Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

Slides:



Advertisements
Similar presentations
On the Necessity of Handling DDoS Traffic in the Middle of the Network Peter Reiher UCLA Computer Communications Workshop October 22, 2008.
Advertisements

REFLEX INTRUSION PREVENTION SYSTEM.. OVERVIEW The Reflex Interceptor appliance is an enterprise- level Network Intrusion Prevention System. It is designed.
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
Availability Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Aspects of Computer.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public Cisco DoS Detecting and Mitigating DoS Attack in a Network Cisco Systems.
Firewalls and Intrusion Detection Systems
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
Security Awareness: Applying Practical Security in Your World
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
1 Pertemuan 10 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Network Attacks. Network Trust Issues – TCP Congestion control – IP Src Spoofing – Wireless transmission Denial of Service Attacks – TCP-SYN – Name Servers.
Lecture 15 Denial of Service Attacks
Department Of Computer Engineering
Anomaly Detection and Mitigation. Outline DoS and DDoS Anomaly Detection and Mitigation Systems Cisco DDoS Anomaly Detection and Mitigation Solutions.
Is Apple’s iMac Operating System Secure under flooding Attacks? by aditya chintala.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
FIREWALL Mạng máy tính nâng cao-V1.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Computer & Network Security
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Securing Wired Local Area Networks(LANs)
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
BGP Man in the Middle Attack Jason Froehlich December 10, 2008.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
DDOS. Methods – Syn flood – Icmp flood – udp Common amplification vectors – NTP 557 – CharGen 359 – DNS 179 – QOTD 140 – Quake 64 – SSDP 31 – Portmap28.
Denial of Service (DoS) Attacks: A Nightmare for eCommerce Jearanai Muangsuwan Strayer University.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
GORAN OSIM AND TIM MYERS CPSC 424 DDOS AND THE SYSADMIN.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
DDoS Defense: Utilizing P2P architecture By Joshua Aslan Smith.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
KEYNOTE OF THE FUTURE 3: DAVID BECKETT CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
DDoS Attacks on Financial Institutions Presentation
CONNECTING TO THE INTERNET
Network Security Analysis Name : Waleed Al-Rumaih ID :
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
DRUPAL CON NASHVIllE 2018 DRUPALCON NASHVILLE.
CORE Security Technologies
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams

Agenda Types of Attack Source of Attacks Prevention History of Attacks Business Aspect

TCP Connection Attack (SYN FLOOD)  Normal Connection  SYN Flood

 HTTP Get Flood  HTTP Post Flood Application Layer Attack

Source of Attack  Botnets What are they? How are they Created? Notable Botnet Army’s ○ Storm ○ Rbot  For-Hire How much does it cost? Rent an Army Threat Level?

Prevention  Detect the threat  Mitigate the threat Distinguish good traffic from bad traffic Block bad traffic while still allowing good traffic through.  Protect all points of vulnerability.

Prevention Methods  Blackholing  Overprovision  Routers  Firewalls  Intrusion Detection Systems (IDS)  Third Party Protection

Blackholing  Blocking all traffic the network as far upstream as possible.  Traffic is diverted to a “black hole” where it is discarded.  Good and bad packets are discarded. Not an efficient solution to a DDoS attack. Attacker’s objective is still fulfilled.

Firewalls  Not purpose-built for DDoS attacks, but provide some protection.  Reside too far downstream in the network.  Lack of anomaly detection, can’t recognize when valid protocols are being used in an attack.  Cannot perform antispoofing on a packet by packet basis.

Third Party Protection  DNS based redirect service.  Border Gateway Protocol (BGP) based service.  Content Delivery Network (CDN) providers.

History of Attacks  Anonymous Hacktivist Group (Civil Disobedience)  Lizard Squad PlayStation 4 Network, Xbox Live, Facebook  GitHub Attack Chinese Government, Replaced JS Code to Force reload pages  Happening Now Digital Attack Map

Business Aspect Costs for Businesses

DDoS Attacks Lead to:  Software & Hardware Replacements  Reduction in Revenue  Loss of Consumer Trust  Customer Data Theft

Questions? Types of Attack Source of Attacks Prevention History of Attacks Business Aspect Demonstration

References      services-offering-to-take-down-your-competitors-web-sites- going-mainstream/ services-offering-to-take-down-your-competitors-web-sites- going-mainstream/   _defense_of_ddos.html _defense_of_ddos.html  attacks-tops-half-a-billion-dollars attacks-tops-half-a-billion-dollars  insurance-can-serve-as-an-ideal-ddos-attack-response-plan/ insurance-can-serve-as-an-ideal-ddos-attack-response-plan/  DDoS-attack-can-cost-a-company-more-than dollar DDoS-attack-can-cost-a-company-more-than dollar