Download presentation
Presentation is loading. Please wait.
Published byLizbeth Carr Modified over 8 years ago
1
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316
2
Introduction What DoS is Symptoms of an attack Methods of attack Types of Attacks How to defend Conclusion
3
What is a Denial of Service attack? An attack on a network that is designed to bring the network to its knees by flooding it with useless traffic Two general forms of attacks: 1.Those that crash services 2.Those that flood services
4
Symptoms of a DoS Attack United States Computer Emergency Readiness Team (US-CERT) lists possible symptoms of a DoS attack: ▫Usually slow network performance ▫Unavailability of a particular web site ▫Inability to access any web site ▫Dramatic increase in the number of spam emails received (email bomb) ▫Disconnection of a wireless internet connection DoS attacks can also lead to problem’s in the network branches around the actual computer being attacked ▫Ex: The bandwidth of a router between the Internet and a LAN may be consumed by an attack, compromising not only the intended computer, but also the entire network or other computers on the LAN Attacks can be very large and compromise Internet connectivity for an entire geographical region
5
Methods of Attack A DoS attack can be perpetrated in a number of ways, five basic ways are: 1.Consumption of computational resources, such as bandwidth, memory, disk space, or processor time 2.Disruption of configuration information, such as routing information 3.Disruption of state information, such as unsolicited resetting of TCP sessions 4.Disruption of physical network components 5.Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately
6
Methods of Attack Continued… A DoS attack may include execution of malware intended to: ▫Max out the processor’s usage, preventing any work from occurring ▫Trigger errors in the microcode of the machine ▫Trigger errors in the sequencing of instructions, so as to force the computer into an unstable state or lock-up ▫Exploit errors in the OS, causing resource starvation ▫Crash the OS itself
8
Smurf Attack An attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP Broadcast address Most devices on a network will respond, by default, to the source IP address ▫If there are a lot of machines on a network, it will cause the victim’s computer to be flooded with traffic
9
Ping of Death A type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer How it works: ▫Historically many computer systems couldn’t handle a ping packet, normally 56 bytes, larger than the maximum IPv4 packet size of 65,535 bytes ▫This would cause the system to crash
10
Ping Flood Based on sending the victim an overwhelming number of ping packets, usually using the “ping” command from Unix-like hosts It is much less capable of overwhelming a target if the attack comes from a Windows system ▫Does not allow packet sizes greater then 65500 Primary requirement to launch this attack ▫Having a greater bandwidth than the victim
11
Nuke An old DoS attack that consisted of fragmented or invalid ICMP packets sent to a target Achieved by using a modified ping utility to repeatedly send this corrupt data Slowed down the affected computer until it comes to a complete stop Example: ▫WinNuke Exploited a vulnerability in the NetBIOS handler in Windows 95 Locked up victims computer causing Blue Screen of Death
12
SYN Flood An attack that sends a succession of SYN (Synchronize) requests to a target’s system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic How it works: ▫It corrupts the TCP three-way handshake ▫Doesn’t respond back to the client with the ACK code or spoofing the source IP address in the SYN causing the server to send the SYN_ACK to a false IP ▫Causes the server to wait for acknowledgement for some time ▫Causes congestion by using up resources until no new connections can be made
13
Distributed DoS (DDoS) Occurs when multiple systems flood the bandwidth or resources of a targeted system ▫i.e., Botnet Using multiple machines make it harder for to track and shut down the attacker ▫Merely purchasing more bandwidth won’t always work for defense since the attacker might be able to add more attack machines A system may be compromised with a trojan, allowing the attacker to download a zombie agent, or the trojan may contain one
14
Distributed DoS continued… These collections of system compromisers are known as botnets Script kiddies use these to deny the availability of well known websites to legitimate users More sophisticated attackers could use DDoS for the purposes of extortion Video: ▫http://www.youtube.com/watch?v=0VutW15kEZ Mhttp://www.youtube.com/watch?v=0VutW15kEZ M
15
How to Defend Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack There are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers ▫Install and maintain anti-virus software ▫Install a firewall, and configure it to restrict traffic coming into and leaving your computer ▫Follow good security practices for distributing your email address. Applying email filters may help you manage unwanted traffic
16
Conclusion What DoS is The Symptoms of an attack Methods of Attack Different Types of Attacks How to Defend from Attacks
17
Questions?
18
Works Cited Google Ideas. (2013). Understanding Distributed Denial of Service Attacks. Retrieved from Youtube.com: http://www.youtube.com/watch?v=0VutW15kEZM http://www.youtube.com/watch?v=0VutW15kEZM McDowell, M. (n.d.). Understanding Denial-of-Service Attacks. Retrieved from US-CERT.gov: http://www.us- cert.gov/ncas/tips/ST04-015http://www.us- cert.gov/ncas/tips/ST04-015 Webopedia. (n.d.). DoS attack. Retrieved from webopedia.com: http://www.webopedia.com/TERM/D/DoS_attack.html http://www.webopedia.com/TERM/D/DoS_attack.html Wikipedia. (n.d.). Denial of Service. Retrieved from Wikipedia: http://en.wikipedia.org/wiki/Denial-of- service_attack#Methods_of_attack http://en.wikipedia.org/wiki/Denial-of- service_attack#Methods_of_attack
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.