PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.

Slides:



Advertisements
Similar presentations
Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
Advertisements

DMZ (De-Militarized Zone)
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
IUT– Network Security Course 1 Network Security Firewalls.
Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
The Latest In Denial Of Service Attacks: “Smurfing” Description and Information to Minimize Effects Craig A. Huegen Cisco Systems, Inc. NANOG 11 Interprovider.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing Base on RFC 2827 Lector Kirill Motul.
1 Controlling High Bandwidth Aggregates in the Network.
Web server security Dr Jim Briggs WEBP security1.
A Guide to major network components
COEN 252: Computer Forensics Router Investigation.
Lecture 15 Denial of Service Attacks
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Access Control List (ACL)
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
GORAN OSIM AND TIM MYERS CPSC 424 DDOS AND THE SYSADMIN.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Hervey Allen Sebastian Buettrich Network Startup Resource Center – nsrc.org Welcome to PacNOG 6!
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
DoS/DDoS attack and defense
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
1 Virtual Dark IP for Internet Threat Detection Akihiro Shimoda & Shigeki Goto Waseda University
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Quiz 2 -> Exam Topics Fall Chapter 10a - Firewalls Simple Firewall - drops packets based on IP, port Stateful - Keeps track of connections, set.
Data Security in Local Network Using Distributed Firewall Presented By- Rahul N.Bais Guide Prof. Vinod Nayyar H.O.D Prof.Anup Gade.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Denial-of-Service Attacks
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Linux Firewall Iptables.
FIREWALL configuration in linux
Computer Data Security & Privacy
Filtering Spoofed Packets
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Setting Up Firewall using Netfilter and Iptables
AbbottLink™ - IP Address Overview
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center

Overview: What is a “DDoS” DDoS  “Distributed Denial of Service” Attack DOS  “Denial of Service” Attack “A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. It generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.”*Internetsiteservice *

Automated DDoS Attacks

Overview: How to Mitigate DDoS Ingress/Egress filters Capacity Contingency Response Firewalls Separation of services Monitor traffic flow Monitor services Monitor your logs

Ingress Filters See PacNOG5 Network Security Track for details: RFC2827 (BCP38) – Ingress Filtering If an ISP is aggregating routing announcements for multiple downstream networks, strict traffic filtering should be used to prohibit traffic which claims to have originated from outside of these aggregated announcements. The ONLY valid source IP address for packets originating from a customer network is the one assigned by the ISP (whether statically or dynamically assigned). An edge router could check every packet on ingress to ensure the user is not spoofing the source address on the packets which he is originating.

Egress Filters Deny Broadcast Packets from infected machines.

Add Capacity This is expensive! Overbuild on network infrastructure: –Routers –Switches Verify servers have extra capacity. This is what larger organizations are doing today. It’s expensive. Many of you are temporarily “protected” from DDoS due to incoming network bandwidth.

Contingency Response Have a plan Know who to call –Do you have the technical contacts for your upstream provider? –Your technicians. Do you have a way to contact them during off-hours. Which services are critical. Can others be dropped? Turned off? Can you temporarily add capacity if necessary?

Firewalls In Linux you can use iptables: Rules are stored in a file. First rule is generally “deny all” $IPTABLES -P INPUT DROP $IPTABLES -P OUTPUT DROP $IPTABLES -P FORWARD DROP Rules look something like… ipfw add deny tcp from evil.doers.org to nice.people.org 22 ipfw add deny log tcp from evil.crackers.org/24 to nice.people.org Large, in-depth discussion here:

Separation of Services Often services are targeted, such as: –web –dns –ftp –mail Try to place these on separate machines. Or, move a service to another machine if necessary. Place services on different parts of your network (other IP address ranges…)

Monitor Traffic Flow Using tools like Netflow, NfSen, Smokeping, etc. Configure alarms for traffic thresholds.

Monitor Services Lots and lots of tools for this. Nagios, Cacti, Smokeping we’ve seen this week. Trigger alarms when service degrades.

Monitor Logs We just learned about this! Be sure you do it! Swatch, syslog, syslog-ng, etc. Monitor your log file sizes. You can do this with Cacti, Nagios, scripts. Use your logs for forensic research: $ sudo grep ssh /var/log/messages | less