Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011
Introduction A Constant threat to the web based providers Resources of servers limited Damaging effect on targets Goal: Drown out all legitimate traffic to server – Consume resources of servers – Monopolize the CPU – Mimic legitimate traffic to server Method: Combine computing power over internet – Distribute the Denial of Service Attack (DDoS)
DoS in the news Attacks on WordPress Mar 4 th, 2011 – Largest in History – Multiple Data Centers unable to handle load – Collateral damage for single target Anonymous attacks on MasterCard, Visa Dec 8 th 2010 – Individuals organizing DoS attack – Social Networking – Personal Computers launched DoS Twitter, Facebook attacks Aug 5 th, 2009 – Flood of s – Target was individual using social networking tools
Botnet Network of infected computers – Computers Hijacked with malware – Contacted and controlled by perpetrator of attacks – Target victim with requests Added Obfuscation and Computing Power – Large network of personal and corporate computers – Source looks legitimate to victim
IP spoofing Packets are sent out with a forged return IP address – Hides source of attacks Complete TCP Connection cannot be formed – Victim host responds to random IP packet/
SYN Flood Critical Mass of Connection packets – TCP connections started with SYN(Synchronization) packet. – Server responds but never receives acknowledgement – Attacker creates many half open connections – Connections open use up server memory – Attacker monopolizes server with open connections
TCP Connection vs Spoofed Packet os_copy.html
Reflection Attacks “Reflect” requests off innocent servers – Return IP Address forged on to packet intended target of attack – Attacker sends packet to diverse set of hosts – Hosts act as middle man for the attack Tracking packets task more difficult – Indirect path from attacker to victim – Rely on records of intermediate hosts
Reflection Attack os_copy.html
Full HTTP Requests Requests require greater amount of CPU time – Databases queries – Complex calculations – Files access Attacks hidden through Botnet – Infected computers appear to be legitimate users – Botnets sufficiently large
Final Observations Extremely Potent – Capable of knocking even largest companies offline Costly to victims – Services denied to e-commerce websites, public safety Increasing risk of attacks – More tools and resources moving online High collateral damage – Information interdependent – Hosts attacked or being used to attack
References Visa_others_hit_by_DDoS_attacks_over_WikiLeaks Visa_others_hit_by_DDoS_attacks_over_WikiLeaks amateur- idUSLNE6B902T ?feedType=RSS&feedName=everything&virtualB randChannel= amateur- idUSLNE6B902T ?feedType=RSS&feedName=everything&virtualB randChannel= ?_r=2&hpw ?_r=2&hpw