Distributed Denial of Service Attacks 1 Defending against Distributed Denial of Service Attacks: A Tutorial Rocky K. C. Chang, The Hong Kong Polytechnic.

Slides:



Advertisements
Similar presentations
COMP 7320 Internet Security: Prevention of DDoS Attacks By Dack Phillips.
Advertisements

NETWORK SECURITY ADD ON NOTES MMD © Oct2012. IMPLEMENTATION Enable Passwords On Cisco Routers Via Enable Password And Enable Secret Access Control Lists.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
DDoS: Distributed Denial of Service Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Rock K. C. Chang.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Defending against Flooding-based Distributed Denial-of- Service Attacks: A Tutorial AUTHOR ROCKY K. C. CHANG, THE HONG KONG POLYTECHNIC UNIVERSITY PRESENTED.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Computer Security and Penetration Testing
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Rocky K. C. Chang.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
DDos Distributed Denial of Service Attacks by Mark Schuchter.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Lecture 15 Denial of Service Attacks
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
1 Distributed Denial of Service Attacks. Potential Damage of DDoS Attacks l The Problem: Massive distributed DoS attacks have the potential to severely.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
Distributed Denial of Service (DDoS)
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Denial-of-Service Attacks
Comparison of Network Attacks COSC 356 Kyler Rhoades.
DDoS Attacks on Financial Institutions Presentation
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

Distributed Denial of Service Attacks 1 Defending against Distributed Denial of Service Attacks: A Tutorial Rocky K. C. Chang, The Hong Kong Polytechnic University Distributed Denial of Service Attacks Felix Lau, Simon Fraser University Stuart H. Rubin, SPAWAR Systems Center Michael H. Smith, University of Calgary Ljiljana Trajkovic, Simon Fraser University

Distributed Denial of Service Attacks 2 Presented by:Jeff Zhou Saurabh Gupta

Distributed Denial of Service Attacks 3 Outline □ Denial of Service □ DDoS Attacks □ Solutions to DDoS Attacks □ Performance of various queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 4 Denial of Service Attacks □ Denial-of-Service (DoS) attack is an attempt by attacker to prevent legitimate users from using resources □ Denial-of-Service denies a victim (host, router, or entire network) from providing or receiving normal services Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 5 Denial of Service Attacks □ Exploit system design weaknesses □ Ping of death □ Teardrop System patches issued after discovering such attacks □ Computationally intensive tasks □ Encryption and decryption computation Security mechanisms included in the protocols □ DDoS attack ( Flooding-Based) □ Exploit the computing power of thousands of vulnerable, unpatched machines to overwhelm a target or a victim □ CPU, Memory, bandwidth exhaustion The question to be answered! Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 6 Distributed Denial of Service (DDoS) Attacks □ Do not depend on system or protocol weaknesses □ Introduce the “many to one” dimension □ Large number of compromised host are gathered to send useless service requests, packets at the same time □ The burst of traffic generated, crashes the victim or disables it Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 7 Distributed Denial of Service (DDoS) Attacks (Elements) □ Victim (Target) □ receives the brunt of the attack □ Attack Daemon Agents □ agent programs that actually carry out the attack on victim □ attacker gain access and infiltrate the host computer to deploy them □ daemons affect both the target and the host computers □ Master Program/Agent □ coordinates the attack through the attack daemons □ Attacker/Attacking Hosts □ mastermind behind the attack □ using the master, it stays behind the scenes during real attack Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 8 □ In preparation for launching an attack, attacker sets up a DDoS attack network □ one or more attacking hosts □ number of masters □ large number of attack daemons ( also referred to as zombies ) □ Each attacking host controls one or more masters □ Each master in turn connects to a group of attack daemon Typical Distributed Denial of Service (DDoS) Attacks Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 9 Typical Distributed Denial of Service (DDoS) Attacks (contd..) With attack network ready □ Attack hosts launch an ‘attack’ command with □ victim’s address □ attack duration □ attack method, etc □ Master program propagates the command to the attack daemons under its control □ Upon receiving the attack command daemons begin the attack on the victim Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 10 DDoS Attack Methods □ SMURF □ attacker sends large amount of ICMP echo traffic to a set of IP broadcast addresses with victim’s spoofed address □ most hosts accept these ICMP echo requests and respond to them with an echo reply to the source address, i.e. the targeted victim □ multiplies traffic to the victim by number of responding hosts □ On a broadcast network, potentially hundreds of hosts could reply to each ICMP Packet □ This process of using intermediate network devices to elicit many responses to a single packet has been labeled as an “amplifier” process □ amplifier as well as the target victim are impacted □ This method overloads an entire network Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 11 DDoS Attack Methods (contd…) □ SYN Flood (TCP SYN Attack) □ Exploits TCP 3-way handshake □ attacker sends barrage of initial SYNs with spoofed addresses leaving the victim in half-open state, waiting for the non-existent ACKs and retransmitting □ victim’s resources for new connections exhausted by these half-open connections □ UDP Flood □ based on UDP echo and character generator services □ attacker uses forged UDP packets to connect the echo service on one machine to the character generator (chargen) service on another machine □ resultant- the two services consume all available network bandwidth Question- □ Why use the particular combination of echo & chargen? Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 12 DDoS Tools and Their Attack Methods □ TrinooUDP □ Tribe Flood Network (TFN)UDP, ICMP, SYN, Smurf □ Stacheldracht UDP, ICMP, SYN, Smurf □ TFN 2KUDP, ICMP, SYN, Smurf □ ShaftUDP, ICMP, SYN Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 13 Direct Attacks □ Attacker sends large number of packets directly towards victim □ could use SMURF, TCP SYN Flood, UDP Flooding, or a mixture □ another variant of TCP based attack causes the victim to respond with RST packets □ As per one measurement, attack methods in Internet □ TCP packets based attacks – 94% □ UDP packets based attacks – 2% □ ICMP packets based attacks – 2% Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 14 Reflector Attacks □ indirect attack □ uses intermediary nodes (routers & servers), to act as innocent attack launchers – return response packets to the victim in reply to spoofed packets sent by attack daemons □ attack packets reflected in the form of normal packets by intermediary nodes, thus they act as ‘reflectors/amplifiers’ □ capitalizes on a protocol’s ability to automatically generate response messages Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 15 Reflector Attack (examples) Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 16 Minimal Rate of attack packets arrival at victim □ SYN Flooding □ Maximum Lifetime of Half-open connections □ MS Windows2K Advanced Server – 9 sec □ BSD – 75 sec □ Linux Kernel – 309 sec □ for 84 byte long SYN datagram □ 56 kbps connection sufficient to stall Linux & BSD servers with number of half-open connections, N <= 6000 □ 1 Mbps rate sufficient to stall all of above three servers with N <= 10,000 □ ICMP Ping Flooding □ aggregated attack traffic of atleast Mbps to jam a T1 link □ at 1 pkt/sec, around 5000 agents/reflectors needed to flood victim’s T1 link Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 17 Minimal Rate of attack packets arrival at victim (contd…) Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 18 Classification of solutions □ Attack prevention and preemption (before the attack) □ Attack detection and filtering (during the attack) □ Attack source traceback and identification (during and after the attack) Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 19 Attack prevention and Preemption □ Passive side □ Detect master and agent implants by signatures and scanning procedures on the hosts □ Monitor network traffic for known attack messages sent between attackers and masters □ Active side □ Intercept attack plans by employing cyber-informants and cyber-spies Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 20 Attack prevention and Preemption (contd..) Unfortunately, □ Many careless users (or they do not know how to ‘care’) □ ISP and enterprise networks are not willing to monitor for attack □ Attack plans require in-depth knowledge of attack method while it could be changed by attackers realtime-ly to avoid detection Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 21 Attack Source Traceback and Identification □ Locate the criminal after the attack –identify the source of any packet without looking at its may-be-spoofed header □ Record bypassing packets info at routers □ Give every packet’s destination additional information (not sure how this works) Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 22 □ Infeasibility of these methods □ Current IP traceback solutions sometimes doesn’t work (attackers behind firewall or NATs) □ Might involve legitimate sources who innocently act as the reflectors □ Even if malicious sources are detected, stopping them is very difficult (esp. when they are distributed across various ASs) □ Conclusion □ IP traceback - not so effective, but still indispensable Attack Source Traceback and Identification (contd..) Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 23 Attack Detection and Filtering □ Detection □ Filtering □ Detection is easy, filtering is hard □ Filtering Metrics □ False positive ratio (FPR), false negative ratio (FNR) – the effectiveness of telling good from bad □ Normal packet survival ratio (NPSR) – a reverse metric to FPR, could be just 1-FPR Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 24 Attack Detection and Filtering (contd..) During typical large-scale DDoS attacks, a victim is usually doomed (or sacrificed). Nothing can be sent or received by it. Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 25 Attack Detection and Filtering □ At Source Networks - Gladly, □ Spoofed packets can easily be detected and dropped □ If an attack packet is not spoofed (i.e, in direct attack), the source, namely the agent, can be traced -Sadly, □ If spoofed packets contain valid IP address then they can not be detected (i.e, in the same subnet) □ Asking all ISP networks to install ingress packet filtering is also a Mission Impossible Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 26 Attack Detection and Filtering □ At the victim’s Network □ Detection is easy, normally based on traffic anomaly (see [11] for more details) □ Approaches other than detect-and-filter □ IP hopping (moving target defense) – victim changes its IP when being attacked. However, the victim still can be found by DNS tracing □ Proxying TCP connection requests (to deal with SYN flooding) □ Son : Daddy, help! □ Dad: No problem my boy! See how I will kick his ass! □ (After several mins) The Dad went unconscious and the crying boy ran to find his grandpa Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 27 Attack Detection and Filtering □ At a Victim’s Upstream ISP Network □ Usually, we do nothing □ After detecting an attack, the victim network may notify the upstream ISP router the feature of the attack flows based on which the upstream ISP router filters packets □ The notification should be carefully designed □ Can’t be TCP □ Should be protected by strong authentication and encryption to avoid providing another hole for attacking Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 28 Attack Detection and Filtering □ At Victim’s Upstream ISP Network (contd..) □ The filter is not effective which eventually shuts down the victim’s network □ What if even grandpa is not strong enough? □ Son (sobbing, finally found his grandpa): Grandpa, help! □ Grandpa: No problem my boy! See how I will kick his ass and avenge for your father! □ (After several mins) The Grandpa went unconscious and the crying boy ran to find his grandpa’s father (if he is still alive) Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 29 Internet Firewall □ A global defense infrastructure attempts to detect attacks in the Internet core and drops the attack packets □ Two proposals □ A route-based packet filtering (RPF) □ A Distributed Attack Detection approach (DAD – not that boy’s Dad!) Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 30 Internet Firewall □ A Route-Based packet filtering □ Extends the ingress packet filtering to the Internet core, filtering packet according to the inscribed source and destination addresses along with the BGP routing information □ Simulation shows its effectiveness (how to simulate it?) □ Drawbacks □ Falsely drop legitimate packets due to recent route change □ Add to the BGP message size and processing time □ Too many filters need to be placed □ Cannot filter packets with valid source addresses Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 31 Internet Firewall □ A Distributed Attack Detection Approach □ A set of distributed detection systems (DSs) is employed to detection anomalies □ DSs cooperatively detect DDoS attacks by exchanging attack information derived from local observations □ Sophisticated mechanisms are needed to detect anomalies □ A separate channel is needed for them to communication Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 32 Internet Firewall □ A Distributed Attack Detection Approach □ DAD is more practical as it requires much less ‘ implant ’ □ Design of DAD □ How to put them in the network to reduce the overhead to the least while maintaining effectiveness □ How to coordinate them Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 33 Internet Firewall □ A Distributed Attack Detection Approach Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 34 Internet Firewall □ A Distributed Attack Detection Approach H 1 : Presence of a DDoS H 0 : Nothing unusual Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 35 Internet Firewall □ A Distributed Attack Detection Approach □ Packet Filtering □ Install filters on all switch interfaces at the beginning □ DS identifies the involved interfaces □ Remove filters on uninvolved interfaces □ To guarantee the connection between DSs □ Intrusion Detection Exchange Protocol □ Intrusion Detection Message Exchange Format Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 36 Internet Firewall □ A Distributed Attack Detection Approach □ How to detect an attack as soon as possible □ For one DS moves from H 0 to H 1 □ Bayesian formulation □ Threshold-based decision rule □ Threshold-based method is used for global decision Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 37

Distributed Denial of Service Attacks 38 Simulations by Lau etal. □ Simplified version of DDoS on a single targeted router □ Aim □ to compare the ability of various queuing algorithms to alleviate DDoS attacks and provide desired service to legitimate users □ Single target router □ 1 Mbps bandwidth □ All network links □ 1 Mbps bandwidth □ 100 ms delay □ Legitimate user □ 500 byte UDP packets □ 0.1 Mbps rate □ Attack daemons □ 500 byte UDP packets □ 0.3 to 1.0 Mbps rate □ Constant Bit rate Figure 3: Simulated network topologies A, B, and C (left to right). Target is the right most node in the networks. Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 39 Performance of various Queuing Algorithms under DDoS Attack □ Queuing algorithms examined □ Drop Tail □ Fair Queuing □ Stochastic Fair Queuing □ Deficit Round Robin □ RED □ Class Based Queuing □ Conclusions □ Except for RED & Class based Queuing no other algorithm could guarantee bandwidth during DDoS attack □ RED provides limited bandwidth □ Class based Queuing algorithm could guarantee bandwidth for certain classes of input flow, but it requires additional efforts Denial of ServiceDDoS AttacksSolutions to DDoS AttacksPerformance of Queuing algorithms under DDoS Attack

Distributed Denial of Service Attacks 40 Thank you for listening! □ Any question or comments?

Distributed Denial of Service Attacks 41 Appendix A Typical DDoS Attack (Trinoo)

Distributed Denial of Service Attacks prepare for attack 2. set up network3. communication Attacker DDoS: Typical attack process

Distributed Denial of Service Attacks 43 □ The attacker prepares scanning tools, attack tools, root kits, daemon and master programs, lists of vulnerable hosts and previously compromised hosts □ Attacker scans large ranges of network blocks to identify potential targets. Targets would include systems running various services known to have remotely exploitable features □ A list of vulnerable systems is then used to create a script that performs the exploit, sets up a command shell to confirm the success of the exploit. The result is a list of "owned" systems ready for setting up back doors, sniffers, or the daemons or masters □ From this list of compromised systems, subsets with the desired architecture are chosen for network DDoS: Typical attack Target

Distributed Denial of Service Attacks 44 □ A script is then run which takes this list of "owned" systems and produces yet another script to automate the installation process □ The result of this automation is the ability for attackers to set up the denial of service network, on widely dispersed systems whose true owners are unaware of it and these systems go out of their control, in a very short time frame □ Optionally, a "root kit" is installed on the system to hide the presence of programs, files, and network connections □ The attacker(s) control one or more "master" servers, each of which can control many "daemons“ □ The daemons are all instructed to coordinate a packet based attack against one or more victim systems □ All that is then needed is the ability to establish a connection to the master hosts to be able to wage massive, coordinated, denial of service attacks DDoS: Typical attack (contd..)

Distributed Denial of Service Attacks 45 End! At last!