Denial of Service Attacks Ben Schmidt University of Tulsa Tulsa, Oklahoma.

Slides:



Advertisements
Similar presentations
Denial of Service By: Samarth Shah and Navin Soni.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Computer Security and Penetration Testing
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Network Attack and Defense
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Web server security Dr Jim Briggs WEBP security1.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Network Attacks. Network Trust Issues – TCP Congestion control – IP Src Spoofing – Wireless transmission Denial of Service Attacks – TCP-SYN – Name Servers.
Lecture 15 Denial of Service Attacks
Chapter 9 Phase 3: Denial-of-Service Attacks. Fig 9.1 Denial-of-Service attack categories.
DENIAL OF SERVICE ATTACK
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Dos (Denial of Services) Aamir Wahid September 23 rd 2004.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 A 曾天財 指導教授:梁明章 教授. Types of Attacks  Penetration  Eavesdropping  Man-in-the-Middle  Flooding 2.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Chapter 6: Packet Filtering
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Network Security Lecture 6 Presented by: Dr. Munam Ali Shah.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
© 2002, Cisco Systems, Inc. All rights reserved..
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
KEYNOTE OF THE FUTURE 3: DAVID BECKETT CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
Denial-of-Service Attacks
DDoS Attacks on Financial Institutions Presentation
Domain 4 – Communication and Network Security
Error and Control Messages in the Internet Protocol
Intro to Denial of Serice Attacks
Presentation transcript:

Denial of Service Attacks Ben Schmidt University of Tulsa Tulsa, Oklahoma

Denial of Service Defined Denial of Service Attack (DoS) –Any attack that attempts to prevent legitimate users from accessing a service, thus violating the principle of availability. Distributed Denial of Service Attack (DDoS) –Any attack that uses multiple computers, acting in unison, to cause a denial of service situation.

Types of Denial of Service Software Flaws –Usually “one-off” vulnerabilities –Require little effort to exploit once found Ex. Non-exploitable memory issues, control flow errors Famous Examples: Ping of death, Teardrop, Windows device files Resource Exhaustion –Attempt to overwhelm a specific computing resource CPU, memory, bandwidth, and thread pools are common targets Ex. SYN/UDP/ICMP floods, HTTP slow POST, etc –Difficult to defend against, given a large number of attackers Made much worse by amplification attacks (i.e. smurf)

Types of Denial of Service (cont.) Communication Channel Disruption –Attacks the infrastructure carrying the data –Ex. Cutting cables, modifying routes, TCP reset spoofing –If an attacker has this capability, nearly impossible to defeat

Software Flaws –Been around for most of computing history –In the early days, very simple to execute Reference device file on Windows, set URG pointer in TCP packet –Flaws have since became slightly more complicated Communication Channel Disruption –Not as prevalent, but has been used for censorship in recent years –China blocking connections, modifying routes, etc –Routes dropped during unrest in the Middle East in DoS: A History

DDoS: A History Resource Exhaustion –Became prevalent as simple DoS attacks became more difficult –IRC wars fueled the building of botnets to attack rival servers –First documented attack in 1999 on University of Minnesota –Greatly expanded the following year Yahoo, Amazon, Buy.com, CNN, and eBay all taken down in 2000 –Since then, has become a constant threat –Fueled an arms race in malware to cash in on blackmail scam –Even used in real life conflicts -> Estonia + Georgia –Wikileaks/Anonymous attacks most recent news

DoS Attacks Explained Software Flaws –Ping of death – oversized ICMP packets –Teardrop – mangled IP fragments –Winnuke – exploits URG pointer vulnerability in Netbios –Can all be exploited with packet manipulation tools –Most bugs are application/device specific Communication Disruption –ARP/DNS blackholes –Compromising/attacking routers (Cisco torch) –BGP manipulation –PDoS (Permanent denial of service) –Explosions/bullets/knives/fire/water/Thor

DDoS Attacks Explained DDoS –SYN flooding Exploits TCP 3 way handshake by sending massive # of SYN’s –Smurf attacks Spoof ICMP echo request to broadcast, from target –DNS amplification attacks Spoof short DNS requests from target that have long responses –Slowloris uses slow POST technique to attack web servers –HTML 5 CORS attack hijack browsers to make requests –Simply making large numbers of legitimate requests

DoS Mitigation Software flaws –Usually quite simple to defend against (if you can) –Appropriate firewall rules, updating software, and IPS –Should already be doing these things anyway –0-day flaws could still cause serious problems Communication Disruption –Protect ARP tables and DNS records –Attacks against external infrastructure beyond control Generally must rely on ISP to ensure connectivity –Mesh networks might make these attacks more difficult –Host in multiple locations

DDoS Mitigation Bandwidth –Isolate bandwidth intensive services, if possible Content delivery networks –Get more bandwidth –Smurf attacks and DNS amplification Report misconfigurations to network administrators –Try to work with ISP to coordinate blocking of traffic CPU/Memory –Write/use efficient code –Disable all unnecessary services –Use caching whenever possible –Faster server / more memory

DDoS Mitigation (cont.) Thread pool / application resource attacks –SYN Floods (layer 3) Most *nix OSs –SYN cookies – used by default on most systems –echo 1 > /proc/sys/net/ipv4/tcp_syncookies Windows –Add SynAttackProtect DWORD value set to 2 in HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters –Set TcpMaxHalfOpen to 100 or less, TcpMaxHalfOpenRetired to 200 or less, and TcpMaxPortsExhausted to 5 or less. Also helpful to increase backlog queue and decrease time and number of retransmission attempts Hardware appliances that implement these features

DDoS Mitigation (cont.) Thread pool / application resource (cont.) –HTTP attacks (or, generally, layer 7) Use WAF (mod_evasive, mod_security), fail2ban, or comparable Lower timeout values Caching / Reverse proxies Per-IP connection rate limiting mod_rewrite (or similar) for some smaller attacks

Conclusions Denial of service attacks aren’t going away Not all can be defended against, but many can With precautions, most can be mitigated Understanding of the threats is critical

Questions?

References M. Kola. Botnets: Overview and Case Study. PhD thesis, IBM Research, 2008 Kessler, Gary C. "Distributed Denial-Of-Service." Web. 12 Apr "CERT/CC Denial of Service." Web. 12 Apr Burdach, Mariusz. "Hardening the TCP/IP Stack to SYN Attacks." Symantec. Web.. Jackson, Don. "DNS Amplification Variation Used in Recent DDoS Attacks." Web.. Schmidt, Ben. "D0z.me: The Evil URL Shortener." Spare Clock Cycles. 10 Dec Web. 12 Apr url-shortener/ url-shortener/ Nazario, Jose. "Estonian DDoS Attacks." Security Blog | Arbor Networks. 17 May Web. 12 Apr