Dynamic Web Project Please use it http://dynamicweb.csail.mit.edu.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 Reading Log Files. 2 Segment Format
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Defensive Measures for DDoS By Farhan Mirza. Contents Survey Topics Survey Topics Introduction Introduction Common Target of DoS Attacks Common Target.
Firewalls and Intrusion Detection Systems
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Outline Definition Point-to-point network denial of service
An Introduction to DDoS And the “Trinoo” Attack Tool Prepared by Ray Lam, Ivan Wong July 10, 2003.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
DDos Distributed Denial of Service Attacks by Mark Schuchter.
Network Attacks. Network Trust Issues – TCP Congestion control – IP Src Spoofing – Wireless transmission Denial of Service Attacks – TCP-SYN – Name Servers.
Lecture 15 Denial of Service Attacks
Chapter 9 Phase 3: Denial-of-Service Attacks. Fig 9.1 Denial-of-Service attack categories.
Denial of Service attacks. Types of DoS attacks Bandwidth consumption attackers have more bandwidth than victim, e.g T3 (45Mpbs) attacks T1 (1.544 Mbps).
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
FIREWALL Mạng máy tính nâng cao-V1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Network Security Denial of Service Attacks Dina Katabi nms.csail.mit.edu/~dina.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
The Transmission Control Protocol (TCP) TCP is a protocol that specifies: –How to distinguish among multiple destinations on a given machine –How to initiate.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
CS426Network Security1 Computer Security CS 426 Network Security (1)
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
Network & WebSecurity Dina Katabi nms.csail.mit.edu/~dina.
CS526Topic 18: Network Security1 Information Security CS 526 Network Security (1)
Group 8 Distributed Denial of Service. DoS SYN Flood DDoS Proposed Algorithm Group 8 What is Denial of Service? “Attack in which the primary goal is to.
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
Denial of Service Attacks: Methods, Tools, and Defenses Prof. Mort Anvari Strayer University at Arlington.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
1 Distributed Denial of Service Attacks. Potential Damage of DDoS Attacks l The Problem: Massive distributed DoS attacks have the potential to severely.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
Security System for KOREN/APII-Testbed
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Introduction to Information Security
Distributed Denial of Service Attacks
Network Security: DoS Attacks, Smurf Attack, & Worms
Distributed Denial of Service Attacks
Red Team Exercise Part 3 Week 4
Distributed Denial of Service Attacks
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Dynamic Web Project Please use it http://dynamicweb.csail.mit.edu

Network Security Dina Katabi dk@mit.edu nms.csail.mit.edu/~dina

Network Attacks Are Common Attack Types: Denial of service attacks Spam Worms & Viruses and others Attack targets End systems including attacks on Web servers, TCP, etc. Links Routers DNS And others Who are the attackers? Script kiddies Professionals who do it for money

Mounting An Attack

Attacker’s Goals Hide Maximize damage These goals are essential to understand what makes an attack effective and how to counter attacks

Attacker Wants to Hide Spoof the source (IP address, email account, ...) Indirection Reflector attacks: E.g., Smurf Attack ICMP Echo Req Src: Victim’s addr Dest: brdct addr gateway Attacker Victim

Attacker Wants to Hide Spoof the source (IP address, email account, ...) Indirection Reflector attacks: E.g., Smurf Attack gateway Victim Attacker ICMP Echo Reply Dest: Victim

Increase Damage  Go Fully Distributed  Use a Botnet Attacker Unidirectional commands Master Master Master Coordinating communication Daemon Daemon Daemon Daemon Daemon Daemon Daemon Daemon Daemon Daemon Attack traffic Victim

Some Distributed Denial of Service (DDoS) Tools Many public tools for flooding a victim with unwanted traffic Trin00 (Trinoo) Client ported to Windows TFN – Tribe Flood Network TFN2K – Updated for 2000 Stacheldraht German for “Barbed Wire”

Trin00 a.k.a. “The Distributed DoS Project” Strengths Weakness Password protected options, encrypted daemon list Startup, remote control, and kill Weakness All messages (commands) sent in clear. Easy to fingerprint if network is infected

Trinoo Transcript Connection to port (default 27665/tcp) attacker$ telnet 10.0.0.1 27665 Trying 10.0.0.1 Connected to 10.0.0.1 Escape character is '^]'. Enter passwd Betaalmostdone trinoo v1.07d2+f3+c..[rpm8d/cb4Sx/] trinoo>

Trin00 Commands dos <IP> - command to initiate a DoS against the targeted <IP> address mdos <IP1:IP2:IP3> - sends command to attack three IP addresses, sequentially die – shut down the master mdie <password> - if correct password specified, packet is sent out to all daemon nodes to shutdown mping – ping sent to all nodes in the deamon list killdead – delete deamon nodes from list that didn’t reply to ping bcast – gives a list of all active daemons mstop – Attempts to stop an active DoS attack. Never implemented by the author(s), but the command is there

Bots Stories Every day 30,000 new machines become zombies/bots Bots of 20,000+ machines are reported Bots are rented by the hour Bots are used for a variety of attacks, DDoS, Spam, as web servers which serve illegal content,…

DoS Attacks

Attacks on Bandwidth Brute force attack Attacker sends traffic to consume link bandwidth What kind of packets? ICMP Echo (e.g., TFN); UDP data (e.g., Trinoo, TFN); Junk TCP data or Ack packets (Stacheldraht v2.666, mstream); TCP SYN packets (TFN, Stacheldraht)

Defending against bandwidth attacks is hard Bottleneck Link ISP network Victim network Should drop packets before the bottleneck, i.e., at ISP But ISPs are not willing to deploy complex filters for each client ISPs have no strong incentive; they charge clients for the traffic Big companies defend themselves by using very high bandwidth access links

Attacks on TCP

TCP SYN Flood TCP DoS Attacks: C S SYNC Listening Store data SYNS, ACKC Wait ACKS Connected

TCP SYN Flood TCP DoS Attacks: C S SYNC1 Listening SYNC2 Store data

TCP DoS Attacks: TCP SYN Flood Usually targets connection memory  Too many half-open connections Potential victim is any TCP-based server such as a Web server, FTP server, or mail server To check for SYN flood attacks Run netstat -s |grep "listenqueue overflows“ and check whether many connections are in "SYN_RECEIVED" How can the server deal with it? Server times out half-open connection SYN cookies and SYN caches prevent spoofed IP attacks

SYN Cookie Ensures IP address is not spoofed How? check that the client can receive a packet at the claimed source address SYN No state is stored. Initialize TCP seq number to a random cookie SYNACK (seqs=cookie) ACK (seqs=cookie+1) Check seq to ensure client received cookie

Low Rate TCP-Targeted Attacks TCP DoS Attacks: Low Rate TCP-Targeted Attacks Provoke a TCP to repeatedly enter retransmission timeout by sending a square-wave (l~RTT, T~minRTO) Hard to detect because of its low average bandwidth Randomizing TCP timeout helps but doesn’t solve problem

Attacks on Routers

Attacks on Routing Table Attacks on Routers: Attacks on Routing Table YZA ZA “lie” BYZA Z B Routing Info Y A X Attacker needs to get access to a router Possible Attacks Prefix hijacking by announcing a more desirable route Z can lie about its route to A Overload routers CPU by too many routing churns Overload the routing table with too many routes Causes router to run out of memory or CPU power for processing routes E.g., AS7007

Countering Routing Table Attacks Attacks on Routers: Countering Routing Table Attacks Authenticate routing adjacencies ISPs should filter routing advertisements from their customers Secure BGP [Kent et al] Every ISP sign its advertisements creating a chain of accountability (e.g., X sends { Z: {Y}Z }X Too many signatures  too slow With no authentication needs a few usec; MD5 ~100 usec; RSA ~1 sec

DoS Attacks on Web Servers Most known attacks E.g., Yahoo, Amazon, … Moore et al report over 12,000 attacks in 3-week, intentity as high as 600,000 pkts/s Recently taking the form of Cyber Mafia Pay us $50,000 to protect you from attacks similar to the one on last Tuesday Becoming more distributed Less spoofing of IP addresses Attack types Attacks on TCP or Link bandwidth can be used against a Web server Attacks on higher level protocols like HTTP

Detection

Detection Issues Detecting What? Offline vs. realtime Detection cost Detecting the offending packets Some attack characteristics (e.g., how many zombies) The occurrence of an attack Offline vs. realtime Realtime detection may help in throttling the attack while forensics might help in suing the attacker Detection cost Can attacker mount an attack on the detection mechanism? How would that affect the protected system?

Network Intrusion Detection XP Linux Linux Win98 NT Linux Mac Win95 NIDS box monitors traffic entering and leaving your network In contrast to firewalls, NIDS are passive

Approaches to Intrusion Detection Signature Based: Keeps a DB of known attack signatures and matches traffic against DB (e.g., Bro, Snort) Pros Easy to understand the outcome More accurate in detecting known attacks Cons Can’t discover new attacks Anomaly Based: Matches traffic against a model of normal traffic and flags abnormalities (e.g., EMERALD) Can deal with new attacks Modeling normal. it is hard to describe what is normal Limits new applications Less accurate detection of known attacks Hybrid: Matches against DB of known attacks. If no match, it checks for anomaly

Evasion Problem in NIDS Consider scanning traffic for a particular string (“USER root”) Easiest: scan for the text in each packet No good: text might be split across multiple packets Okay, remember text from previous packet No good: out-of-order delivery Okay, fully reassemble byte stream Costs state …. …. and still evadable Source: Vern Paxson

Evading Detection Via Ambiguous TCP Retransmission Sender Receiver IDS 15 hops 20 hops

Evading Detection Via Ambiguous TCP Retransmission Sender Receiver TTL=17, seq=1 Timed out n TTL=23, seq=1 r r IDS n or r?

Evading Detection Via Ambiguous TCP Retransmission Sender Receiver TTL=17, seq=1 Timed out n TTL=23, seq=1 r r TTL=21, seq=2 o o TTL=15, seq=2 Timed out i IDS n or r? i or o?

Evading Detection Via Ambiguous TCP Retransmission Sender Receiver TTL=17, seq=1 Timed out n TTL=23, seq=1 r r TTL=21, seq=2 o o TTL=15, seq=2 Timed out i TTL=20, seq=3 o o TTL=19, seq=4 Timed out c TTL=27, seq=4 t t IDS n or r? i or o? o c or t? noot? niot? rooc? nooc? nioc? riot? root? …

Bypassing NIDS Evasion Insertion DoS it Hack it Cause many false alarms until admin stops paying attention

Examples of Anomaly Detection Detecting Large Bandwidth Consumers MULTOPs Distinguishing DDoS from flash-crowd

Detecting Malicious TCP Flows TCP throughput is a function of its drop rate Router monitors the rate of each TCP flow and compares it against the above equation Make it more scalable by using statistical monitoring at routers to find unfriendly flows

MULTOPS protects web servers against BW attacks HTTP Traffic is mostly from server to client router Client Server Normal: proportional packet rates router Client Server Fix Attack: disproportional packet rates Drop packets from sources sending disproportionate flows Source: Thomer Gil

Distinguish DDoS Attacks from Flash Crowd Jung et al. identify whether overload is created by flash crowd or DDoS Idea: Prefixes of client addresses in DDoS attacks are randomly distributed, whereas in a flash crowd they are closer to the prefix distribution of the server’s usual traffic