What is Distributed Denial of Service (DDoS)?

Similar documents
Computer Security: Principles and Practice

Chapter 7. Denial of Service Attacks

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

Denial of Service and Distributed Denial of Service Attacks

COMPUTER NETWORK SECURITY

Introduction to Security. Computer Networks Term A15

Distributed Denial of Service

CSE 565 Computer Security Fall 2018

DENIAL OF SERVICE ATTACKS

Web Security. Outline

DDoS PREVENTION TECHNIQUE

Basic Concepts in Intrusion Detection

INTRODUCTION ON D-DOS. Presentation by RAJKUMAR PATOLIYA

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004

Dispelling myths Ingress and Egress Hardening The good and the bad Memory analysis Server 2008/2012 security enhancements BYOD security out of the

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Denial of Service (DoS)

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

9. Security. Safeguard Engine. Safeguard Engine Settings

Chapter 8 roadmap. Network Security

Denial of Service, Traceback and Anonymity

Contents. Denial-of-Service Attacks. Flooding Attacks. Distributed Denial-of Service Attacks. Reflector Against Denial-of-Service Attacks

Resources and Credits. Definition. Symptoms. Denial of Service 3/3/2010 COMP Information on Denial of Service attacks can

Computer Networks. Routing

Intelligent and Secure Network

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

StreamWorks A System for Real-Time Graph Pattern Matching on Network Traffic

NISCC Technical Note 06/02: Response to Distributed Denial of Service (DDoS) Attacks

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

DDoS and Traceback 1

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

DDoS: Coordinated Attacks Analysis

CIH

Security: Worms. Presenter: AJ Fink Nov. 4, 2004

Configuring attack detection and prevention 1

Cloudflare Advanced DDoS Protection

CSE Computer Security

Denial of Service (DoS) attacks and countermeasures

Distributed Denial of Service (DDoS)

Topic 3 part 2 Traffic analysis; Routing Attacks &Traffic Redirection Fourth Stage

sottotitolo System Security Introduction Milano, XX mese 20XX A.A. 2016/17 Federico Reghenzani

Hacking Terminology. Mark R. Adams, CISSP KPMG LLP

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

The Protocols that run the Internet

DDoS Testing with XM-2G. Step by Step Guide

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Attack Prevention Technology White Paper

A senior design project on network security

CSE Computer Security (Fall 2006)

Chapter 4. Network Security. Part I

CSE 565 Computer Security Fall 2018

Chapter 10: Denial-of-Services

Trends in Denial of Service Attack Technology -or Oh, please, they aren t smart enough to do that

Last time. Trusted Operating System Design. Security in Networks. Security Features Trusted Computing Base Least Privilege in Popular OSs Assurance

Configuring attack detection and prevention 1

Network Security: Denial of Service (DoS) Tuomas Aura / Aapo Kalliola T Network security Aalto University, Nov-Dec 2011

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM

Lecture 12. Application Layer. Application Layer 1

When the Lights go out. Hacking Cisco EnergyWise. Version: 1.0. Date: 7/1/14. Classification: Ayhan Koca, Matthias Luft

Imma Chargin Mah Lazer

Network Intrusion Goals and Methods

Incorporating Network Flows in Intrusion Incident Handling and Analysis

Network Intrusion Analysis (Hands on)

Distack. A Framework for Anomaly-based Large-scale Attack Detection. Thomas Gamer, Christoph P. Mayer, Martina Zitterbart

NETWORK THREATS DEMAN

Anatomy and Mechanism of DOS attack

Last lecture we talked about how Intrusion Detection works. Today we will talk about the attacks. Intrusion Detection. Shell code

IP Access List Overview

Broadband Internet Access Disclosure

Computer and Network Security

CSC 574 Computer and Network Security. TCP/IP Security

IDS: Signature Detection

CS 4390 Computer Networks

Configuring IP Services

Internet Attacks and Defenses

Anti-DDoS. User Guide. Issue 05 Date

Dixit Verma Characterization and Implications of Flash Crowds and DoS attacks on websites

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

Check Point DDoS Protector Simple and Easy Mitigation

BGP Security. Kevin s Attic for Security Research

CS System Security Mid-Semester Review

Security in inter-domain routing

A Survey of Defense Mechanisms Against DDoS Flooding A

Introduction.

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Denial Of Service Attacks

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

CSC 6575: Internet Security Fall Attacks on Different OSI Layer Protocols OSI Layer Basic Attacks at Lower Layers

Analysis. Group 5 Mohammad Ahmad Ryadh Almuaili

CS System Security 2nd-Half Semester Review

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Routing and router security in an operator environment

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

ELEC5616 COMPUTER & NETWORK SECURITY

Security and Authentication

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3

Ping of death Land attack Teardrop Syn flood Smurf attack. DOS Attack Methods

CSCI 680: Computer & Network Security

Security Concerns in Automotive Systems. James Martin

Transcription:

What is Distributed Denial of Service (DDoS)? Gregory Travis greg@iu.edu

First, what is a Denial of Service? A denial of service is the deliberate or unintentional withholding of an expected service, utility, or product. Examples: Traffic jam caused by automotive accident denies the utility of a highway

Denial of service for us Although denials of service can be applied to many ordinary situations, we are concerned exclusively with denials of service that occur within data networks and at end systems (clients and servers)

Types of computerized denials of service Network denials: Simply flooding a network with enough raw data in an effort to deny the use of the network by other users (traffic-jam analogy) Attacking network infrastructure, such as routers, switches, etc. in an effort to disable them

DoS Schematic - bandwidth Bottleneck

Types of computerized denials of service Server denials: Server or application crashes The result of overload or known exploit

DoS Schematic - exploit SQL Slammer UDP packet SQL Server

Distributed Denial of Service Distributed Denial of Service is an enhancement to standard denial of service techniques It utilizes several attackers instead of a single one, hence the attack is distributed

Issues with distributed denial of service Distribution allows for aggregation of attack No one attacker needs to generate a significant amount of data. Attack is aggregated at the receiver Distribution makes it easier to conceal source of attack

DDoS - Distribution and aggregation Aggregation

How are systems compromised? In classic DoS compromise of systems is not necessary Example: Network flood from a single owned system

DDoS compromise DDoS usually involves compromising other people s systems Methods: Mail/etc. macro viruses Rootkits Exploitation of known defects (i.e. buffer overflow)

DDoS Compromise Compromised (infected) systems begin DDoS activity in response to: Nothing, can initiate DDoS autonomously and immediately (i.e. SQL Slammer) Attack signal from central console Timer expiration

DDoS - Distribution and aggregation Aggregation Console

Console/Attack communication Typically the console communicates with individual attackers over a broadcast-type channel Important, for bad guy, that this communication be concealed as it s a way in which real bad guy can conceal his/her location and identity To accomplish this they often use public channels (example, AIM, IRC) and commands are disguised as ordinary chatter.

Timed attack release Next step was introduction of delay between sending of commands and attack initiation Makes it much more difficult to connect console to action

Pulsing Zombies Final refinement was introduction of pulsing zombies Like timed release but adds limit on length of attack This way it s not only difficult to track back to the console but also to attackers as well. Each attacker only operates for a short time before going dormant for a while. Difficult to trace

Zombie Setup Console

Zombie Attack Aggregation

Zombie Attack Aggregation

Zombie Attack Aggregation

Zombie Attack Aggregation

Zombie Attack Aggregation

Zombie Attack Aggregation

Zombie Attack Aggregation

Zombie Attack Aggregation

Zombie Attack Aggregation

Zombie Attack Aggregation

Zombie Attack Aggregation

Zombie Attack Aggregation

Wrapup Evolution from DoS to DDoS to DDoS + pulsing zombies Concept of a console When compromise if systems is necessary and when not