The Protocols that run the Internet

Similar documents
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

CSE 565 Computer Security Fall 2018

Network Security. Chapter 0. Attacks and Attack Detection

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Our Narrow Focus Computer Networking Security Vulnerabilities. IP-level vulnerabilities

Network Security. Thierry Sans

Ethical Hacking and Prevention

Flashback.. Internet design goals. Security Part One: Attacks and Countermeasures. Why did they leave it out? Security Vulnerabilities

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Denial of Service (DoS)

Trends in Denial of Service Attack Technology -or Oh, please, they aren t smart enough to do that

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Chapter 7. Denial of Service Attacks

CSE 565 Computer Security Fall 2018

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Chapter 10: Denial-of-Services

CS System Security Mid-Semester Review

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 9

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

CS System Security 2nd-Half Semester Review

Curso: Ethical Hacking and Countermeasures

Distributed Denial of Service (DDoS)

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

NISCC Technical Note 06/02: Response to Distributed Denial of Service (DDoS) Attacks

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

DDoS and Traceback 1

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

Computer Security: Principles and Practice

Firewalls, Tunnels, and Network Intrusion Detection

User s Manual. How to configure and use FortGuard Professional Anti-DDoS Firewall

Check Point DDoS Protector Introduction

Home Computer and Internet User Security

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Certified Ethical Hacker (CEH)

Endpoint Security - what-if analysis 1

CNT4406/5412 Network Security Introduction

Chapter 4. Network Security. Part I

Enterprise D/DoS Mitigation Solution offering

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

Hacking Terminology. Mark R. Adams, CISSP KPMG LLP

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 9

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Achieving High Survivability in Distributed Systems through Automated Response

INTRODUCTION ON D-DOS. Presentation by RAJKUMAR PATOLIYA

Endpoint Protection : Last line of defense?

2. INTRUDER DETECTION SYSTEMS

Denial of Service. Denial of Service. A metaphor: Denial-of-Dinner Attack. DDoS over the years. Ozalp Babaoglu

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Data Sheet. DPtech IPS2000 Series Intrusion Prevention System. Overview. Series IPS2000-MC-N. Features

9. Security. Safeguard Engine. Safeguard Engine Settings

CIH

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

MITIGATING DENIAL OF SERVICE ATTACKS IN OLSR PROTOCOL USING FICTITIOUS NODES

Denial of Service. Denial of Service. A metaphor: Denial-of-Dinner Attack. DDoS over the years. Ozalp Babaoglu

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

DENIAL OF SERVICE ATTACKS

Wireless Network Security Fundamentals and Technologies

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks

Denial of Service, Traceback and Anonymity

Basic Concepts in Intrusion Detection

COMPUTER NETWORK SECURITY

Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing. International Standard Book Number:

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies

Web Security. Outline

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004

DDoS PREVENTION TECHNIQUE

NETWORK THREATS DEMAN

CSE Computer Security

Configuring attack detection and prevention 1

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Buffer Overflow Defenses

A Software Tool for Network Intrusion Detection

Networking Security SPRING 2018: GANG WANG

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 11

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Lecture 12. Application Layer. Application Layer 1

Denial of Service and Distributed Denial of Service Attacks

All Attacks. Filter Name Filter No. Severity. Hit Count : IP: Source IP Address Spoofed (Reserved for Testing) 0055 Minor 6,942,665

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

Access Controls. CISSP Guide to Security Essentials Chapter 2

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Denial of Service. Eduardo Cardoso Abreu - Federico Matteo Bencic - Pavel Alexeenko -

NIP6000 Next-Generation Intrusion Prevention System

CSE Computer Security (Fall 2006)

INFS 766 Internet Security Protocols. Lecture 1 Firewalls. Prof. Ravi Sandhu INTERNET INSECURITY

haltdos - Web Application Firewall

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Introduction.

this security is provided by the administrative authority (AA) of a network, on behalf of itself, its customers, and its legal authorities

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

A SURVEY TO ANALYSE MITIGATION TECHNIQUES FOR DISTRIBUTED DENIAL OF SERVICE ATTACKS

Transcription:

The Protocols that run the Internet Attack types in the Internet Seminarvortrag Sommersemester 2003 Jens Gerken

Content Internet Attacks Introduction Network Service Attacks Distributed Denial of Service Attacks Classification of DDoS Attacks Classification of DDoS Defends Conclusion

DNS Root Server Attack 22. October 2002 DDoS attack on 13 DNS root servers of the internet Only 4-5 survived without DoS

What causes Internet Attacks Conceptional Errors No standard encryption in protocols Programming Errors Basis for most attacks (overflow, etc) Configuration Errors Open ports which don t have to be open

Effect of Internet Attacks Loss of Confidentiality Data usually not encrypted Can be catched/read from 3rd persons Loss of Integrity Data can be manipulated Loss of Availability Denial of Service Attacks

Attack Techniques Social Engineering Viruses/Worms/Trojan horses Spoofing (IP, DNS, Web) Sniffing Connection Hijacking Email Attacks Network Service Attacks

Network Service Attacks Process Manipulation Overflow based attacks Non overflow-based attacks Denial of Service attacks Information Leaks System offers information to the attacker which can be used to compromise the system

Overflow based attacks Trying to pass extreme long query/argument to victim service programm Buffer overflow Attack Code attached Put on executable stack area of memory Code being run on the server

Overflow based attacks Example: MS Internet Information Services http://www.example.com/default.ida?nnnnnnn NNNNNNNNNNNNNNNNNNNNNNNNNNNN...attack_code 224 N s to fill up buffer Raw machine code put to executable Stack area

Non Overflow Based Attacks Uses insecure network service features Example: Web based CGI Exploits Attack on CIA Servers 1996 http://www.cia.gov/cgibin/phf?qualias=x%0a/bin/cat%20/etc/pass wd %0a = Shell Escape possibility to run every command locally on the server

Denial of Service Attacks Defintion: Explicit Attempt by attackers to prevent legitimate users of a service from using that service First widespread appearance of Distributed DoS in 1999 Continuous develepment of attack tools

DDoS Why Possible? Internet designed in terms of functionality not security Interdependence of Security Limitation of Resources Power of many > power of few

DDoS Attack Strategy Attacker recruits multiple agents/slaves Normally less secured machines easy to hack Agents can recruit new agents When DDoS Network is installed, agents run the attack on the victim

Classification of DDoS Attacks By Degree of automation Manual Semi automatic Automatic By exploited vulnerability Protocol Brute force

Classification of DDoS Attacks By Attack rate dynamics Continuous Variable By impact Disruptive degrading

Degree of Automation Manual Attacker scans for possible agents Hacks into and installs attack code Semi-automatic Attacker handler agents Direct and indirect communication possible Automated scripts for scanning and compromising Automatic Attacks

Degree of Automation Scanning Random Scanning Trial & error Scanning of possible agents Hitlist Scanning List with possible agents Topological Scanning Email Worms tactic

Degree of Automation Propagation Central Source Propagation

Degree of Automation Propagation Back Chaining Propagation

Degree of Automation Propagation Autonomous Propagation

Exploited Vulnerability Protocol Attacks Exploitation of Protocol Bugs/Features TCP SYN, Malformed Packets Brute Force Attack Filterable Attacks ICMP request Non filterable Attacks Attack packets request legitimate services (HTTP Flood) Filtering leads to DoS

Attack Rate Dynamics Continuous Rate Attacks Majority of Attacks Variable Rate Attacks Increasing Rate Attacks Fluctuation Rate Attacks

Impact of Attack Disruptive Attacks Goal: completely deny the victim s service to ist clients Currently all attacks aim to be disruptive Degrading Attacks Only partly DoS difficult to detect Nevertheless immense damage possible

Classification of DoS Defense By activity Level Preventive Attack prevention DoS prevention Reactive Detection strategy Response strategy

Preventive Mechanisms Attack Prevention System Security Firewalls Virus scanners Intrusion detection systems Protocol Security Problem: protocols designed being cheap for the client expensive for the server New or redesigned Protocols needed

Preventive Mechanisms Denial of Service Prevention Resource Accounting Mechanisms Access to resources depends on priviliges and behavior of the user Resource Multiplication Mechanisms Several servers Load Balancer High internal bandwith links

Reactive Mechanisms Detection Strategy Pattern Attack Detection Database with known attack signatures Anomaly Attack Detection Model of normal system behavior Unknown attacks can be detected

Reactive Mechanisms Response Strategy Agent Identification Traceback techniques Filtering Filter out the attack stream Reconfiguration Mechanisms Add more resources or isolate the attacked machine

DDoS & Final Conclusion No silver Bullet! Developing of new, easy to use attack tools continues As long as most systems are insecure, the whole internet is open to attacks Only global solutions can help