Download presentation
Presentation is loading. Please wait.
Published byRalf Townsend Modified over 9 years ago
1
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, vm@kondor.etf.bg.ac.yu Savic, Milan, savicm@net.yu Milic, Bratislav, zverko@eunet.yu
2
2/27 Introduction Basic types of DoS attacks Evolution of DoS tools Overview of DoS tools Defenses
3
3/27 What is Denial of Service Attack? Consumption of limited resources Network connectivity Bandwidth consumption Other resources: Processing time Disk space Lockout of an account Alteration of configuration information
4
DoS Attacks - Basics
5
5/27 DoS Attacks - Basics Attack has two phases: Installation of DoS tools Committing an attack
6
6/27 DoS Attacks - Basics Installation of DoS tools: Finding a suitable machine: Unprotected ports Vulnerable services Errors in operating systems Trojan horses and worms Installation of the tool itself Installation of a root-kit
7
7/27 DoS Attacks - Basics Ping of Death Maximum size of TCP/IP packet is 65536 bytes Oversized packet may crash, freeze, reboot system Obsolete
8
8/27 DoS Attacks - Basics Teardrop IP packet can be broken Broken packet is reassembled using offset fields Overlapping offset fields Obsolete
9
9/27 DoS Attacks - Basics Syn flood attack TCP Syn handshake Finite length of backlog queue Lots of half-open connections Partially solved SYN SYNACK ACK Client Server
10
10/27 DoS Attacks - Basics UDP flood UDP echo service UDP chargen service Spoofed address Victim 1 Victim 2 Cracker Chargen Echo Spoofed Easy prevention Brute force approach if this one doesn’t work
11
11/27 DoS Attacks - Basics Smurf Attack
12
12/27 DoS Attacks - Basics Smurf attack ICMP packets Broadcast request Spoofed address Two victims Cannot be easily prevented
13
13/27 DoS Attacks - Basics Distributed DoS tools and networks Client-Server architecture Open-source approach Several layers Difficulties in tracking back the attacker
14
14/27 DoS Attacks - Basics All of the systems are compromised Terminology: Client Handler Agent
15
15/27 DoS Attacks - Basics Implications of DDoS network: One or two attackers Small number of clients Several handlers Huge number of agents Humongous traffic
16
DoS Attacks - Tools
17
17/27 DoS Attacks - Tools Evolution of DoS tools: IRC disable tools Single attack method tools Distributed tools, with possibility of selecting the type of attack
18
18/27 DoS Attacks - Tools Trinoo Distributed UDP flood (brute force) Menu operated Agent passwords are sent in plain text form (not encrypted)
19
19/27 DoS Attacks - Tools TFN (Tribal Flood Network) Multi-type attack UDP flood SYN flood ICMP_ECHOREPLY flood Smurf Handler keeps track of its agents in “Blowfish” encrypted file
20
20/27 DoS Attacks - Tools Improved version of TFN Agent can randomly alternate between the types of attack Agent is completely silent (handler sends the same command several times, hoping that agent will receive at least one) TFN2K
21
21/27 DoS Attacks - Tools All communication is encrypted Random source IP address and port number Decoy packets (send to non-target networks) TFN2K
22
22/27 DoS Attacks - Tools Several levels of protection: Hard-coded password in client Password is needed to take control over handler Encrypted communication between handler and agent Stacheldraht
23
23/27 DoS Attacks - Tools Stacheldraht Automated update of agents TCP is used for communication between client and handler, and ICMP_ECHOREPLY for communication between handler and agent
24
24/27 DoS Attacks - Tools ICMP_ECHOREPLY packets are difficult to stop Each agent has a list of its handlers (Blowfish encrypted) and in case that there is no such list, agent uses several hard-coded IP addresses Agent tests for a possibility of spoofing the source address Stacheldraht
25
25/27 DoS Attacks - Tools Weakness: it uses rpc command for update rpc command uses UDP port 514. Listening on this port can lead to detection of an agent. Drawback is in fact that this can generate a lot of false alarms (rpc is used by legitimate users too) Stacheldraht
26
Defenses
27
27/27 Defenses There is no universal solution There are some preventions that can help in minimizing the damage: Prevention of becoming the source of an attack Preparations for defending against an attack
28
28/27 Defenses Disable and filter out chargen and echo services Disable and filter out all unused UDP services. Good practice is to block all UDP ports below 900 (excluding some specific ports like DNS)
29
29/27 Defenses Install a filtering router to disable following cases: Do not allow packet to pass through if it is coming to your network and has a source address from your network Do not allow packet to pass through if it comes from your network and has a source address that doesn’t belong to your network
30
30/27 Defenses Network administrators should log all information on packets that are dropped If you are providing external UDP services, monitor them for signs of misuse
31
31/27 Defenses The following networks are defined as reserved private networks, and no traffic should ever be received from or transmitted to these networks through a router: 10.0.0.0 to 10.255.255.255 (reserved) 127.0.0.0 to 127.255.255.255 (loopback) 172.16.0.0 to 172.31.255.255 (reserved) 192.168.0.0 to 192.168.255.255 (reserved) 0.0.0.0 and 255.255.255.255 (broadcasts)
32
32/27 Defenses Routers, machines, and all other Internet accessible equipment should be periodically checked to verify that all security patches have been installed System should be checked periodically for presence of malicious software (Trojan horses, viruses, worms, root-kits, back doors, etc.)
33
33/27 Defenses Train your system and network administrators Read security bulletins like: www.cert.org, www.sans.org, www.eEye.com www.cert.orgwww.sans.orgwww.eEye.com From time to time listen on to cracker community to be informed about their latest achievements Be in contact with your ISP. In case that your network is being attacked, this can save a lot of time
34
34/27 Conclusion Several examples of large scale DoS attacks (yahoo, eBuy, CERT, FBI, Amazon) Increased number of consumers with high bandwidth technologies, but with poor knowledge of network security Easy accessible, easy to use DoS attack tools No final solution for attacks
35
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, vm@kondor.etf.bg.ac.yu Savic, Milan, savicm@net.yu Milic, Bratislav, zverko@eunet.yu
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.