Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.

Slides:



Advertisements
Similar presentations
COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
DDoS: Distributed Denial of Service Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Rock K. C. Chang.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Defending against Flooding-based Distributed Denial-of- Service Attacks: A Tutorial AUTHOR ROCKY K. C. CHANG, THE HONG KONG POLYTECHNIC UNIVERSITY PRESENTED.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG 12 Interprovider.
Computer Security and Penetration Testing
Outline Definition Point-to-point network denial of service
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Rocky K. C. Chang.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Distributed Denial of Service Attacks 1 Defending against Distributed Denial of Service Attacks: A Tutorial Rocky K. C. Chang, The Hong Kong Polytechnic.
Lecture 15 Denial of Service Attacks
DENIAL OF SERVICE ATTACK
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Final Introduction ---- Web Security, DDoS, others
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Distributed Denial of Service Attacks
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Packet-Marking Scheme for DDoS Attack Prevention
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Denial of Service Attacks: Methods, Tools, and Defenses Prof. Mort Anvari Strayer University at Arlington.
DoS/DDoS attack and defense
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Distributed Denial of Service (DDoS)
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Denial-of-Service Attacks
AP Waseem Iqbal.  DoS is an attack on computer or network that reduces, restricts or prevents legitimate of its resources  In a DoS attack, attackers.
DDoS Attacks on Financial Institutions Presentation
Error and Control Messages in the Internet Protocol
Defending Against DDoS
Red Team Exercise Part 3 Week 4
DDoS Attack and Its Defense
Presentation transcript:

Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant

CS577 Spring 05 2 Introduction (

CS577 Spring 05 3 Introduction  Denial of Service (DoS) Attack – An incident that disables a victim from receiving or providing normal service.  Relies on consuming limited or non-renewable system resources.  Can be launched by using system design weaknesses, CPU intensive tasks, or flooding.  Examples : ping of death, teardrop, smurf.

CS577 Spring 05 4 Distributed Denial of Service (DDoS)  Do not depend on system or protocol weaknesses.  DDoS use the computing power of thousands of vulnerable, unpatched machines to overwhelm a target or a victim.  Compromised host are gathered to send useless service requests, packets at the same time.  The burst of traffic generated, crashes the victim or disables it.

CS577 Spring 05 5 Distributed Denial of Service (DDoS)  Hard to detect and stop.  Can spread within a few minutes.  Usually period of flooding lasts for a few hours, and is sporadic.  IP Spoofing makes it harder to identify attackers.  This is a critical problem because of its potential of use in cyber warfare and ability to disrupt essential government services.

CS577 Spring 05 6 Timeline ( )  May/June, 1998 First primitive DDoS tools developed in the underground -- small networks, only mildly worse than coordinated point-to-point DoS attack.  August 17, 1999 Attack on the University of Minnesota reportedly using trinoo. Campus disconnected from the Internet for 3 days.  Early October 1999 CERT reviews hundreds of Solaris intrusion reports and finds many match the trinoo analysis. They arrange the Distributed System Intruder Tools Workshop.  February , 2000 Attacks on eCommerce sites. Yahoo, eBay, Amazon hacked.  2002 DoS attack on the 13 core root Internet DNS Servers.  Melissa, I Love You, Anna Kournikova Code Red 2003 Slammer

CS577 Spring 05 7 Direct DDoS Attacks  Direct Attacks ( flooding of request packets ) –Attacker sends out packets directly towards the target. –Uses TCP, UDP, ICMP packets and uses random spoofed IP addresses. –Only a few compromised machines are sufficient.  Examples : –TCP SYN flooding ; based on TCP three way handshake, the final ACK from source to victim never arrives. –Congesting a victims incoming link using TCP RST packets, ICMP control packets or UDP packets. –TCP ( 94 %), UDP (2%), ICMP ( 2%)

CS577 Spring 05 8 Reflector DDoS Attacks  Reflector Attacks ( flooding of response packets ) –Attackers initiate an attack that is relayed to reflector machines, such as routers, web servers etc. –Reflectors may or may not be aware. –In response to requests by attackers, reflectors flood victims with reply packets. –Address of victim spoofed in requests to reflectors.  Examples : –Smurf attacks. ICMP echo packets with spoofed victim addresses are broadcast. –TCP SYN ACK flooding. –Bandwidth amplification, attack requests that send response packets of much larger size to the victim.

CS577 Spring 05 9 Direct and Reflector Attacks

CS577 Spring DDoS Attack Setups

CS577 Spring Summary of Reflector Attacks

CS577 Spring Amount of SYN Packets Needed

CS577 Spring Solutions to DDoS  Attack Prevention and Preemption –Prevent hosts from becoming masters/agents; this is hard and inadequate. –Regular patching and security updates.  Attack Source Traceback –Identify source of attack and block it. Routers need to store packet source info. –After the fact measure, cannot stop active attack. –Cannot always trace packet origins. –Ineffective against reflector attacks, because reflectors are legitimate.

CS577 Spring Solutions to DDoS  Attack Detection and Filtering –Identify attack packets using anomaly or misuse detection. –Drop suspect packets. –False Positive Ratio (FPR), False Negative Ratio (FNR) measure efficiency of detection. –While filtering packets, dropping of useful packets should be minimum ; measured by Normal Packet Survival Ratio (NPSR).

CS577 Spring Ideal location for detection/filtering

CS577 Spring Internet Firewall Approach  Packet detection and filtering at source and victim networks not adequate.  Internet Firewall approach –Global defense mechanism that is deployed at the core and drops packets before they reach the victim. –Potential to maintain a victim’s normal service, even during an attack. –Based on Route Based Packet Filtering (RPF) and Distributed Attack Detection (DAD).

CS577 Spring Route Based Packet Filtering (RPF)  RPF –Move the ingress packet filtering from source networks and next level ISP networks to the Internet core. –Check to see if each packet arrives on the correct link, with respect to the source and destination address in the packet. –Drop packet if it arrives from an unexpected link.

CS577 Spring Route Based Packet Filtering (RPF)  Drawbacks –About 18% of ASs need to be equipped with filters. This is a lot and will increase ! –BGP messages need to also carry source addresses, which increases their size. –Reflected packets and packets with legitimate source addresses will still survive.

CS577 Spring Distributed Attack Detection (DAD)  DAD –Extend the packet detection function from the victim network to the core. –Distributed Systems (DSs) are used that work locally to identify attack patterns and then collaborate to identify global attacks. –Uses anomaly or misuse detection. –Must process packets at a high speed. DSs must be placed strategically.

CS577 Spring Distributed Attack Detection (DAD)  Once an attack is confirmed, packet filters are installed and upstream networks notified to drop packets.  The DSs must be available at all times and be able to flood other DS networks with attack alarm messages.  Not very effective in stopping DDoS attacks that last for short periods.  Not effective in stopping Degradation of Service (DeS) attacks.  Consumes time to arrive at global decisions.

CS577 Spring Comparison of DDoS Solutions  Ubiquitous Ingress Packet Filtering (UIPF) –Loacted at the ISP networks that connect to the leaves, spread towards the edges.  Route Based Packet Filtering (RPF) –Located at the core, away from the edges.  Local Area Detection (LAD) –Victims local network or their upstream ISP.  Distributed Attack Detection (DAD) –DSs spread in the core of the Internet.

CS577 Spring Comparison of DDoS Solutions  UIPF, RPF based on spoofed IP addresses and routing info.  LAD, DAD based on traffic pattern anomalies and misuses. Less deterministic than UIPF, RPF, hence more false positives.  All susceptible to false negatives because of problem of reflector packets.  RPF, DAD require new protocols.  UIPF difficult to deploy, huge number of hosts need to be covered.  DAD requires highest computation, hence longest delay in detection.

CS577 Spring Conclusion  Current approaches inadequate.  Attack mechanisms and tools continue to improve.  A global defense mechanism, Internet Firewall may work.  Internet Firewall has deployment issues.

CS577 Spring References 1 based%20distributed%20denial-of-service%20attacks%20%20a%20tutorial.pdf

CS577 Spring