computer security dd2395
play

Computer Security DD2395 - PowerPoint PPT Presentation

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh11/ Fall 2011 Sonja Buchegger buc@kth.se Lecture 8 Denial of Service DD2395 Sonja Buchegger 1 Course Admin l WANTED: Student representatives for the


  1. Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh11/ Fall 2011 Sonja Buchegger buc@kth.se Lecture 8 Denial of Service DD2395 Sonja Buchegger 1

  2. Course Admin l WANTED: Student representatives for the course l Master’s: - Lab 1: last sessions today and tomorrow - Lab 2: l prepare before lab session l signup! - Lab 3: prepare: webgoat, gruyere - Lab 4: l signup l finding group partners: meet here during break DD2395 Sonja Buchegger 2

  3. Denial of Service l denial of service (DoS) an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space l attacks - network bandwidth - system resources - application resources l have been an issue for some time DD2395 Sonja Buchegger 3

  4. Classic Denial of Service Attacks l can use simple flooding ping l from higher capacity link to lower l causing loss of traffic l source of flood traffic easily identified DD2395 Sonja Buchegger 4

  5. Classic Denial of Service Attacks DD2395 Sonja Buchegger 5

  6. Source Address Spoofing l use forged source addresses - given sufficient privilege to “raw sockets” - easy to create l generate large volumes of packets l directed at target l with different, random, source addresses DD2395 Sonja Buchegger 6

  7. Source Address Spoofing l Why would an attacker bother doing that? DD2395 Sonja Buchegger 7

  8. Source Address Spoofing l cause same congestion, but l responses are scattered across Internet l real source is much harder to identify DD2395 Sonja Buchegger 8

  9. SYN Spoofing l other common attack l attacks ability of a server to respond to future connection requests l overflowing tables used to manage them l hence an attack on system resource DD2395 Sonja Buchegger 9

  10. TCP Connection Handshake DD2395 Sonja Buchegger 10

  11. SYN Spoofing Attack DD2395 Sonja Buchegger 11

  12. SYN Spoofing Attack l attacker often uses either - random source addresses - or that of an overloaded server - to block return of (most) reset packets l has much lower traffic volume - attacker can be on a much lower capacity link DD2395 Sonja Buchegger 12

  13. Types of Flooding Attacks l classified based on network protocol used l ICMP Flood - uses ICMP packets, eg echo request - typically allowed through, some required l UDP Flood - alternative uses UDP packets to some port l TCP SYN Flood - use TCP SYN (connection request) packets - but for volume attack DD2395 Sonja Buchegger 13

  14. Distributed Denial of Service Attacks l have limited volume if single source used l multiple systems allow much higher traffic volumes to form a Distributed Denial of Service (DDoS) Attack l often compromised PC ’ s / workstations - zombies with backdoor programs installed - forming a botnet l e.g. Tribe Flood Network (TFN), TFN2K used a trojan DD2395 Sonja Buchegger 14

  15. DDoS Control Hierarchy DD2395 Sonja Buchegger 15

  16. Connections l (D)DoS – Malware – Countermeasures (intrusion detection, firewalls, AC, authentication) l Risk to become a zombie l Example: MyDoom - Worm - Backdoor - DoS - Antivirus DD2395 Sonja Buchegger 16

  17. News Roundup l iOS, OS X sandboxing l BIND crash DoS l CarrierIQ rootkit l Duqu individual messages l Useless free AV Android Apps DD2395 Sonja Buchegger 17

  18. Reflection Attacks l use normal behavior of network l attacker sends packet with spoofed source address being that of target to a server l server response is directed at target l if send many requests to multiple servers, response can flood target l various protocols e.g. UDP or TCP/SYN l ideally want response larger than request l prevent if block source spoofed packets DD2395 Sonja Buchegger 18

  19. Reflection Attacks l further variation creates a self-contained loop between intermediary and target l fairly easy to filter and block DD2395 Sonja Buchegger 19

  20. Amplification Attacks DD2395 Sonja Buchegger 20

  21. DNS Amplification Attacks l use DNS requests with spoofed source address being the target l exploit DNS behavior to convert a small request to a much larger response - 60 byte request to 512 - 4000 byte response l attacker sends requests to multiple well connected servers, which flood target - need only moderate flow of request packets - DNS servers will also be loaded DD2395 Sonja Buchegger 21

  22. DoS on Phones l See SMS-o-Death by Collin Mulliner DD2395 Sonja Buchegger 22

  23. DoS Attack Defenses l high traffic volumes may be legitimate - result of high publicity, e.g. “slash-dotted” - or to a very popular site, e.g. Olympics etc l or legitimate traffic created by an attacker l three lines of defense against (D)DoS: - attack prevention and preemption - attack detection and filtering - attack source traceback and identification DD2395 Sonja Buchegger 23

  24. Attack Prevention l block spoofed source addresses - on routers as close to source as possible - still far too rarely implemented l rate controls in upstream distribution nets - on specific packets types - e.g. some ICMP, some UDP, TCP/SYN l use modified TCP connection handling - use SYN cookies when table full - or selective or random drop when table full DD2395 Sonja Buchegger 24

  25. Attack Prevention l block IP directed broadcasts l block suspicious services & combinations l manage application attacks with “ puzzles ” to distinguish legitimate human requests l good general system security practices l use mirrored and replicated servers when high-performance and reliability required DD2395 Sonja Buchegger 25

  26. Responding to Attacks l need good incident response plan - with contacts for ISP - needed to impose traffic filtering upstream - details of response process l have standard filters l ideally have network monitors and IDS - to detect and notify abnormal traffic patterns DD2395 Sonja Buchegger 26

  27. Responding to Attacks l identify type of attack - capture and analyze packets - design filters to block attack traffic upstream - or identify and correct system/application bug l have ISP trace packet flow back to source - may be difficult and time consuming - necessary if legal action desired l implement contingency plan l update incident response plan DD2395 Sonja Buchegger 27

  28. Summary l introduced denial of service (DoS) attacks l classic flooding and SYN spoofing attacks l ICMP, UDP, TCP SYN floods l distributed denial of service (DDoS) attacks l reflection and amplification attacks l defenses against DoS attacks l responding to DoS attacks DD2395 Sonja Buchegger 28

  29. Design ¡Principles ¡ 29

  30. Principle ¡of ¡Least ¡Privilege ¡ l A ¡subject ¡should ¡only ¡be ¡given ¡those ¡privileges ¡that ¡ it ¡needs ¡to ¡complete ¡its ¡task ¡ 30

  31. Principle ¡of ¡Fail-­‑Safe ¡Defaults ¡ l Unless ¡a ¡subject ¡is ¡given ¡explicit ¡access ¡to ¡an ¡object, ¡ it ¡should ¡be ¡denied ¡access ¡to ¡that ¡object. ¡ 31

  32. Principle of Economy of Mechanism l Security ¡mechanisms ¡should ¡be ¡as ¡simple ¡as ¡ possible ¡ 32

  33. Principle ¡of ¡Complete ¡MediaEon ¡ l It ¡is ¡required ¡that ¡all ¡accesses ¡to ¡objects ¡be ¡checked ¡ to ¡ensure ¡that ¡they ¡are ¡allowed. ¡ 33

  34. Principle ¡of ¡Open ¡Design ¡ l The ¡security ¡of ¡a ¡mechanism ¡should ¡not ¡depend ¡on ¡ the ¡secrecy ¡of ¡its ¡design ¡or ¡implementaEon. ¡ 34

  35. Principle ¡of ¡SeparaEon ¡of ¡Privilege ¡ l A ¡system ¡should ¡not ¡grant ¡permission ¡based ¡on ¡a ¡ single ¡condiEon. ¡ l SeparaEon ¡of ¡duty: ¡e.g. ¡cannot ¡be ¡the ¡auditor ¡and ¡ the ¡audited ¡ 35

  36. Principle of Least Common Mechansim l Mechanisms ¡used ¡to ¡access ¡resources ¡should ¡not ¡be ¡ shared ¡ l E.g. ¡web ¡service ¡provider ¡ 36

  37. Principle of Psychological Acceptability l Security ¡mechanisms ¡should ¡not ¡make ¡the ¡resource ¡ more ¡difficult ¡to ¡access ¡than ¡if ¡the ¡security ¡ mechanisms ¡were ¡not ¡present. ¡ 37

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend