Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Denial of Service, Firewalls, and Intrusion Detection
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Final Introduction ---- Web Security, DDoS, others
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service Attacks
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Chapter 7 Denial-of-Service Attacks 7.1. Tấn công từ chối dịch vụ 7.1. Tấn công từ chối dịch vụ Bản chất của tấn công từ chối dịch vụ Bản chất của tấn.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
TCP Security Vulnerabilities Phil Cayton CSE
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Denial-of-Service Attacks
Comparison of Network Attacks COSC 356 Kyler Rhoades.
NETW4005 Computer Security Lecture 5
DDoS Attacks on Financial Institutions Presentation
Denial of Service Attacks
CSE 4905 Denial of Service Attacks
Principles and Practice
Principles and Practice
Lab 2: TCP IP Attacks ( Indirect)
Red Team Exercise Part 3 Week 4
Principles and Practice
Presentation transcript:

Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks

2 Denial-of-service Denial of service (DoS) an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space Attacks (overload or invalid request services that consume significant resources) – network bandwidth – system resources – application resources Have been an issue for some time (25% of respondents to an FBI survey)

3 Classic DoS attacks Flooding ping command – Aim of this attack is to overwhelm the capacity of the network connection to the target organization – Traffic can be handled by higher capacity links on the path, but packets are discarded as capacity decreases Source of the attack is clearly identified unless a spoofed address is used Network performance is noticeably affected

4 Classic DoS attacks

5 Internet Control Message Protocol (ICMP) The Internet Control Message Protocol (ICMP) is one of the main IP protocols; it is used by network devices, like routers, to send error messages indicating (e.g., a requested service is not available or a host or router could not be reached) The host must respond to all echo requests with an echo reply containing the exact data received in the request message

6 Source address spoofing Use forged source addresses – Usually via the raw socket interface on operating systems – Makes attacking systems harder to identify Attacker generates large volumes of packets that have the target system as the destination address Congestion would result in the router connected to the final, lower capacity link Backscatter traffic – Advertise routes to unused IP addresses to monitor attack traffic

7 Backscatter traffic Security researchers (Honeypot Project) advertise blocks of unused IP addresses (no real/legit uses) If ICMP/connection request is made, most likely from attackers Monitoring provides valuable info on the type and scale of attack

8 SYN spoofing Common DoS attack Attacks the ability of a server to respond to future connection requests by overflowing the tables used to manage them Thus legitimate users are denied access to the server Hence an attack on system resources, specifically the network handling code in the operating system

9 TCP connection handshake syn/ack pkts y= server seq# x= client seq#

10 SYN spoofing attack assumption: most connections succeed and thus table cleared quickly

11 SYN spoofing attack: attacker’s source Attacker often uses either – random source addresses (addresses that may not exist) – or that of an overloaded server (that may not send a RST) – to block return of (most) reset packets Has much lower traffic volume – attacker can be on a much lower capacity link Objective: uses addresses that will not respond to the SYN-ACK with a RST

12 Types of flooding attacks Classified based on network protocol used Objective: to overload the network capacity on some link to a server Virtually any type of network packet can be used ICMP Flood – Uses ICMP packets, eg ping (echo) request – Typically allowed through, some required UDP Flood – Alternative uses UDP packets to random ports (even if no service is available, attacker achieves its goal) TCP SYN Flood (SYN spoof vs SYN flood) – Sends TCP SYN (connection request) packets – But for volume attack

13 UDP packet User Datagram Protocol (UDP) is a component of the IP suite and allows computer applications to send messages A UDP can be directed at practically any service (port); if service is unavailable, the packet is discarded but the attacker objective is achieved 13

14 Distributed DoS attacks Have limited volume if single source used Multiple systems allow much higher traffic volumes to form a distributed DoS (DDoS) attack Often compromised PC’s/workstations – Zombies with backdoor programs installed – Forming a botnet Example: Tribe Flood Network (TFN), TFN2K – did ICMP, SYN, UDPF and ICMP floods

15 DDoS control hierarchy Attacker sends one command to the handler zombies; the handler forwards to other handlers, agents

16 Application-based bandwidth attacks Force the victim system to execute resource- consuming operations (e.g., searches, complex DB queries) VoIP Session Initiation Protocol (SIP) flood (see Figure 7.5): attacker sends many INVITE requests; major burden on the proxies – server resources depleted while handling requests – bandwidth capacity is consumed 16

17 SIP invite scenario Standard protocol for VoIP telephony Text-based protocol with a syntax similar to that of HTTP Two types of SIP messages: requests and responses

18 HTTP-based attacks Attempts to monopolize by sending HTTP requests that never complete Eventually consumes Web server’s connection capacity Utilizes legitimate HTTP traffic Spidering: Bots starting from a given HTTP link and following all links on the provided Web site in a recursive way Existing intrusion detection and prevention solutions that rely on signatures to detect attacks will generally not recognize Slowloris

19 Reflection attacks Attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system When intermediary responds, the response is sent to the target “Reflects” the attack off the intermediary (reflector) Goal is to generate enough volumes of packets to flood the link to the target system without alerting the intermediary The basic defense against these attacks is blocking spoofed-source packets

20 Reflection attacks

21 Reflection attacks Further variation creates a self-contained loop between intermediary and target (attacker spoofs using port 7 requiring echoes) Fairly easy to filter and block

22 DNS reflection attacks

23 DNS amplification attacks Use packets directed at a legitimate DNS server as the intermediary system Attacker creates a series of DNS requests containing the spoofed source address of the target system Exploit DNS behavior to convert a small request to a much larger response (amplification) Target is flooded with responses Basic defense against this attack is to prevent the use of spoofed source addresses

24 Amplification attacks 24 Can take advantage of broadcast address of some network

25 Four lines of defense against DDoS attacks Attack prevention and preemption (before attack) Attack detection and filtering (during the attack) Attack source traceback and identification (uring and after the attack) Attack reaction (after the attack)

26 DoS attack prevention Block spoofed source addresses – On routers as close to source as possible Filters may be used to ensure path back to the claimed source address is the one being used by the current packet – Filters must be applied to traffic before it leaves the ISP’s network or at the point of entry to their network Use modified TCP connection handling code – Cryptographically encode critical information in a cookie that is sent as the server’s initial sequence number – Legitimate client responds with an ACK packet containing the incremented sequence number cookie – Drop an entry for an incomplete connection from the TCP connections table when it overflows

27 Attack prevention Rate controls in upstream distribution nets – On specific packets types e.g. some ICMP, some UDP, TCP/SYN – Impose limits Use modified TCP connection handling – Server sends SYN cookies when table full (reconstruct table data from the cookie from legit clients) – Sr selective or random drop when table full

28 Attack prevention Block IP directed broadcasts Block suspicious services and combinations Manage application attacks with a form of graphical puzzle (captcha) to distinguish legitimate human requests Use mirrored and replicated servers when high- performance and reliability is required

29 Responding to attacks Good incidence response plan – Details on how to contact technical personal for ISP – Needed to impose traffic filtering upstream – Details of how to respond to the attack Implement anti-spoofing, directed broadcast, and rate limiting filters Ideally have network monitors and IDS to detect and notify abnormal traffic patterns

30 Responding to attacks Identify type of attack – Capture and analyze packets – Design filters to block attack traffic upstream – Or identify and correct system/application bug Have ISP trace packet flow back to source – May be difficult and time consuming – Necessary if planning legal action Implement contingency plan – Switch to alternate backup servers – Commission new servers at a new site with new addresses Update incident response plan

31 Summary Introduced denial of service (DoS) attacks Classic flooding and SYN spoofing attacks ICMP, UDP, TCP SYN floods Distributed denial of service (DDoS) attacks Reflection and amplification attacks Defenses against DoS attacks Responding to DoS attacks