23 rd Annual Computer Security Application Conference Miami, Florida 12/13/2007 Dongqing Yuan Department of Information Technology Management University.

Slides:



Advertisements
Similar presentations
NETWORK SECURITY ADD ON NOTES MMD © Oct2012. IMPLEMENTATION Enable Passwords On Cisco Routers Via Enable Password And Enable Secret Access Control Lists.
Advertisements

CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Web server security Dr Jim Briggs WEBP security1.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 19: Configuring Windows Firewall
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Evil DDos Attacks and Strong Defenses Group 6: Yisi Lu, YuanTong Lu, Hao Wu, YuChen Liu, Hua Li.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Sales Kickoff - ARCserve
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Transmission Control Protocol TCP. Transport layer function.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
CHAPTER 9 Sniffing.
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Open-Eye Georgios Androulidakis National Technical University of Athens.
Module 10: Windows Firewall and Caching Fundamentals.
DoS/DDoS attack and defense
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-1 Lesson 10 Attack Guards, Intrusion Detection, and Shunning.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Cisco IOS Firewall Context-Based Access Control Configuration
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
6.6 Firewalls Packet Filter (=filtering router)
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Chapter 8.
Presentation transcript:

23 rd Annual Computer Security Application Conference Miami, Florida 12/13/2007 Dongqing Yuan Department of Information Technology Management University of Wisconsin-Stout Dr. Jiling Zhong Department of Computer Science Troy University Anatomy of Denial of Service Attack and Defense in a Lab Environment

23 rd Annual Computer Security Application Conference Overview l Introduction of DoS attack l Attack 1– Target is the host l Attack 2 – Target is the network l Summary

23 rd Annual Computer Security Application Conference What is Denial of Service Attack? l “Attack in which the primary goal is to deny the victim(s) access to a particular resource.” (CERT/CC) l The definition covers many types of DoS l Three basic types of DoS– Smurf, Fraggle, SYN Flood Attack. l This study only focuses on SYN Flood Attack –SYN Flooding DoS attacks are the most popular DoS attacks

23 rd Annual Computer Security Application Conference Why it is important to exam this attack? l Easier to launch the attack l Many incentives for attackers: unauthorized use, ego, hate, disrupt competitor… l The design of the Internet l There is no universal solution to the attack

23 rd Annual Computer Security Application Conference Dollar Amount of Losses by Type

23 rd Annual Computer Security Application Conference TCP is susceptible to DoS attacks A: valid senderB: valid receiver SYN SYN + ACK ACK SYN Cache

23 rd Annual Computer Security Application Conference TCP is Susceptible to DoS Attacks A: valid senderB: valid receiver SYN SYN Cache X: attacker SYN SYN Cache Full Packet Dropped

23 rd Annual Computer Security Application Conference DoS Tools l There are lots of DoS tools. l In our simulation, we use Datapool. Datapool is a powerful DoS tool that includes 106 DoS attacks. l ol2.0.tar.gz ol2.0.tar.gz

23 rd Annual Computer Security Application Conference Attack 1– Target is the End Node l Topology: A hub connect web server, sniffer and attacker.

23 rd Annual Computer Security Application Conference Lab Requirement for Attack 1 l A Linux machine is set up as an HTTP Server, the IP address of which is l A Windows XP computer is set up as a Sniffer running Ethereal, which is a program that turns a computer’s NIC card into promiscuous mode to gather all packets on the wire. The Sniffer’s IP address is l Another Linux machine is set up as an Attacker, running Datapool. The attacker’s IP address is

23 rd Annual Computer Security Application Conference Extract the DoS tool Download the Datapool and extract the file.

23 rd Annual Computer Security Application Conference Lauching the DoS attack to the server We launch the DoS SYN flood attack by running datapool.sh with our HTTP Server as the destination, 80 as the port, T3 as the line speed, and sinful as the attack type

23 rd Annual Computer Security Application Conference Attacking…

23 rd Annual Computer Security Application Conference Sniffer Shows a Normal Three-way Handshake

23 rd Annual Computer Security Application Conference Sniffer Shows SYN Flooding Packets

23 rd Annual Computer Security Application Conference Pending Half-connections Pending half-connections waiting in the SYNRECVD state in the Server

23 rd Annual Computer Security Application Conference Analyzing l Upon analyzing the data captured, we find that the attacker sends packets at a rate of 13568/s, with the size of each packet being 60 bytes. l It takes approximately 21 packets to consume a 10 Mbps line, causing our server to stop answering any requests. This attack would theoretically have accomplished this at seconds; l However, due to processing time and propagation delay, our client does not receive notification of the crash until seconds.

23 rd Annual Computer Security Application Conference Defend Solution 1: Rate-limiting Rate-limiting: Limit the number of the connections per second.

23 rd Annual Computer Security Application Conference Defend Solution 2--SYN Cookies l Shipped with Linux and FreeBSD, but unfortunately not enabled by default l Accepts SYN even if table is full, simply don’t keep state-> reconstruct using cookie(seq#) l # echo 1>/proc/sys/net/ipv4/tcp_syncookies

23 rd Annual Computer Security Application Conference Attack 2—Target is on the Network

23 rd Annual Computer Security Application Conference Lab Requirement for Attack 2 l There are three segments of network– Inside, outside, and DMZ. l Inside network is the network we need protect. l DMZ has web server and other services that cab be reached both from inside and outside. l We use CISCO routers 7200 running IOS 12.4 for this attack.

23 rd Annual Computer Security Application Conference Solution 1--CBAC Firewall l CBAC will check the access control list first, if the packets don’t match the list, the packets are dropped. l If match, CBAC inspects all the outgoing packets and maintains state information for every session. CBAC create temporary openings for outbound traffic at the firewall interface. l The return traffic is allowed in only if it is the part of the original outgoing traffic.

23 rd Annual Computer Security Application Conference Solution 1--CBAC Firewall

23 rd Annual Computer Security Application Conference Solution 1--CBAC Firewall

23 rd Annual Computer Security Application Conference Solution 1--CBAC Firewall CBAC provides strong protection against denial-of-service (DoS) attacks. It logs real-time alerts if it detects a DoS attack, and it uses the following commands to prevent DoS attacks:

23 rd Annual Computer Security Application Conference Solution 2– Intrusion Prevention System(IPS) l The Intrusion Detection system is an add-on module to the IOS Firewall Feature Set. It has 59 of the most common attack signatures to detect intrusion. When IPS detects suspicious activity, it logs the event and can either shut down the port or send an alarm before network security is compromised.

23 rd Annual Computer Security Application Conference Solution 2– Intrusion Prevention System(IPS)

23 rd Annual Computer Security Application Conference Solution 2– Intrusion Prevention System(IPS)

23 rd Annual Computer Security Application Conference Signature is triggered

23 rd Annual Computer Security Application Conference Attacking is failing…

23 rd Annual Computer Security Application Conference Build A free DoS Attack World l Customer side–Be a good citizen. How? Using Egress Filtering: Authenticate Source IP of locally generated packets. l ISP side-Using Ingress Filtering: Authenticate source IP of packets from customer. l Host—updated OS, patches. l Stateful Firewall inspect incoming and outgoing packets and create temporary hole in the firewall. l IPS-An ounce of prevention is worth a pound of cure.

23 rd Annual Computer Security Application Conference Summary l Denial of Service attacks represent a fundamental threat to today’s Internet l DoS attacks cost significant losses l Rate-limiting l SYN cookies l Firewall l IPS

23 rd Annual Computer Security Application Conference Reference [1] [2] ar.gz ar.gz [3] TCP-LP: A Distributed Algorithm for Low Priority Data Transfer, In IEEE INFOCOM [4] A. Kuzmanovic and E. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks. In Proceedings of ACM SIGCOMM ’03, Karlsruhe, Germany, August [5] [6] [7] ftp://ftp.isi.edu/in-notes/rfc2267.txt