Computer Security DD2395
http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh11/
Fall 2011 Sonja Buchegger buc@kth.se Lecture 8 Denial of Service
1 DD2395 Sonja Buchegger
Computer Security DD2395 - - PowerPoint PPT Presentation
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh11/ Fall 2011 Sonja Buchegger buc@kth.se Lecture 8 Denial of Service DD2395 Sonja Buchegger 1 Course Admin l WANTED: Student representatives for the
1 DD2395 Sonja Buchegger
DD2395 Sonja Buchegger 2
l WANTED: Student representatives for the
l Master’s:
l prepare before lab session l signup!
l signup l finding group partners: meet here during break
DD2395 Sonja Buchegger 3
l denial of service (DoS) an action that prevents or
l attacks
l have been an issue for some time
DD2395 Sonja Buchegger 4
l can use simple flooding ping l from higher capacity link to lower l causing loss of traffic l source of flood traffic easily identified
DD2395 Sonja Buchegger 5
DD2395 Sonja Buchegger 6
l use forged source addresses
l generate large volumes of packets l directed at target l with different, random, source addresses
DD2395 Sonja Buchegger 7
l Why would an attacker bother doing that?
DD2395 Sonja Buchegger 8
l cause same congestion, but l responses are scattered across Internet l real source is much harder to identify
DD2395 Sonja Buchegger 9
l other common attack l attacks ability of a server to respond to future
l overflowing tables used to manage them l hence an attack on system resource
DD2395 Sonja Buchegger 10
DD2395 Sonja Buchegger 11
DD2395 Sonja Buchegger 12
l attacker often uses either
l has much lower traffic volume
DD2395 Sonja Buchegger 13
l classified based on network protocol used l ICMP Flood
l UDP Flood
l TCP SYN Flood
DD2395 Sonja Buchegger 14
l have limited volume if single source used l multiple systems allow much higher traffic
l often compromised PC’s / workstations
l e.g. Tribe Flood Network (TFN), TFN2K used a
DD2395 Sonja Buchegger 15
l (D)DoS – Malware – Countermeasures
l Risk to become a zombie l Example: MyDoom
DD2395 Sonja Buchegger 16
l iOS, OS X sandboxing l BIND crash DoS l CarrierIQ rootkit l Duqu individual messages l Useless free AV Android Apps DD2395 Sonja Buchegger 17
DD2395 Sonja Buchegger 18
l use normal behavior of network l attacker sends packet with spoofed source
l server response is directed at target l if send many requests to multiple servers,
l various protocols e.g. UDP or TCP/SYN l ideally want response larger than request l prevent if block source spoofed packets
DD2395 Sonja Buchegger 19
l further variation creates a self-contained loop
l fairly easy to filter and block
DD2395 Sonja Buchegger 20
DD2395 Sonja Buchegger 21
l use DNS requests with spoofed source
l exploit DNS behavior to convert a small
l attacker sends requests to multiple well
l See SMS-o-Death by Collin Mulliner DD2395 Sonja Buchegger 22
DD2395 Sonja Buchegger 23
l high traffic volumes may be legitimate
l or legitimate traffic created by an attacker l three lines of defense against (D)DoS:
DD2395 Sonja Buchegger 24
l block spoofed source addresses
l rate controls in upstream distribution nets
l use modified TCP connection handling
DD2395 Sonja Buchegger 25
l block IP directed broadcasts l block suspicious services & combinations l manage application attacks with “puzzles” to
l good general system security practices l use mirrored and replicated servers when
DD2395 Sonja Buchegger 26
l need good incident response plan
l have standard filters l ideally have network monitors and IDS
DD2395 Sonja Buchegger 27
l identify type of attack
l have ISP trace packet flow back to source
l implement contingency plan l update incident response plan
DD2395 Sonja Buchegger 28
l introduced denial of service (DoS) attacks l classic flooding and SYN spoofing attacks l ICMP, UDP, TCP SYN floods l distributed denial of service (DDoS) attacks l reflection and amplification attacks l defenses against DoS attacks l responding to DoS attacks
29
l A ¡subject ¡should ¡only ¡be ¡given ¡those ¡privileges ¡that ¡
30
l Unless ¡a ¡subject ¡is ¡given ¡explicit ¡access ¡to ¡an ¡object, ¡
31
l Security ¡mechanisms ¡should ¡be ¡as ¡simple ¡as ¡
32
l It ¡is ¡required ¡that ¡all ¡accesses ¡to ¡objects ¡be ¡checked ¡
33
l The ¡security ¡of ¡a ¡mechanism ¡should ¡not ¡depend ¡on ¡
34
l A ¡system ¡should ¡not ¡grant ¡permission ¡based ¡on ¡a ¡
l SeparaEon ¡of ¡duty: ¡e.g. ¡cannot ¡be ¡the ¡auditor ¡and ¡
35
l Mechanisms ¡used ¡to ¡access ¡resources ¡should ¡not ¡be ¡
l E.g. ¡web ¡service ¡provider ¡ 36
l Security ¡mechanisms ¡should ¡not ¡make ¡the ¡resource ¡
37