DDOS. Methods – Syn flood – Icmp flood – udp Common amplification vectors – NTP 557 – CharGen 359 – DNS 179 – QOTD 140 – Quake 64 – SSDP 31 – Portmap28.

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

Review iClickers. Ch 1: The Importance of DNS Security.
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
DNS Amplification and DNS Hijack Risk Mitigation
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
King of Limitations Present by: Ao-Jan Su. Accuracy? Accuracy depends on the distance of end hosts and their authoritative name servers. Not true for.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public Cisco DoS Detecting and Mitigating DoS Attack in a Network Cisco Systems.
Firewalls and Intrusion Detection Systems
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Security Towards a coherent portfolio Walter van Dijk TF-MSP - 27 November 2014.
Arbor Multi-Layer Cloud DDoS Protection
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
DoS/DDoS Attack Forbes Henderson. What is a DoS Attack  DoS Attack (Denial of Service Attack)  A Denial of Service Attack is Often used by hackers to.
Network Attacks. Network Trust Issues – TCP Congestion control – IP Src Spoofing – Wireless transmission Denial of Service Attacks – TCP-SYN – Name Servers.
Lecture 15 Denial of Service Attacks
DDoS Protection, An Inside Look The 3 main types of attacks Will I be victim ? Why Us ? The Top 3 Misconceptions Fact vs Fiction A Realistic Defense.
Anomaly Detection and Mitigation. Outline DoS and DDoS Anomaly Detection and Mitigation Systems Cisco DDoS Anomaly Detection and Mitigation Solutions.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Beyond DDoS: Case Studies on Attack Mitigation for Financial Services Mike Kun and Patrick Laverty, Akamai CSIRT.
ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.
Module 3 DNS Types.
Traffic Engineering for CDNs Matt Jansen Akamai Technologies APRICOT 2015.
Edge Protection 111. The Old World: Network Edge Core routers individually secured Every router accessible from outside “outside” Core telnet snmp.
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.
Summary of Certification Process (part 1). IPv6 Client IPv6 packets inside IPv4 packets.
Paper Presentation – CAP Page 2 Outline Review - DNS Proposed Solution Simulation Results / Evaluation Discussion.
It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
BCOP on Anti-Spoofing Long known problem Deployment status Reason for this work Where more input needed.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
DDoS Monitoring/FlowSpec
Distributed Denial of Service Attacks
FOR INTERNAL USE ONLY [Your business] exceeds with COLT Network Response to DDoS attacks – TNC 2006 Nicolas FISCHBACH Senior Manager, Network Engineering.
Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
1 Defense Strategies for DDoS Attacks Steven M. Bellovin
4061 Session 26 (4/19). Today Network security Sockets: building a server.
DoS/DDoS attack and defense
DDoS Monitoring/Mitigation
Harness Your Internet Activity. Random Subdomain Attacks Plaguing the Internet.
Role Of Network IDS in Network Perimeter Defense.
John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante Northwestern, EECS.
© A10 Networks, Inc. Distributed Prevention of DoS Collaboration is key.
Confidential | | The Naughty port Project Prepared by: Erik Bais May 2016 RIPE – Copenhagen, DK.
KEYNOTE OF THE FUTURE 3: DAVID BECKETT CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
A Speculation on DNS DDOS
Daniel “3ICE” Berezvai Reverse Proxy Presentation by:
Domain 4 – Communication and Network Security
A Speculation on DNS DDOS
DRUPAL CON NASHVIllE 2018 DRUPALCON NASHVILLE.
Is Your Online Security Intelligent? Internet Performance Management
CS 2550 Foundations of Cybersecurity
AKAMAI INTELLIGENT PLATFORM™
DRDoS Attacks Jacob Wood.
Content Delivery and Remote DNS services
Amplification Hell: Revisiting Network Protocols for DDoS Abuse
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

DDOS

Methods – Syn flood – Icmp flood – udp Common amplification vectors – NTP 557 – CharGen 359 – DNS 179 – QOTD 140 – Quake 64 – SSDP 31 – Portmap28 – mDNS10 – SNMPv2 6 Volumetric vs Overwhelming a service

Infrastructure vulnerable to Volumetric Attack Campus Network “last mile” Firewalls, other traffic-impeding middleboxes Monitoring uwsys.net upstream transit Etc.

Don’t be a participant Filter – Block or rate-limit known vectors – Deprecate open recursive resolvers – Anti-spoofing uRPF, ACLs Monitor. Can you detect DDoS in your traffic? UWSys has some monitoring and aggressive filters where plausible. (more from Michael later)

Example (volumetric) Motivations On-line gaming / forums – Take a specific user offline – Revenge Avoid exams – Disrupt online services Create a distraction – Then hack machines while monitoring/staff is overwhelmed Wreak havoc – Happened to Rutgers

Economics

But, I have a DR plan

Example: Resilient web hosting Oh, so you want to make a change to DNS? – Where is your SOA? – Where are the authoritative servers?

Of the 15 major UW domains, – 3 do not have any NS records off-site at all. Really. – 9 still share fate with uwsys network – Only 3 have off-site (non uw-system) resiliency – Zero have SOA off-site.

DDOS Solution Space Needed: a holistic approach Cloud(me) Network(Dan D., Michael H.) Appliance(Greg P., Scott B.)

Pat People Processes Technology

DDOS Detection

The Movies

Reality

Cloud Mitigation CDN hosting – Typically a dns redirect DR Load balancing “web application firewall” (Reverse proxy) Scrubbing Recall, (2) types of DDOS: Application / Overwhelm a service Volumetric Attack:

Scrubbing Contract in place with a provider Pre-configured GRE tunnel to scrubbing provider Process netflow, Alert a human to look at it Tell provider to scrub for a prefix (via BGP) Scrubber announces more-specific prefixes (up to /24) to Internet, processes traffic, sends legitimate traffic back via GRE Pricing models vary – amount of scrubbing capacity under contract – What the data rate of the clean traffic should be – Incidental overage vs long-duration

The era of unsolicited packets is over... Can’t we just turn off / rate limit UDP? QUIC – Google’s experiment to replace TCP+TLS+SPDY