DENIAL OF SERVICE ATTACKS

Similar documents
Computer Security: Principles and Practice

Chapter 7. Denial of Service Attacks

COMPUTER NETWORK SECURITY

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

Denial of Service (DoS)

CSE 565 Computer Security Fall 2018

Contents. Denial-of-Service Attacks. Flooding Attacks. Distributed Denial-of Service Attacks. Reflector Against Denial-of-Service Attacks

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004

Distributed Denial of Service (DDoS)

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

NETWORK SECURITY. Ch. 3: Network Attacks

DDoS PREVENTION TECHNIQUE

INTRODUCTION ON D-DOS. Presentation by RAJKUMAR PATOLIYA

Cloudflare Advanced DDoS Protection

NISCC Technical Note 06/02: Response to Distributed Denial of Service (DDoS) Attacks

Network Security Protocols NET 412D

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Denial of Service and Distributed Denial of Service Attacks

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100

Configuring attack detection and prevention 1

Denial of Service (DoS) attacks and countermeasures

Denial of Service. Eduardo Cardoso Abreu - Federico Matteo Bencic - Pavel Alexeenko -

DDoS and Traceback 1

Internet Protocol and Transmission Control Protocol

Rob Sherwood Bobby Bhattacharjee Ryan Braud. University of Maryland. Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse p.

Denial of Service, Traceback and Anonymity

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.

CSE Computer Security (Fall 2006)

Network Security. Evil ICMP, Careless TCP & Boring Security Analyses. Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, October 4th, 2018

Configuring attack detection and prevention 1

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

DDoS Testing with XM-2G. Step by Step Guide

Detecting Distributed Denial-of. of-service Attacks by analyzing TCP SYN packets statistically. Yuichi Ohsita Osaka University

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

Technical White Paper June 2016

Chapter 10: Denial-of-Services

Network Security: Denial of Service (DoS) Tuomas Aura / Aapo Kalliola T Network security Aalto University, Nov-Dec 2011

Dan Boneh, John Mitchell, Dawn Song. Denial of Service

Denial of Service. EJ Jung 11/08/10

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

Chapter 8 roadmap. Network Security

Computer and Network Security

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Worldwide Detection of Denial of Service (DoS) Attacks

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Towards Intelligent Fuzzy Agents to Dynamically Control the Resources Allocations for a Network under Denial of Service Attacks

CSE Computer Security

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Anatomy and Mechanism of DOS attack

UDP-based Amplification Attacks and its Mitigations

Guide to DDoS Attacks November 2017

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks

Resources and Credits. Definition. Symptoms. Denial of Service 3/3/2010 COMP Information on Denial of Service attacks can

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

Analysis. Group 5 Mohammad Ahmad Ryadh Almuaili

Firewalls and NAT. Firewalls. firewall isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others.

Network Security. Chapter 0. Attacks and Attack Detection

A Study on Intrusion Detection Techniques in a TCP/IP Environment

ELEC5616 COMPUTER & NETWORK SECURITY

Dixit Verma Characterization and Implications of Flash Crowds and DoS attacks on websites

HP High-End Firewalls

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Denial of Service. Denial of Service. A metaphor: Denial-of-Dinner Attack. DDoS over the years. Ozalp Babaoglu

Cisco CCIE Security Written.

MITIGATING DENIAL OF SERVICE ATTACKS IN OLSR PROTOCOL USING FICTITIOUS NODES

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Firewalls can be categorized by processing mode, development era, or structure.

Lecture 6: Worms, Viruses and DoS attacks. II. Relationships between Biological diseases and Computers Viruses/Worms

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

Network Security: Denial of Service (DoS) Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

20: Networking (2) TCP Socket Buffers. Mark Handley. TCP Acks. TCP Data. Application. Application. Kernel. Kernel. Socket buffer.

Attack Prevention Technology White Paper

Basic NAT Example Security Recitation. Network Address Translation. NAT with Port Translation. Basic NAT. NAT with Port Translation

CTS2134 Introduction to Networking. Module 08: Network Security

Configuring Flood Protection

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense

Distributed Denial of Service

Closed book. Closed notes. No electronic device.

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 9

The Protocols that run the Internet

An study of the concepts necessary to create, as well as the implementation of, a flexible data processing and reporting engine for large datasets.

Ping of death Land attack Teardrop Syn flood Smurf attack. DOS Attack Methods

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

CLASSIFICATION OF LINK BASED IDENTIFICATION RESISTANT TO DRDOS ATTACKS

CS 161 Computer Security

Our Narrow Focus Computer Networking Security Vulnerabilities. IP-level vulnerabilities

Denial of Service. Denial of Service. A metaphor: Denial-of-Dinner Attack. DDoS over the years. Ozalp Babaoglu

What is Distributed Denial of Service (DDoS)?

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz

Detecting Specific Threats

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

To Study and Explain the Different DDOS Attacks In MANET

DDoS: Coordinated Attacks Analysis

CSc 466/566. Computer Security. 18 : Network Security Introduction

Transcription:

DENIAL OF SERVICE ATTACKS Ezell Frazier EIS 4316 November 6, 2016

Contents 7.1 Denial of Service... 2 7.2 Targets of DoS attacks... 2 7.3 Purpose of flood attacks... 2 7.4 Packets used during flood attacks... 2 7.5 DoS attacks using packets with spoofed source addresses... 3 7.6 Backscatter traffic... 3 7.7 Distributed denial-of-service attacks... 3 7.8 Architecture of DDoS attacks... 4 7.9 Reflection attacks... 4 7.10 Amplification attacks... 4 7.11 Primary defense against DoS attacks... 5 7.12 Defense against non-spoofed flooding... 5 7.13 Possible defenses against TCP SYN DoS attacks... 5 7.14 Defenses possible against DNS amplification attacks... 5 7.15 Defenses possible to prevent becoming an intermediary system... 6 7.16 Slash dotted and flash crowds... 6 7.17 Steps taken when DoS attacks occur... 6 7.18 Measures needed to trace DoS attacks... 6 References... 7

7.1 Denial of Service Denial-of-service (DoS) attacks occur when an individual or a group of individuals attacks any network or website with the sole purpose of denying access to the network or website for other legitimate users. Broadly, this process prohibits legitimate usage of networks, applications, or systems by any user while the attack occurs. 7.2 Targets of DoS attacks DoS attacks may target resources such as network connectivity, system resources, and or network bandwidth. In the case of network bandwidth, the overall capacity of network links between a server and the internet is vulnerable. System resources such as the software maintaining network connections are susceptible to DoS attacks. Application resources such as web servers are vulnerable to DoS attacks, as an overload of valid requests reduces the web server s ability to respond to any requests by other users. 7.3 Purpose of flood attacks Flooding attacks is a form of a DoS attack, slowing network speeds down, due to a traffic overload. Flooding attacks may arrive in a variety of forms, based on the network protocols used. However, the objectives of a flooding attack are much simpler in nature. The first objective is to overload network capacity. Alternatively, flooding attacks can overload server capacity. Additionally, the effectiveness of flooding attacks increases when packet sizes are larger than the attack itself. 7.4 Packets used during flood attacks There may be at least three types of packets used during flood attacks: Internet control message protocol (ICMP), user datagram protocol (UDP), and transmission control protocol (TCP SYN). ICMP involves sending error messages whenever a connection between networks are unable to connect. UDP provides a limited level of service during an exchange between messages in a network. TCP SYN involves the server-side rejection of TCP packets when they do not belong to any known connection.

7.5 DoS attacks using packets with spoofed source addresses Source address spoofing involves packets used in DoS attacks featuring forged source addresses. Multiple packets must reach the target system during an attack, thus multiple links from the system are required to induce massive congestion. Spoofed source addresses trick a system into accepting packets from one location, and sending responses to a spoofed source address, resulting in some error packet responses. The error packets contributes to the overall traffic to the system. Other spoofed addresses may not exist and results in the system attempting to retransmit packets or discarding them. However, such packets also contributes to the overall traffic to the system. 7.6 Backscatter traffic According to research by Moore, Shannon, Brown, Voelker, and Savage, backscatter traffic occurs when the generation and subsequent sending of response packets to spoofed addresses during a DoS attack (DAVID MOORE, 2006). The monitoring of backscatter traffic provides the opportunity to determine the type and size of a DoS attack. 7.7 Distributed denial-of-service attacks The purpose of distributed denial-of-service (DDoS) attacks is to disable or reduce the effectiveness of multiple systems connected to a network. DDoS attacks generally use personal computers or business workstations to accomplish required tasks. In addition, the attacker may exploit vulnerabilities within a system to install malware to control system functions. A botnet represents the collection of desktop and workstation computers controlled by an attacker. Botnets increase the effectiveness of a DoS attack by immense proportions, increasing traffic by large amounts. Botnets are capable of detection by the usage of intermediaries; however, locating the attacker is much more of a challenge.

7.8 Architecture of DDoS attacks (Stallings & Brown, 2015) DDoS attacks uses a control hierarchy, in which the attacker controls systems known as handlers. Handlers control zombie or agent systems within the botnet. This structure allows the attacker to send one command to a handler, which forwards the command to all other systems within the botnet. 7.9 Reflection attacks Reflection attacks occur when attackers trick a target system into using the same challenge-response protocol on itself. The attacker establishes a connection to a target, and receives a challenge. The attacker establishes another connection to the same target, sending the same challenge back to the system. Here, the system responds to its own challenge, allowing the attacker to send the same response back through its original connection. 7.10 Amplification attacks Amplification attacks occur when attackers use mediators to send packets via a spoofed source to a target. This process generates many responses for each original packet transmitted. In addition, the

network host responds to the request, generating many more responses. The domain name system may generate responses, which creates longer responses than the original requests. 7.11 Primary defense against DoS attacks The primary method of defense against DoS attacks requires the limiting of a system s ability to send packets with a spoofed source address. Implementation of this defensive method requires the installation of a filter to block spoofed addresses near the source packets. Specific routers and gateways can accomplish this task of validating appropriate addresses of incoming packets. 7.12 Defense against non-spoofed flooding The best defense against non-spoofed flooding involves the provision of significant spikes in network bandwidth, along with replicated distributed servers when overload is predictable. This restriction is can be costly, but often implemented on sporting websites, as results of major events create sudden traffic spikes. Because of this, complete prevention of non-spoofed flooding attacks is impossible, as it may occur naturally in the form of legitimate traffic overload. 7.13 Possible defenses against TCP SYN DoS attacks Defense against SYN spoofing is possible with the usage of modified TCP/IP network code. The results of such a modification means the connection will not save information present on the server, rather saving information encoded in a cookie, sent as an initial sequence number. The server sends the sequence number as a SYN-ACK packet to the client. A legitimate client will respond with an ACK packet, allowing the server to reconstruct important information about the connection. However, this process will require additional CPU power to calculate the cookie. 7.14 Defenses possible against DNS amplification attacks The basic defense against DNS amplification attacks are similar to defenses against reflection-based attacks. This process involves limiting a system s ability to send packets with a spoofed source address.

According to Damas and Neves, the appropriate configuration of DNS servers, or specifically limiting recursive responses to can reduce variations of this attack (Neves, 2008). 7.15 Defenses possible to prevent becoming an intermediary system Blocking the usage of IP-directed broadcasts is the most effective method in reducing the possibility of a system becoming an intermediary in an amplification attack. Either the internet service provider or the organization itself practices this defensive method. 7.16 Slash dotted and flash crowds Slash dotted and flash crowds refers to large volumes of legitimate system traffic, ultimately slowing or rendering a connection temporarily useless. Slash dotted and or flash crowds may occur when an event occurs that draws attention to a specific web site. Defense against DoS attacks during predictable slash dotted events is possible, as systems may restrict usage of replicated distributed servers. 7.17 Steps taken when DoS attacks occur There are several steps to take after DoS attack detection. The first step involves identifying the type of attack and determine the appropriate countermeasure. Monitoring and capturing packets flowing into the system in search of common attacking types can achieve this task. An Internet service provider may also perform this task upon request if time, skill, and resources are limited. The second step involves applying packet filters appropriate for the type of attack packets coming through. Internet service providers or select routers provide such filters. Unfortunately, not all DoS attacks are preventable or capable of complete stoppage once initiated, without switching to back-up servers or applying new servers with alternative addresses, 7.18 Measures needed to trace DoS attacks There is a variety of measures usable in order to trace the source of packets used in DoS attacks. An Internet service provider may trace the flow of packets to identify the source upon request.

Unfortunately, packets used with spoofed addresses is a time consuming and costly practice for organizations and service providers alike. Overall, the process of tracing packets is not easy to accomplish due to the level of cooperation required between the corporation and owners of the victimized network and systems. References DAVID MOORE, C. S. (2006). Inferring Internet Denial-of-Service Activity. ACM Transactions on Computer Systems, 115-138. Neves, J. D. (2008). Preventing Use of Recursive Nameservers in Reflector Attacks. Network Working Group. Stallings, W., & Brown, L. (2015). Computer Security: Principles and Practice. Upper Saddle River: Pearson.