Defensive Measures for DDoS By Farhan Mirza. Contents Survey Topics Survey Topics Introduction Introduction Common Target of DoS Attacks Common Target.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Denial of Service, Firewalls, and Intrusion Detection
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Firewalls and Intrusion Detection Systems
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Web server security Dr Jim Briggs WEBP security1.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Lecture 15 Denial of Service Attacks
Chapter 9 Phase 3: Denial-of-Service Attacks. Fig 9.1 Denial-of-Service attack categories.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
DENIAL OF SERVICE ATTACK
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Intranet, Extranet, Firewall. Intranet and Extranet.
FIREWALL Mạng máy tính nâng cao-V1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Chapter 6: Packet Filtering
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
TCP Security Vulnerabilities Phil Cayton CSE
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
DoS/DDoS attack and defense
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Domain 4 – Communication and Network Security
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Defensive Measures for DDoS By Farhan Mirza

Contents Survey Topics Survey Topics Introduction Introduction Common Target of DoS Attacks Common Target of DoS Attacks DoS Tools DoS Tools Defensive Measures & Their Vulnerabilities Defensive Measures & Their Vulnerabilities Honeypot for DDoS Honeypot for DDoS Honeypot implementation Honeypot implementation Issues & Concerns Issues & Concerns Conclusion Conclusion

Survey Topic Paper 1 Paper 1  Analysis of Denial-of-Service Attacks on Denial- of-Service Defensive Measures Paper 2 Paper 2  Honeypots for Distributed Denial of Service Attacks

Introduction DoS attacks Weapons of Mass Destruction Weapons of Mass Destruction Paralyze Internet systems with bogus traffic Paralyze Internet systems with bogus traffic 4 th Major Attack in 2001 – Computer Crime & Survey Report 4 th Major Attack in 2001 – Computer Crime & Survey Report

Attacks on Targets Attacking tools - More offensive Attacking tools - More offensive To discover and filter – More difficult To discover and filter – More difficult Powerful automatic scanning & observing target’s vulnerability Powerful automatic scanning & observing target’s vulnerability Uses methods - TCP Syn, UDP, ICMP Flooding etc Uses methods - TCP Syn, UDP, ICMP Flooding etc Includes Viruses & Worms - MS-SQL Server Worm, Code Red etc Includes Viruses & Worms - MS-SQL Server Worm, Code Red etc

Code Red Worm Attack

Common Target of DoS attacks Bandwidth DOS Attack Bandwidth DOS Attack Memory DOS Attacks Memory DOS Attacks Computation DOS Attacks Computation DOS Attacks

Bandwidth DoS Attacks Target - Bandwidth Target - Bandwidth Example – Slammer (MS-SQL Server Worm) Example – Slammer (MS-SQL Server Worm)  Self Propagating malicious code  Employs multiple vulnerabilities of SQL Server Resolution Service

Memory Dos Attacks Target – Memory Target – Memory Backscatter Analysis (Moore Investigation) : Backscatter Analysis (Moore Investigation) :  94% DoS attacks occurs on TCP Protocol  49% of attacks are TCP Syn attacks targeting 3 way handshake  2% on UDP  2% on ICMP

Memory DoS Attacks (Cont..) Every TCP connection establishment requires an allocated memory resource Every TCP connection establishment requires an allocated memory resource Limited number of concurrent TCP half-open connections Limited number of concurrent TCP half-open connections Attacker can disable service - Sending overdosed connection requests with spoofed source addresses Attacker can disable service - Sending overdosed connection requests with spoofed source addresses

Computation DoS Attacks Target – Computational Resources Target – Computational Resources Example: Database Query Attacks Example: Database Query Attacks  Sequence of queries requesting DBMS to execute complex commands, overwhelming the CPU

Software Bugs & Exploits Exploit on 7xx routers – connecting with Telnet and typing very long passwords Exploit on 7xx routers – connecting with Telnet and typing very long passwords  Effects – Reboot the router Reboot the router Deny service to users during reboot period Deny service to users during reboot period Connecting with Telnet and Typing long passwords

Software Bugs & Exploits (Cont...) Smurf DoS Bug – uses ICMP Echo Request packet with spoofed source address Smurf DoS Bug – uses ICMP Echo Request packet with spoofed source address  Effects – All machines on the subnet reply directly to victim’s address All machines on the subnet reply directly to victim’s address Congestion in the victim’s network connection Congestion in the victim’s network connection

DoS Tools Trin00 Trin00 TFN – Tribe Flood Newtork TFN – Tribe Flood Newtork Stacheldraht – “Barbed Wire” Stacheldraht – “Barbed Wire”

Trin00 Distributed attacking tool Distributed attacking tool Installed on intermediate host using a buffer overrun bug Installed on intermediate host using a buffer overrun bug Compiled on Linux and Solaris operating systems Compiled on Linux and Solaris operating systems Capable of generating a UDP packets for attack Capable of generating a UDP packets for attack Target Ports – 0 to Target Ports – 0 to 65534

TFN – Tribe Flood Network Launch Distributed Denial of Service attacks Launch Distributed Denial of Service attacks Installed on Intermediate host and based on buffer overrun bug Installed on Intermediate host and based on buffer overrun bug Capable of launching ICMP floods, UDP floods, SYN attacks, Smurf attacks Capable of launching ICMP floods, UDP floods, SYN attacks, Smurf attacks Compiled on Linux and Solaris operating systems Compiled on Linux and Solaris operating systems

Stacheldraht ("barbed wire") Combines features of Trin00 and TFN Combines features of Trin00 and TFN Capable of producing ICMP flood, SYN flood, UDP flood, and SMURF attacks Capable of producing ICMP flood, SYN flood, UDP flood, and SMURF attacks ICMP, UDP and TCP-SYN packets of sizes up to 1024 bytes against multiple victim hosts ICMP, UDP and TCP-SYN packets of sizes up to 1024 bytes against multiple victim hosts TCP-SYN packets are generated against random ports taken from selected range of port numbers TCP-SYN packets are generated against random ports taken from selected range of port numbers

DDoS Pattern Setting up of a stolen account as a repository for attack tools Scanning of large ranges for potential vulnerable targets Creation of script to perform the exploit and to report the results Choice of a subset of suitable compromised servers from the list Script automated installation of the needed tools on the compromised servers Optional installation of a root kit to hide the compromise

Defensive Measures System Self Defense System Self Defense  Stop all unnecessary or non-essential system services and network ports.  Reduce the timeout period for simultaneous half open connections Vulnerability: Vulnerability:  Reconfiguration may delay, or even deny, legitimate access  Lead to a potential increase in resource usage

Packet Filtering Most popular defensive mechanism Most popular defensive mechanism Selectively screens out suspicious or malicious packets Selectively screens out suspicious or malicious packets Itself a deformed DoS Itself a deformed DoS Vulnerability: Vulnerability:  If manipulated or abused - Most convenient way to accomplish DOS attack

Packet Filtering (Cont…) Types of Packet Filtering Types of Packet Filtering  Egress/Ingress Manages the flow inside and outside the network Manages the flow inside and outside the network Ingress - Used to block packets with spoofed source address Ingress - Used to block packets with spoofed source address Egress - manages the flow of traffic as it leaves a network Egress - manages the flow of traffic as it leaves a network  Vulnerability Effective only if used in large-scale applications Effective only if used in large-scale applications

Packet Filtering (Cont…)  Firewalls Victims network mechanism Victims network mechanism Enable a form of protection against SYN Flooding Enable a form of protection against SYN Flooding Examine packets and maintain connection and state information of session traffic Examine packets and maintain connection and state information of session traffic Configured as a relay, as a semi-transparent gateway Configured as a relay, as a semi-transparent gateway  Vulnerability Cause delays for every connection Cause delays for every connection Flood of 14k packets/sec can disable even specialized firewalls Flood of 14k packets/sec can disable even specialized firewalls

IP Traceback Effective & aggressive way to terminate DoS attacks at their sources Effective & aggressive way to terminate DoS attacks at their sources Vulnerability: Vulnerability:  Doesn’t locate the attacker, if attacker is attacking from reflectors

State Monitoring Uses software agents to continuously monitor TCP/IP traffic in a network Uses software agents to continuously monitor TCP/IP traffic in a network RealSecure – RealSecure –  Monitors local network for SYN packets that are not acknowledged for a period of time defined by the users Vulnerabilities: Vulnerabilities:  Need to maintain tremendous states to determine malicious packets and consume system resources

Resource Allocation Control Way to prevent exhaustion of the victim’s resources to limit the resource allocation and usage for each user or service Way to prevent exhaustion of the victim’s resources to limit the resource allocation and usage for each user or service Class Based Queuing – Class Based Queuing –  Configures different traffic priority queues and rules that determine which packets should be put into which queue Vulnerability: Vulnerability:  In case of DoS attacks - Cannot determine which packet belong to the same users or service for sharing some quota or resources

Congestion Control Network Congestion - Reduction in network throughput Network Congestion - Reduction in network throughput Pushback Pushback  Mechanism for defending against DDoS attacks  To identify most of the malicious packets, based on Aggregate-based Congestion Control Vulnerability: Vulnerability:  Not an effective method to block bad traffic under typical DDoS attack  Cannot differentiate good and bad traffic and will drop them equally

Active Networks Programs can perform customized computations and manipulations Programs can perform customized computations and manipulations Allow users to inject customized programs into the nodes of the network Allow users to inject customized programs into the nodes of the network Active edge-Tagging – Active edge-Tagging –  One of the example, which tags the actual source IP address into the active networks layer header for each incoming packets from the hosts with first-hop routers Vulnerability: Vulnerability:  AN poses serious security threats as it is designed to run executable codes on remote hosts

Bandwidth Overhead of Defensive Measures

Memory Overhead of Defensive Measures

Computational Overhead of Defensive Measures

Attacks on Defensive Measures Firewalls - invincible and power unlimited resources Firewalls - still limited and causes the single-failure point or bottleneck Network Congestion - control messages delivered to destination efficiently and successfully Network Congestion - the control messages dropped or lost during transmission Defensive devices - will not be targeted by attacker Defensive devices – Many are vulnerable to attack Network devices - Trustworthy and control messages will not be tampered, eavesdropped or forged Network Devices - Control messages might be tampered, eavesdropped or forged AssumptionReality

Honeypot for DDoS Vantages of System: Vantages of System:  Defending the operational network with high probability against DDoS & new variant  Trapping attacker to record the compromise to help in legal action against attacker Devised System: Devised System:  Implemented to lures the hacker to believe he successfully compromised the system  To learn the tactics, tools, methods and motive of an attacker in order to secure the system

Characterization Should be a replica of operational system Should be a replica of operational system Consists of similar systems and application Consists of similar systems and application Services such as Web, Mail, FTP, DNS should be accessible for attacker Services such as Web, Mail, FTP, DNS should be accessible for attacker Must be located in DMZ Must be located in DMZ

Local Network Protection Must be located in another zone protected with Firewall Must be located in another zone protected with Firewall Encrypted Transmission - Inside the LAN Encrypted Transmission - Inside the LAN Clients run trusted OS Clients run trusted OS Services are managed by an indirect authentication method – Kerberos Services are managed by an indirect authentication method – Kerberos Detecting Systems like host based IDS & vulnerability scanner must be running Detecting Systems like host based IDS & vulnerability scanner must be running

Honeypot Implementation in Organization

View for an Attacker

Issues To Be Resolved Attack must be detectable Attack must be detectable Attack packets must be actively directed to the Honeypot Attack packets must be actively directed to the Honeypot Honeypot must be able to simulate the organization’s network infrastructure Honeypot must be able to simulate the organization’s network infrastructure

Concerns & Issues Not a good idea in real operational environment Not a good idea in real operational environment Require expertise Require expertise Small configuration mistake or loophole will create a disaster Small configuration mistake or loophole will create a disaster Difficult to identify regular user and attacker in most of the cases Difficult to identify regular user and attacker in most of the cases Uses DDoS signature type method while authentication – Not as effective especially for first time authentication Uses DDoS signature type method while authentication – Not as effective especially for first time authentication Hard to identify culprit – Attacker using compromised system Hard to identify culprit – Attacker using compromised system VPN and PKI as proposed – How both the environment work VPN and PKI as proposed – How both the environment work

Conclusion Like a Game - Attacking and defending of networks Like a Game - Attacking and defending of networks Defensive Measure are not always secure and valuable data is at risk with small effort of attacker Defensive Measure are not always secure and valuable data is at risk with small effort of attacker Honeypot – Promising tool for luring attacker for DDoS attack Honeypot – Promising tool for luring attacker for DDoS attack To secure our network – Defensive measures with proper knowledge and expertise are required To secure our network – Defensive measures with proper knowledge and expertise are required