Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.

Slides:



Advertisements
Similar presentations
Syn Flooding Sends TCP connections to a machine faster than it can process themSends TCP connections to a machine faster than it can process them Each.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Review For Exam 2 March 9, 2010 MIS 4600 – MBA © Abdou Illia.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Network Security of Labnet ******. Introduction Test the network security of the servers on our Labnet domain Find Potential Weaknesses Find Security.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Defensive Measures for DDoS By Farhan Mirza. Contents Survey Topics Survey Topics Introduction Introduction Common Target of DoS Attacks Common Target.
Computer Security and Penetration Testing
Outline Definition Point-to-point network denial of service
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Network Attack and Defense
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Web server security Dr Jim Briggs WEBP security1.
Computer Security and Penetration Testing
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
DDos Distributed Denial of Service Attacks by Mark Schuchter.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Chapter 9 Phase 3: Denial-of-Service Attacks. Fig 9.1 Denial-of-Service attack categories.
Denial of Service attacks. Types of DoS attacks Bandwidth consumption attackers have more bandwidth than victim, e.g T3 (45Mpbs) attacks T1 (1.544 Mbps).
DENIAL OF SERVICE ATTACK
Dos (Denial of Services) Aamir Wahid September 23 rd 2004.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Port Scanning.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Honeypot and Intrusion Detection System
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Final Introduction ---- Web Security, DDoS, others
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Network Security Lecture 6 Presented by: Dr. Munam Ali Shah.
CIS 450 – Network Security Chapter 7 – Buffer Overflow Attacks.
Lecture 18 Page 1 Advanced Network Security Distributed Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
Denial of Service Attacks Dr. John R. Durrett ISQS 6342 Spring 2003 Dipen Joshi.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Denial of Service Attacks: Methods, Tools, and Defenses Prof. Mort Anvari Strayer University at Arlington.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
DoS/DDoS attack and defense
Hands-On Ethical Hacking and Network Defense
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
DDoS Attacks on Financial Institutions Presentation
Backdoor Attacks.
CS4622 Team 4 Worms, DoS, and Smurf Attacks
Intro to Denial of Serice Attacks
Presentation transcript:

Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik

Agenda Introduction and Famous Attacks How Attack Takes Place Types of DDOS Attacks Smurfing UDP Flooding TCP SYN Flooding

Introduction Causes service to be unusable or unavailable Coordinated mass scale attack from compromised computers Exhaust bandwidth, router processing, network stack resource Hard to detect at firewall level

Famous Attacks February 2000 Yahoo, Ebay, Amazon websites attacked Yahoo received packet traffic which some websites receive in 1 year 1 billion dollars October of 13 DNS root servers attacked Attack on internet itself

Scanning (Step 1) Port Scanning Search for open ports NMap  Send packets to target to interact  TCP Connect, TCP SYN, UDP, Software Vulnerabilities Common & Default Configuration Weaknesses Nessus  Plugin  Windows, Backdoor, File Sharing, Firewalls, Mail Servers

Stack based Buffer overflow (Step 2) Attacker chooses most vulnerable machines. Buffer overflow occurs when attacker store too much data in undersize buffer. Attacker precisely tune the amount and content of data. Attacker overwrites the return pointer with his own, which points to his code.

Function arguments Return pointer Buffer(Local variable) Bottom of memory Normal Stack Fill Direction

New pointer Attacker machine code Buffer(Local variable) Bottom of memory Function arg Top of memory Fill direction Smashed Stack

Rootkit & Attack (Step 3) Rootkit To get back into compromised system Replace system file with there Trojan version Attack Instruct compromised systems to attack Various flooding methods

DDoS attack

Kinds of Attacks Smurfing UDP Flooding TCP Syn Flooding

Smurfing Attacker sends packet to Network amplifier with return address spoofed to victim IP address Attacking packets are typically ICMP echo request This request generate ICMP echo reply which will flood the victim

TCP SYN Attack Exploits Three way handshaking protocol. Large number of bogus TCP Sync request are sent to victim in order to tie up its resources. No Ack+Syn responses are returned, Server run out of memory resources

TCP SYN Attack

UDP Flooding Connectionless protocol No 3 way handshaking is required Large number of UDP packets saturate the Network and deplete the bandwidth.

DDoS Counter Measures Egress filtering Scanning packets for certain criteria Spoofed address Close all unneeded ports Be More aware Install new patches Check server logs Test scanning tools on your system

Thanks Queries?