Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.

Slides:



Advertisements
Similar presentations
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing Base on RFC 2827 Lector Kirill Motul.
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Lance West.  Just what is a Denial of Service (DoS) attack, and just how can it be used to attack a network.  A DoS attack involves exploiting operating.
Lecture 15 Denial of Service Attacks
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
CIS 450 – Network Security Chapter 3 – Information Gathering.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Denial-of-Service Attacks
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Presentation on ip spoofing BY
An Introduction To ARP Spoofing & Other Attacks
Outline Basics of network security Definitions Sample attacks
ICMP ICMP – Internet Control Message Protocol
Error and Control Messages in the Internet Protocol
Introduction to Networking
Intro to Denial of Serice Attacks
Outline Basics of network security Definitions Sample attacks
Firewalls Chapter 8.
Intrusion Detection and Hackers Exploits IP Spoofing Attack
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1

First, some news KAMI VANIEA 2

Internet attacks and defenses 1.Someone finds an exploit 2.Exploit seen in the wild, possibly to large effect 3.Short-term workarounds; specific detection/recovery 4.Proper repairs to software or protocols are issued 5.Over time, most sties implement repairs 6.Remaining sites may be black-listed KAMI VANIEA 3

Syria going offline – November 2012 Article: om/how-syria-turned- off-the-internet/ om/how-syria-turned- off-the-internet/ Going offline: /video/ /video/ Going online: /video/ /video/ KAMI VANIEA 4

Syria going offline – November 2012  Article: e.com/how-syria- turned-off-the- internet/ e.com/how-syria- turned-off-the- internet/  Going offline: om/video/ om/video/  Going online: om/video/ om/video/ KAMI VANIEA 5

6 Syria’s network, directly connected to three other networks. Each number is a network run by a single group. Each colored line is the current shortest path between two networks. All lines on this graph connect Syria to other parts of the world. Paths shift all the time. This is normal on the internet as the current shortest path is dynamically negotiated (BGP routing).

Syria going offline – November 2012  Article: e.com/how-syria- turned-off-the- internet/ e.com/how-syria- turned-off-the- internet/  Going offline: om/video/ om/video/  Going online: om/video/ om/video/ KAMI VANIEA 7

Types of threats Interception – Unauthorized viewing of information (Confidentiality) Modification – Unauthorized changing of information (Integrity) Fabrication – Unauthorized creation of information (Integrity) Interruption – Preventing authorized access (Availability) KAMI VANIEA 8

Today we will focus on: Man in the middle Denial of service DNS attack KAMI VANIEA 9

Man in the middle KAMI VANIEA 10

Your ComputerThe InternetWebsite Server AliceBob

Your ComputerThe InternetWebsite Server AliceBobCharlie

AliceBobCharlie Charlie is in the middle between Alice and Bob. Charlie can: ◦View traffic ◦Change traffic ◦Add traffic ◦Delete traffic Charlie could be: ◦Internet service provider ◦Virtual Private Network (VPN) provider ◦WIFI provider such as a coffee shop ◦An attacker re-routing your connection ◦An incompetent admin (it happens)

Your ComputerThe InternetDestination Server Verizon Level Three Comcast

Your ComputerThe Internet Destination Server Verizon Level Three Comcast M VPN Server M

The following is an attack that actually happened to a student of mine when they were trying to download/upload their “set a cookie” homework using a free VPN. KAMI VANIEA 16

Basic web page document.cookie="username=John Doe;"; THIS TEXT HAS BEEN CHANGED. Correct Answer

Basic web page document.cookie="username=John Doe;"; ANCHORFREE_VERSION=" " var _AF2$ = {'SN':'HSSHIELD00US','IP':' ','CH':'HSSCNL000550','CT':'z51','HST':'&sessStartTime= &accessLP=1','AFH':'hss734','RN':Math.flo or(Math.random()*999),'TOP':(parent.location!=document.location||top.location!=document.location)?0:1,'AFVER':'3.42','fbw':false,'FBWCNT':0,'FBWC NTNAME':'FBWCNT_FIREFOX','NOFBWNAME':'NO_FBW_FIREFOX','B':'f','VER': 'us'};if(_AF2$.TOP==1){document.write(" ");} THIS TEXT HAS BEEN CHANGED. Basic web page document.cookie="username=John Doe;"; THIS TEXT HAS BEEN CHANGED. Correct Answer Attacked Answer

Basic web page document.cookie="username=John Doe;"; ANCHORFREE_VERSION=" " var _AF2$ = {'SN':'HSSHIELD00US','IP':' ','CH':'HSSCNL000550','CT':'z51','HST':'&sessStartTime= &accessLP=1','AFH':'hss734','RN':Math.flo or(Math.random()*999),'TOP':(parent.location!=document.location||top.location!=document.location)?0:1,'AFVER':'3.42','fbw':false,'FBWCNT':0,'FBWC NTNAME':'FBWCNT_FIREFOX','NOFBWNAME':'NO_FBW_FIREFOX','B':'f','VER': 'us'};if(_AF2$.TOP==1){document.write(" ");} THIS TEXT HAS BEEN CHANGED. Basic web page document.cookie="username=John Doe;"; THIS TEXT HAS BEEN CHANGED. Correct Answer Attacked Answer

ANCHORFREE_VERSION=" “; var _AF2$ = {'SN':'HSSHIELD00US','IP':' ','CH':'HSSCNL000550','C T':'z51','HST':'&sessStartTime= &accessLP=1','AFH':'hss7 34','RN':Math.floor(Math.random()*999),'TOP':(parent.location!=do cument.location||top.location!=document.location)?0:1,'AFVER':'3. 42','fbw':false,'FBWCNT':0,'FBWCNTNAME':'FBWCNT_FIREFOX','NO FBWNAME':'NO_FBW_FIREFOX','B':'f','VER': 'us'};if(_AF2$.TOP==1){document.write(" ");}

ANCHORFREE_VERSION=" “; var _AF2$ = {'SN':'HSSHIELD00US','IP':' ','CH':'HSSCNL000550','C T':'z51','HST':'&sessStartTime= &accessLP=1','AFH':'hss7 34','RN':Math.floor(Math.random()*999),'TOP':(parent.location!=do cument.location||top.location!=document.location)?0:1,'AFVER':'3. 42','fbw':false,'FBWCNT':0,'FBWCNTNAME':'FBWCNT_FIREFOX','NO FBWNAME':'NO_FBW_FIREFOX','B':'f','VER': 'us'};if(_AF2$.TOP==1){document.write(" ");}

This code is downloadin g more javascript from box.anchorf ree.net and running it on the client. document.write(" ”);

Here Be Dragons Your ComputerThe InternetWebsite Server

Denial of Service KAMI VANIEA 24

Denial of Service (DoS) An attack that prevents valid users from accessing a service. Common examples: ◦Cutting power, cables, etc. ◦Overloading a server with invalid traffic ◦Removing a user account Attacks: ◦SYN flooding ◦Spoofing ◦Smurfing KAMI VANIEA 25

KAMI VANIEA 26

Attacker The Internet Victim Server Verizon British Telecom Level Three An example network M

SYN Flooding Send tons of requests at the victim and overload them. Basic three-part handshake used by Alice to initiate a TCP connection with Bob. Alice sends many SYN packets, without acknowledging any replies. Bob accumulates more SYN packets than he can handle. KAMI VANIEA 28

Attacker The Internet Victim Server Verizon British Telecom Level Three SYN flood example SYN ConnectionSequenceIPConnectionSequenceIP Connection ACK

Attacker The Internet Victim Server Verizon British Telecom Level Three SYN flood example Attacker sends SYN and ignores ACK Victim must maintain state SYN ConnectionSequenceIP Connection Connection Connection Connection Connection Connection Connection Connection SYN

SYN Flooding Problems ◦Attribution – attacker users their own IP which could be traced ◦Bandwidth – attacker users their own bandwidth which is likely smaller than a server’s Effective against a small target ◦Someone running a game server in their home Not effective against a large target ◦Company website KAMI VANIEA 31

Spoofing: forged TCP packets Same as SYN flooding, but forge the source of the TCP packet Advantages: ◦Harder to trace ◦ACKs are sent to a second computer, less attacker bandwidth used Problems: ◦Ingress filtering is commonly used to drop packets with source addresses outside their origin network fragment. KAMI VANIEA 32

Smurfing (directed broadcast) The smurfing attack exploits the ICMP (Internet Control Message Protocol) whereby remote hosts respond to echo packets to say they are alive (ping). Some implementations respond to pings to broadcast addresses. Idea: Ping a LAN to find hosts, which then all respond to the ping. Attack: make a packet with a forged source address containing the victim’s IP number. Send it to a smurf amplifier, who swamp the target with replies. KAMI VANIEA 33

Attacker The Internet Victim Server Verizon British Telecom Level Three Smurfing example ◦Attacker sends 1 ping which is sent to every node on the LAN Acme Co Ping

Attacker The Internet Victim Server Verizon British Telecom Level Three Smurfing example ◦Each node responds to victim Acme Co Ping

LANs that allow Smurf attacks are badly configured. One approach is to blacklist these LANs. KAMI VANIEA 36

Distributed Denial of Service (DDoS) A large number of machines work together to perform an attack that prevents valid users from accessing a service. Common examples: ◦Slashdot effect – a large number of valid users all try and access at once. ◦Botnets ◦Amazon web services KAMI VANIEA 37

DNS attacks KAMI VANIEA 38

Domain Name Service (DNS) The DNS service translates human friendly URLs such as to their IP address such as Mappings between URLs and IPs are not static. One domain, such as google.com, may have many IP addresses associated with it. One way to get in the middle or deny access is to change a DNS entry record. KAMI VANIEA 39

Questions KAMI VANIEA 40