traffic from lots of places to one place  Any individual packet can look proper to the Internet  Without sophisticated analysis, even the entire flow can appear proper

 Internet was not designed to monitor resource utilization o Most of it follows first come, first served model  Many network services work the same way  And many key underlying mechanisms do, too  Thus, if a villain can get to the important resources first, he can often deny them to good users

 DDoS is feasible because attackers can enlist many machines  Attackers can enlist many machines because many machines are readily vulnerable  Not hard to find 1,000 crackable machines on the Internet o Particularly if you don’t care which 1,000  Botnets numbering hundreds of thousands of hosts have been discovered

 DDoS attacks don’t really harm the attacking machines  Many people don’t protect their machines even when the attacks can harm them  Why will they start protecting their machines just to help others?  Altruism has not yet proven to be a compelling argument for for network security

 A DDoS attack can consist of vast number of requests for a web server’s home page  No need for attacker to use particular packets or packet contents  So neat filtering/signature tools may not help  Attacker can be arbitrarily sophisticated at mirroring legitimate traffic o In principle o Not often done because dumb attacks work so well

 DDoS attackers have never been caught by tracing or observing attack  Only by old-fashioned detective work o Really, only when they’re dumb enough to boast about their success  The Internet offers no help in tracing a single attack stream, much less multiple ones  Even if you trace them, a clever attacker leaves no clues of his identity on those machines

 No validation of IP source address  No enforcement of amount of resources used  No method of tracking attack flows o Or those controlling attack flows  No method of assigning responsibility for bad packets or packet streams  No mechanism or tools for determining who corrupted a machine

 It’s hard to get anyone to help you stop or trace or prevent an attack  Even your ISP might not be too cooperative  Anyone upstream of your ISP is less likely to be cooperative o ISPs more likely to cooperate with each other, though  Even if cooperation occurs, it occurs at human timescales o The attack might be over by the time you figure out who to call

 The easiest place to deploy defensive systems is near your own machine o Defenses there might not work well (firewall example)  There are effective solutions under research o But they require deployment near attackers or in the Internet core o Or, worse, in many places  A working solution is useless without deployment o Hard to get anything deployed if deploying site gets no direct advantage