Foundations of Network and Computer Security J J ohn Black Lecture #25 Oct 30 th 2009 CSCI 6268/TLEN 5550, Fall 2009.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

TCP Flooding. TCP handshake C S SYN C SYN S, ACK C ACK S Listening Store data Wait Connected.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Distributed Reflection Denial of Service Networking Talks for the Insufficiently Paranoid Based on:
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Raw Sockets CS-480b Dick Steflik Raw Sockets Raw Sockets let you program at just above the network (IP) layer You could program at the IP level using.
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG 12 Interprovider.
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Outline Definition Point-to-point network denial of service
Foundations of Network and Computer Security J J ohn Black Lecture #26 Nov 4 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #26 Nov 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #25 Nov 2 nd 2007 CSCI 6268/TLEN 5831, Fall 2007.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Foundations of Network and Computer Security J J ohn Black Lecture #16 Oct 25 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #23 Oct 26 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Foundations of Network and Computer Security J J ohn Black Lecture #13 Oct 7 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Lecture 15 Denial of Service Attacks
Chapter 9 Phase 3: Denial-of-Service Attacks. Fig 9.1 Denial-of-Service attack categories.
Denial of Service attacks. Types of DoS attacks Bandwidth consumption attackers have more bandwidth than victim, e.g T3 (45Mpbs) attacks T1 (1.544 Mbps).
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Routers and Routing Basics CCNA 2 Chapter 10.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
CSE 461 Section. Let’s learn things first! Joke Later!
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Distributed Denial of Service Attacks
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Department of Information Engineering1 About your assignment 5 -layers Model Application Layer(HTTP, DNS,...) TCP Layer(add sequence number to packets)
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
1 Distributed Denial of Service Attacks. Potential Damage of DDoS Attacks l The Problem: Massive distributed DoS attacks have the potential to severely.
DoS/DDoS attack and defense
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Role Of Network IDS in Network Perimeter Defense.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. SANS ‘98 Conference -
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
Introduction to Information Security
ITIS 6167/8167: Network and Information Security
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black Lecture #25 Oct 30 th 2009 CSCI 6268/TLEN 5550, Fall 2009

SYN Floods A TCP-based method –Normal TCP handshake starts with SYN from client –Causes server to make an entry in the “SYN queue” and use up some time –SYNs are very small, so attacker sends a ton of them –A SYN at the server is called a “half-open connection” These eventually time out, but it takes a while

First Attempted Remedy: Filtering Victim can try and filter out the IP source address of the attacker –This has to be done upstream or the victim’s connection bandwidth is saturated If ISP is willing to install a filter on the appropriate source address, this works –But attacker can spoof source IP Attacker is not completing any TCP association, and wants to leave connections half-open This is almost always done

Reflection Attacks (aka “Smurfing”) Technique for amplifying traffic –Often works behind firewalls as well –Instead of flooding victim V with SYNs, we send SYNs to hosts H 1, H 2, …, H n and spoof the source address as V (Here n is large… say, 1000 or more) Hosts send SYN/ACK to V V is very confused and reacts in various ways If hosts are behind firewall, it appears as though attack is coming from local machines Hosts are usually not overwhelmed, so they don’t feel the attack

DDoS: Distributed DoS Now, multiple attackers

DDoS Most famous attack was in Feb 2000 against Amazon, Yahoo, eBay, and other major e-commerce sites Estimated losses of $1.2 billion US Easy for almost anyone to launch –Most of these, by the way, are hackers attacking other hackers

Recruiting “Zombies” A “Zombie” is a computer which has been captured by the attacker –Typically by a virus or by just using some vulnerability Each infiltrated computer receives a hidden program from the “Zombie Master” The Zombie Master keeps a list of which computers he has control over When the time comes, he instructs all of his Zombies to simultaneously attack the victim computer

Case Study: The Gibson Story Who is Steve Gibson? –Owns Gibson Research Corp (grc) –Old time programmer –Self-proclaimed security expert –Writes tools in assembly (!) –Has taken on Microsoft for raw sockets in XP More on this later –Some don’t like him (

The GRC Story Please read this article; it’s on our web page. It’s kind of wordy, but fun and informative reading.

The Story At 8pm on Friday May 4 th, 2001, grc.com disappeared from the Internet

DDoS Attack T1 trunks are 1.54Mbit/sec Verio has 100Mbit/sec connections to Internet UDP traffic aimed at port 666 –Large packets which had fragmented into 1500-byte chunks –Firewall discarded it, but still saturated T1’s –Need to filter at Verio’s end

Filtering After some calls, filtering is in place –Verio blocks UDP and ICMP Until Win2K and XP, it was difficult to send SYNs –Sending SYN’s would have been hard to block since this would have meant shutting down all TCP connections, including http to grc.com Raw sockets in Win2K and XP mean that spoofing source IP is now possible, which also makes it harder to filter (as mentioned already)

Zombies Gibson tracked 474 source addresses sending the packets –All compromised windows machines –Most popular are cable-modem boxes Always on, high bandwidth home.com rr.com aol.com mediaone.net uu.net btinternet.com shawcable.net optonline.net ne.jp chello.nl ntl.com videotron.ca ad.jp psi.net uk.com

Attacks Continue Attacker re-targets –First goes to IP of firewall This is different from the IP of the grc.com server Verio shuts down ICMP and UDP to this IP as well –Then goes to the Cisco router Since it’s STILL on the grc side of the T1, it again knocks grc.com off the network –How is the attacker getting these IP addresses? Traceroute

Size of the Attack Verio filtered 2.4 billion fragmented UDP datagrams headed for port 666 –grc.com was completely unaware of the attack –Filtering relied on being able to track source IP addresses Would not have worked if attacker had spoofed source IP, which is commonly done nowadays

Meet the Attacker The attacker, it turns out, was 13 –“Wicked” said he was attacking grc.com because Gibson had allegedly referred to a friend as a “script kiddie” –Gibson said he did not and asked the attacks to stop They did for a while, but resumed –Gibson tracked the IP to a town in Wisconsin, but needed Earthlink to cooperate to find the actual phone number They wouldn’t

@Home Gibson tried to –Wanted to inform them of the 100+ users who were compromised And from which he was being attacked –No useful response They wanted the IPs, but wouldn’t let Gibson have the zombie code, which he really wanted Gibson refused to give up the IPs

The Feds Gibson calls the FBI –Until $5,000 of damage had been done, no crime had even been committed. –Secondly, they said that even if they did manage to meet the $5,000 minimum required for "Wicked's" activities to qualify as criminal, their staffs were overloaded and swamped with cases involving companies that had lost huge sums of money to Internet crime. –Finally, they said that since "Wicked" was only 13 years old, nothing much would happen to him, even if the preponderance of evidence demonstrated that he was behind the attacks. They said that a couple of agents might go out to his home and have a talk with his parents, but in this country his youth was an impenetrable shield.

The Feds (cont) Gibson gave the IPs to the Feds Gibson also noted that Wicked was in trouble at age 8, had computer removed until age 10, was monitored for 1 year and was now back at it

Gibson gets the Bot Bot was anonymously dropped into a mailbox –It was an IRC client Password-protected chat room 100’s of other machines came and went as Gibson waited –Suddenly Gibson’s test machine was attacking Finland –Gibson decides to “neuter” the zombie and just monitor it

Long Story Short Eventually he meets more senior hackers –Surprised to see him in the chat room –Gets them to talk to Wicked –Attacks stop He learns a lot about the Sub7Server trojan –Invasive zombie program Monitors key strokes for password, cc#s, etc. netstat -an | find ":6667" TCP : :6667 ESTABLISHED

How Common are DDoS Attacks? Backscatter Analysis – I’m not assigning this as reading –Idea is that almost all spoofed traffic uses a randomly generated source IP All popular DDoS attack tools do this –trinoo, TFN, TFN2k, Stacheldraht, etc. –When replies from victim are sent, they go to this (bogus) source IP

Backscatter Technique CAIDA (San Diego) owns large block of IP address space –They have a lightly-used Class A network –They assumed All source addresses uniformly chosen –Misses reflection attacks All attack packets reliably reach victim All replies reliable leave victim Any unsolicited replies seen by CAIDA were backscatter

Approach Backscatter packets revealed –Type of attack SYN/ACK means SYN flood ICMP messages from routers indicated other types of attacks like UDP floods –IP of victim Source address of backscatter –Intensity of attack –Duration of attack

Results 12,805 distinct attacks against over 5,000 hosts in 2,000 organizations in three weeks About 6000 packets per sec on average

DDoS: Preventative Measures Tracing and filtering –If source addresses could not be forged, filtering would be a reasonable solution Ingress filtering –Idea: if you are an ISP, don’t let packets leave your IP address space if they have source addresses out side your address space –Old idea –Simple –Still a lot of ISPs don’t do this –Even with ingress filtering, attackers can jump around within a range of IP addresses –Note that this limitation meant some backscatter numbers were probably a bit off

SYN Cookies A SYN flood leaves half-open connections –The “SYN queue” is a data structure which keeps track of these half-open connections –We track the source IP and port of client, server IP and port, seq# of client, seq# of server –Idea: we don’t really need to keep all of this We just need enough to recognize the ACK of the client Can we get away without storing anything locally?

SYN Cookies: The Idea Store nothing locally –ISN: Initial sequence number –Encode all we need to remember in the ISN we send back to the client –t: a 32-bit counter which increments every 64 seconds –K: a secret key selected by server for uptime of server –Limitations: MSS limited to 8 values t mod 32MSS hash(client IP and port || server IP and port || t || K) Server ISN 5 324

SYN Cookies: Details MSS: Maximum Segment Size –Suggested by client, server then computes best value Details depend on whether they are on the same network, MTU on network, etc Server can have only 8 values to encode here What happens when client replies with ACK? –Client will reply with ISN+1 of server in the ACK –Server then subtracts 1 and checks against hash of client IP and port, server IP and port, t which matches in the lowest 5 bits, and K If match, put in SYN queue If not, ignore

SYN Cookies: Limitations Note that this will NOT prevent bandwidth- saturation attacks –This technique seeks only to prevent SYN queue overflows –If attacker can saturate bandwidth, this doesn’t help But note that bandwidth saturation is not going to be TCP-based UDP and ICMP can be used for bandwidth saturation, but we are often less dependent on these protocols

SYN Cookies: Implementation Standard in Linux and FreeBSD echo 1 > proc/sys/net/ipv4/tcp_syncookies As far as I know, Windows does not implement them yet