Computer Security DD2395 - - PowerPoint PPT Presentation

computer security dd2395
SMART_READER_LITE
LIVE PREVIEW

Computer Security DD2395 - - PowerPoint PPT Presentation

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh11/ Fall 2011 Sonja Buchegger buc@kth.se Lecture 8 Denial of Service DD2395 Sonja Buchegger 1 Course Admin l WANTED: Student representatives for the


slide-1
SLIDE 1

Computer Security DD2395

http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh11/

Fall 2011 Sonja Buchegger buc@kth.se Lecture 8 Denial of Service

1 DD2395 Sonja Buchegger

slide-2
SLIDE 2

DD2395 Sonja Buchegger 2

Course Admin

l WANTED: Student representatives for the

course

l Master’s:

  • Lab 1: last sessions today and tomorrow
  • Lab 2:

l prepare before lab session l signup!

  • Lab 3: prepare: webgoat, gruyere
  • Lab 4:

l signup l finding group partners: meet here during break

slide-3
SLIDE 3

DD2395 Sonja Buchegger 3

Denial of Service

l denial of service (DoS) an action that prevents or

impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space

l attacks

  • network bandwidth
  • system resources
  • application resources

l have been an issue for some time

slide-4
SLIDE 4

DD2395 Sonja Buchegger 4

Classic Denial of Service Attacks

l can use simple flooding ping l from higher capacity link to lower l causing loss of traffic l source of flood traffic easily identified

slide-5
SLIDE 5

DD2395 Sonja Buchegger 5

Classic Denial of Service Attacks

slide-6
SLIDE 6

DD2395 Sonja Buchegger 6

Source Address Spoofing

l use forged source addresses

  • given sufficient privilege to “raw sockets”
  • easy to create

l generate large volumes of packets l directed at target l with different, random, source addresses

slide-7
SLIDE 7

DD2395 Sonja Buchegger 7

Source Address Spoofing

l Why would an attacker bother doing that?

slide-8
SLIDE 8

DD2395 Sonja Buchegger 8

Source Address Spoofing

l cause same congestion, but l responses are scattered across Internet l real source is much harder to identify

slide-9
SLIDE 9

DD2395 Sonja Buchegger 9

SYN Spoofing

l other common attack l attacks ability of a server to respond to future

connection requests

l overflowing tables used to manage them l hence an attack on system resource

slide-10
SLIDE 10

DD2395 Sonja Buchegger 10

TCP Connection Handshake

slide-11
SLIDE 11

DD2395 Sonja Buchegger 11

SYN Spoofing Attack

slide-12
SLIDE 12

DD2395 Sonja Buchegger 12

SYN Spoofing Attack

l attacker often uses either

  • random source addresses
  • or that of an overloaded server
  • to block return of (most) reset packets

l has much lower traffic volume

  • attacker can be on a much lower capacity link
slide-13
SLIDE 13

DD2395 Sonja Buchegger 13

Types of Flooding Attacks

l classified based on network protocol used l ICMP Flood

  • uses ICMP packets, eg echo request
  • typically allowed through, some required

l UDP Flood

  • alternative uses UDP packets to some port

l TCP SYN Flood

  • use TCP SYN (connection request) packets
  • but for volume attack
slide-14
SLIDE 14

DD2395 Sonja Buchegger 14

Distributed Denial of Service Attacks

l have limited volume if single source used l multiple systems allow much higher traffic

volumes to form a Distributed Denial of Service (DDoS) Attack

l often compromised PC’s / workstations

  • zombies with backdoor programs installed
  • forming a botnet

l e.g. Tribe Flood Network (TFN), TFN2K used a

trojan

slide-15
SLIDE 15

DD2395 Sonja Buchegger 15

DDoS Control Hierarchy

slide-16
SLIDE 16

Connections

l (D)DoS – Malware – Countermeasures

(intrusion detection, firewalls, AC, authentication)

l Risk to become a zombie l Example: MyDoom

  • Worm
  • Backdoor
  • DoS
  • Antivirus

DD2395 Sonja Buchegger 16

slide-17
SLIDE 17

News Roundup

l iOS, OS X sandboxing l BIND crash DoS l CarrierIQ rootkit l Duqu individual messages l Useless free AV Android Apps DD2395 Sonja Buchegger 17

slide-18
SLIDE 18

DD2395 Sonja Buchegger 18

Reflection Attacks

l use normal behavior of network l attacker sends packet with spoofed source

address being that of target to a server

l server response is directed at target l if send many requests to multiple servers,

response can flood target

l various protocols e.g. UDP or TCP/SYN l ideally want response larger than request l prevent if block source spoofed packets

slide-19
SLIDE 19

DD2395 Sonja Buchegger 19

Reflection Attacks

l further variation creates a self-contained loop

between intermediary and target

l fairly easy to filter and block

slide-20
SLIDE 20

DD2395 Sonja Buchegger 20

Amplification Attacks

slide-21
SLIDE 21

DD2395 Sonja Buchegger 21

DNS Amplification Attacks

l use DNS requests with spoofed source

address being the target

l exploit DNS behavior to convert a small

request to a much larger response

  • 60 byte request to 512 - 4000 byte response

l attacker sends requests to multiple well

connected servers, which flood target

  • need only moderate flow of request packets
  • DNS servers will also be loaded
slide-22
SLIDE 22

DoS on Phones

l See SMS-o-Death by Collin Mulliner DD2395 Sonja Buchegger 22

slide-23
SLIDE 23

DD2395 Sonja Buchegger 23

DoS Attack Defenses

l high traffic volumes may be legitimate

  • result of high publicity, e.g. “slash-dotted”
  • or to a very popular site, e.g. Olympics etc

l or legitimate traffic created by an attacker l three lines of defense against (D)DoS:

  • attack prevention and preemption
  • attack detection and filtering
  • attack source traceback and identification
slide-24
SLIDE 24

DD2395 Sonja Buchegger 24

Attack Prevention

l block spoofed source addresses

  • on routers as close to source as possible
  • still far too rarely implemented

l rate controls in upstream distribution nets

  • on specific packets types
  • e.g. some ICMP, some UDP, TCP/SYN

l use modified TCP connection handling

  • use SYN cookies when table full
  • or selective or random drop when table full
slide-25
SLIDE 25

DD2395 Sonja Buchegger 25

Attack Prevention

l block IP directed broadcasts l block suspicious services & combinations l manage application attacks with “puzzles” to

distinguish legitimate human requests

l good general system security practices l use mirrored and replicated servers when

high-performance and reliability required

slide-26
SLIDE 26

DD2395 Sonja Buchegger 26

Responding to Attacks

l need good incident response plan

  • with contacts for ISP
  • needed to impose traffic filtering upstream
  • details of response process

l have standard filters l ideally have network monitors and IDS

  • to detect and notify abnormal traffic patterns
slide-27
SLIDE 27

DD2395 Sonja Buchegger 27

Responding to Attacks

l identify type of attack

  • capture and analyze packets
  • design filters to block attack traffic upstream
  • or identify and correct system/application bug

l have ISP trace packet flow back to source

  • may be difficult and time consuming
  • necessary if legal action desired

l implement contingency plan l update incident response plan

slide-28
SLIDE 28

DD2395 Sonja Buchegger 28

Summary

l introduced denial of service (DoS) attacks l classic flooding and SYN spoofing attacks l ICMP, UDP, TCP SYN floods l distributed denial of service (DDoS) attacks l reflection and amplification attacks l defenses against DoS attacks l responding to DoS attacks

slide-29
SLIDE 29

Design ¡Principles ¡

29

slide-30
SLIDE 30

Principle ¡of ¡Least ¡Privilege ¡

l A ¡subject ¡should ¡only ¡be ¡given ¡those ¡privileges ¡that ¡

it ¡needs ¡to ¡complete ¡its ¡task ¡

30

slide-31
SLIDE 31

Principle ¡of ¡Fail-­‑Safe ¡Defaults ¡

l Unless ¡a ¡subject ¡is ¡given ¡explicit ¡access ¡to ¡an ¡object, ¡

it ¡should ¡be ¡denied ¡access ¡to ¡that ¡object. ¡

31

slide-32
SLIDE 32

Principle of Economy of Mechanism

l Security ¡mechanisms ¡should ¡be ¡as ¡simple ¡as ¡

possible ¡

32

slide-33
SLIDE 33

Principle ¡of ¡Complete ¡MediaEon ¡

l It ¡is ¡required ¡that ¡all ¡accesses ¡to ¡objects ¡be ¡checked ¡

to ¡ensure ¡that ¡they ¡are ¡allowed. ¡

33

slide-34
SLIDE 34

Principle ¡of ¡Open ¡Design ¡

l The ¡security ¡of ¡a ¡mechanism ¡should ¡not ¡depend ¡on ¡

the ¡secrecy ¡of ¡its ¡design ¡or ¡implementaEon. ¡

34

slide-35
SLIDE 35

Principle ¡of ¡SeparaEon ¡of ¡Privilege ¡

l A ¡system ¡should ¡not ¡grant ¡permission ¡based ¡on ¡a ¡

single ¡condiEon. ¡

l SeparaEon ¡of ¡duty: ¡e.g. ¡cannot ¡be ¡the ¡auditor ¡and ¡

the ¡audited ¡

35

slide-36
SLIDE 36

Principle of Least Common Mechansim

l Mechanisms ¡used ¡to ¡access ¡resources ¡should ¡not ¡be ¡

shared ¡

l E.g. ¡web ¡service ¡provider ¡ 36

slide-37
SLIDE 37

Principle of Psychological Acceptability

l Security ¡mechanisms ¡should ¡not ¡make ¡the ¡resource ¡

more ¡difficult ¡to ¡access ¡than ¡if ¡the ¡security ¡ mechanisms ¡were ¡not ¡present. ¡

37