Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

Similar documents
Computer Security: Principles and Practice

Chapter 7. Denial of Service Attacks

COMPUTER NETWORK SECURITY

Denial of Service (DoS)

CSE 565 Computer Security Fall 2018

DENIAL OF SERVICE ATTACKS

DDoS Testing with XM-2G. Step by Step Guide

Network Security Protocols NET 412D

NETWORK SECURITY. Ch. 3: Network Attacks

Contents. Denial-of-Service Attacks. Flooding Attacks. Distributed Denial-of Service Attacks. Reflector Against Denial-of-Service Attacks

Denial of Service. Eduardo Cardoso Abreu - Federico Matteo Bencic - Pavel Alexeenko -

Cloudflare Advanced DDoS Protection

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004

CSE Computer Security (Fall 2006)

Network Security. Thierry Sans

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Attack Prevention Technology White Paper

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

DDoS and Traceback 1

Technical White Paper June 2016

Threat Pragmatics. Target 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

Configuring attack detection and prevention 1

Last lecture we talked about how Intrusion Detection works. Today we will talk about the attacks. Intrusion Detection. Shell code

Denial of Service and Distributed Denial of Service Attacks

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

Dan Boneh, John Mitchell, Dawn Song. Denial of Service

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

CIS 551 / TCOM 401 Computer and Network Security

Guide to DDoS Attacks November 2017

CNT Computer and Network Security: Denial of Service

Denial of Service (DoS) attacks and countermeasures

Configuring attack detection and prevention 1

Denial of Service. EJ Jung 11/08/10

Firewalls, Tunnels, and Network Intrusion Detection

CSc 466/566. Computer Security. 18 : Network Security Introduction

HP High-End Firewalls

DDoS PREVENTION TECHNIQUE

Chapter 10: Denial-of-Services

Distributed Denial of Service (DDoS)

20-CS Cyber Defense Overview Fall, Network Basics

CSE Computer Security

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

A Software Tool for Network Intrusion Detection

Lecture 6: Worms, Viruses and DoS attacks. II. Relationships between Biological diseases and Computers Viruses/Worms

Network Security. Chapter 0. Attacks and Attack Detection

Prevent DoS using IP source address spoofing

Denial of Service. Denial of Service. A metaphor: Denial-of-Dinner Attack. DDoS over the years. Ozalp Babaoglu

Resources and Credits. Definition. Symptoms. Denial of Service 3/3/2010 COMP Information on Denial of Service attacks can

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

Ping of death Land attack Teardrop Syn flood Smurf attack. DOS Attack Methods

Network and Internet Vulnerabilities

Adopting Innovative Detection Technique To Detect ICMPv6 Based Vulnerability Attacks

Network Security: Denial of Service (DoS) Tuomas Aura / Aapo Kalliola T Network security Aalto University, Nov-Dec 2011

Imma Chargin Mah Lazer

ELEC5616 COMPUTER & NETWORK SECURITY

HP High-End Firewalls

DNS Security. Ch 1: The Importance of DNS Security. Updated

Network Security. Tadayoshi Kohno

Network Security. Evil ICMP, Careless TCP & Boring Security Analyses. Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, October 4th, 2018

CS670: Network security

IBM i Version 7.3. Security Intrusion detection IBM

Are You Fully Prepared to Withstand DNS Attacks?

Configuring Firewall TCP SYN Cookie

Denial of Service. Denial of Service. A metaphor: Denial-of-Dinner Attack. DDoS over the years. Ozalp Babaoglu

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

NISCC Technical Note 06/02: Response to Distributed Denial of Service (DDoS) Attacks

CSCE 463/612 Networks and Distributed Processing Spring 2018

Network Security: Denial of Service (DoS) Tuomas Aura (includes material by Aapo Kalliola) T Network security Aalto University, Nov-Dec 2014

Network Security: Denial of Service (DoS) Aapo Kalliola / Tuomas Aura T Network security Aalto University, Nov-Dec 2013

Our Narrow Focus Computer Networking Security Vulnerabilities. IP-level vulnerabilities

Network and Internet Vulnerabilities

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

Network Security: Denial of Service (DoS) Tuomas Aura T Network security Aalto University, Nov-Dec 2010

CE Advanced Network Security Botnets

Anti-DDoS. User Guide. Issue 05 Date

The big picture. Security. Some consequences. Three types of threat. LAN Eavesdropping. Network-based access control

PROTECTING INFORMATION ASSETS NETWORK SECURITY

(Distributed) Denial-of-Service. in theory and in practice

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management

Network Security: Denial of Service (DoS) Tuomas Aura / Aapo Kalliola T Network security Aalto University, Nov-Dec 2012

Security. - All kinds of bad things attackers can do over the network. - Techniques for protecting against these and other attacks

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

To Study and Explain the Different DDOS Attacks In MANET

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

MITIGATING DENIAL OF SERVICE ATTACKS IN OLSR PROTOCOL USING FICTITIOUS NODES

9. Security. Safeguard Engine. Safeguard Engine Settings

ARP Inspection and the MAC Address Table for Transparent Firewall Mode

network security s642 computer security adam everspaugh

Chapter 8 roadmap. Network Security

Protection Against Distributed Denial of Service Attacks

Computer and Network Security

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

Transcription:

Security+ Guide to Network Security Fundamentals, Fourth Edition Network Attacks Denial of service Attacks

Introduction: What is DoS? DoS attack is an attempt (malicious or selfish) by an attacker to cause a victim to deny service to its customers DoS is an action that prevents the authorized use of networks, systems, or applications by exhausting resources such as CPU, memory, bandwidtch, and disk space Categories of resources that could be attacked 2 Network bandwidth Related to the capacity of network links connecting a server to the wider Internet System resources Overloading/crashing network handling software (e.g., SYN spoofing, ping-of-death a huge ping packet) Application resources Overloading the capabilities of a web server application (e.g., valid querries)

Dos Attacks Dos attacks uses two basic techniques of attack Reflection Amplification Security+ Guide to Network Security Fundamentals, Fourth Edition 3

Security+ Guide to Network Security Fundamentals, Fourth Edition 4

Security+ Guide to Network Security Fundamentals, Fourth Edition 5

Denial of service (DoS) Ping flood attack DOS Attacks Ping utility used to send large number of echo request messages Overwhelms Web server (target server) Ping of Death: famous ping attack using a large packet size and large number of ping requests. Smurf attack Ping request with originating address changed Appears as if target computer is asking for response from all computers on the network Security+ Guide to Network Security Fundamentals, Fourth Edition 6

Dos Attacks Denial of service (DoS) (cont d.) SYN flood attack Takes advantage of procedures for establishing a connection Distributed denial of service (DDoS) Attacker uses many zombie computers in a botnet to flood a device with requests Virtually impossible to identify and block source of attack Security+ Guide to Network Security Fundamentals, Fourth Edition 7

Ping Flood - Network Attacks Security+ Guide to Network Security Fundamentals, Fourth Edition 8

SMURF Ping Flood Security+ Guide to Network Security Fundamentals, Fourth Edition 9

SYN FLOOD TCP Connection Handshake

Figure 3-9 SYN flood attack Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition 11

DDoS Control Hierarchy

Poisoning ARP poisoning Attacker modifies MAC address in ARP cache to point to different computer Table 3-3 ARP poisoning attack Security+ Guide to Network Security Fundamentals, Fourth Edition 13

Poisoning (cont d.) Table 3-4 Attacks from ARP poisoning Security+ Guide to Network Security Fundamentals, Fourth Edition 14

Poisoning (cont d.) DNS poisoning Domain Name System is current basis for name resolution to IP address DNS poisoning substitutes DNS addresses to redirect computer to another device Two locations for DNS poisoning Local host table External DNS server Security+ Guide to Network Security Fundamentals, Fourth Edition 15

Figure 3-12 DNS poisoning Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition 16

Security+ Guide to Network Security Fundamentals, Fourth Edition 17

Attack Prevention block spoofed source addresses on routers as close to source as possible still far too rarely implemented rate controls in upstream distribution nets on specific packets types e.g. some ICMP, some UDP, TCP/SYN use modified TCP connection handling use SYN cookies when table full or selective or random drop when table full

Attack Prevention block IP directed broadcasts block suspicious services & combinations manage application attacks with puzzles to distinguish legitimate human requests good general system security practices use mirrored and replicated servers when highperformance and reliability required

Responding to Attacks need good incident response plan with contacts for ISP needed to impose traffic filtering upstream details of response process have standard filters ideally have network monitors and IDS to detect and notify abnormal traffic patterns

Responding to Attacks identify type of attack capture and analyze packets design filters to block attack traffic upstream or identify and correct system/application bug have ISP trace packet flow back to source may be difficult and time consuming necessary if legal action desired implement contingency plan update incident response plan