Presentation is loading. Please wait.

Presentation is loading. Please wait.

DoS/DoS Detection and Mitigation Mujahid Khan

Similar presentations


Presentation on theme: "DoS/DoS Detection and Mitigation Mujahid Khan"— Presentation transcript:

1 DoS/DoS Detection and Mitigation Mujahid Khan mkhan@sprint.net

2 Three Parts to Dealing With a (D)DoS Attack: Detection Tracking Mitigation

3 Detection  Limited Tools available to proactively monitor and report (D)DoS attacks  Proactive detection comes with a price tag attached  Different approaches to detection Inline detectionpassive tapping detectors Flow based detectionIDS integration  Most attacks are detected by sudden increase in bandwidth and resource utilization  Need to identify DoS/DDoS attacks and eliminate false alarms – also need to classify attacks based on protocol and source address

4 Detection

5 Issues with detection ???

6 Tracking Methods used to track the attack depends on the available features on the deployed infrastructure Some of the issues with tracking the attack are: – Randomness of attacks – Distributed nature of the attacks – Address spoofing Fast and wide deployment of the tracking scheme needed to track and mitigate attacks effectively – especially needed in case of a large number of sources for the attack Some of the methods used to trace back the attack blackhole the the targeted victim – this could be a problem Most current approaches for traceback are manual, therefore slow

7 Mitigation Most actions to mitigate involve putting filters – Usually away from the source and close to the ingress points to the network Rate-limiting the attack Sometime the targeted IP address is blackholed uRPF has helped – please deploy where possible


Download ppt "DoS/DoS Detection and Mitigation Mujahid Khan"

Similar presentations


Ads by Google