denial of service a acks
play

Denial of Service A/acks Cunsheng Ding Department of CSE HKUST, - PowerPoint PPT Presentation

Denial of Service A/acks Cunsheng Ding Department of CSE HKUST, Hong Kong Acknowledgements: Materials are taken from the Internet COMP4631 1 Agenda of this lecture Zombie computers, bots, botnets Denial of service (DoS) a/acks


  1. Denial of Service A/acks Cunsheng Ding Department of CSE HKUST, Hong Kong Acknowledgements: Materials are taken from the Internet COMP4631 1

  2. Agenda of this lecture • Zombie computers, bots, botnets • Denial of service (DoS) a/acks • Distributed denial of services (DDoS) a/acks • Specific DoS a/acks – Ping of death, Smurf, Teardrop, DNS amplificaPon • Defenses against DoS a/acks • Conclusions COMP4631 2

  3. Zombie computers, bots, botnets COMP4631 3

  4. Zombie computers • A zombie computer is a user’s computer controlled and used by a hacker to conduct illegal acPviPes. • The user generally remains unaware that his computer has been taken over -- he can sPll use it, though it might slow down considerably. • As his computer begins to either send out massive amounts of spam or a/ack Web pages, he becomes the focal point for any invesPgaPons involving his computer's suspicious acPviPes. COMP4631 4

  5. Transforming computers into zombies • Crackers do it by using small programs that exploit weaknesses in a computer's operaPng system. • In order to infect a computer, the cracker must first get the installaPon program to the vicPm. – Crackers can do this through e-mail, peer-to-peer networks or even on a regular Web site. – The program either contains specific instrucPons to carry out a task at a parPcular Pme, or it allows the cracker to directly control the user's Internet acPvity. • Most of the Pme, crackers disguise the malicious program with a name and file extension so that the vicPm thinks he's geZng something enPrely different. COMP4631 5

  6. Malwares • Programs designed to harm or compromise a computer are called malwares (as in malicious so]ware). • Malware includes a wide array of nasty batches of code that can wreak havoc to your computer, your network and even the Internet itself. COMP4631 6

  7. Malwares turning computers into zombies • Computer viruses – programs that disable the vicPm's computer, either by corrupPng necessary files or hogging the computer's resources. • Vorms – programs that spread from one machine to another, rapidly infecPng hundreds of computers in a short Pme. • Trojan horse – a program that claims to do one thing, but actually either damages the computer or opens a back door to your system. COMP4631 7

  8. Malwares turning computers into zombies • Rootkits – a collecPon of programs that permits administrator-level control of a computer; not necessarily malware on its own. – crackers use rootkits to control computers and evade detecPon • Backdoors – methods of circumvenPng the normal operaPng-system procedures, allowing a cracker to access informaPon on another computer • Key loggers – programs that record keystrokes made by a user, allowing crackers to discover passwords and login codes COMP4631 8

  9. Zombie computers for spamming It is hard to trace the hacker! COMP4631 9

  10. A zombie by any other name • A zombie computer can sPll behave normally, and every acPon it takes is a result of a cracker's instrucPons (though these instrucPons might be automated). Hence, the name “zombie computer” may be misleading. • Due to this, some people prefer the term " bot .” – Bot comes from the word " robot ," which in this sense is a device that carries out specific instrucPons. – A collecPon of networked bots is called a " botnet ," and a group of zombie computers is called an " army ." COMP4631 10

  11. Denial of Service A/acks COMP4631 11

  12. What is a denial-of-service a/ack? • A denial of service (DoS) is an acPon that prevents or impairs the authorized use of networks, systems, or applicaPons by exhaus-ng resources such as CPUs, memory, bandwidth, and disk space. • It is a form of a/ack on the availability of some service. COMP4631 12

  13. Targeted resources • The following categories of resources could be a/ached: – Network bandwidth • E.g., a link between a server and an ISP. – System resources • E.g., overload or crash a system’s network handling so]ware. [e.g., Ping of Death, Teardrop ] – ApplicaPon resources • E.g., a Web server, email server COMP4631 13

  14. Distributed Denial of Service (DDoS) A/acks COMP4631 14

  15. Distributed DoS a/acks • A cracker uses a network of “zombie computers” to sabotage a specific Web site or server. (How?) • The idea is pre/y simple -- a cracker tells all the computers on his botnet to contact a specific server or Web site repeatedly . • The sudden increase in traffic can cause the site to load very slowly for legiPmate users. SomePmes the traffic is enough to shut the site down completely. COMP4631 15

  16. DDoS a/acks: pictorial descripPon ReflecPon a/ack COMP4631 16

  17. How does a DDoS work? • The cracker sends “the command” to iniPate the a/ack to his zombie army. • Each computer within the army sends an electronic connecPon request to an innocent computer called a reflector . • When the reflector receives the request, it looks like it originates not from the zombies, but from the ulPmate vicPm of the a/ack. • The reflectors send informaPon to the vicPm system, and eventually the system's performance suffers or it shuts down completely as it is overwhelmed with mulPple unsolicited responses from several computers at once. COMP4631 17

  18. Features of DDoS a/acks • From the perspecPve of the vicPm, it looks like the reflectors a/acked the system. • From the perspecPve of the reflectors, it seems like the vicPmized system requested the packets. • The zombie computers remain hidden, and even more out of sight is the cracker himself. COMP4631 18

  19. Some DDoS a/acks • Ping of Death: – bots create huge electronic packets and sends them on to vicPms. • Mailbomb: – bots send a massive amount of e-mail, crashing e-mail servers. • Smurf A/ack: – bots send Internet Control Message Protocol (ICMP) messages to reflectors. • Teardrop: – bots send pieces of an illegiPmate packet; the vicPm system tries to recombine the pieces into a packet and crashes as a result COMP4631 19

  20. Examples of VicPms • Companies – Microso], Amazon, CNN, Yahoo • Financial insPtuPons – eBay, COMP4631 20

  21. Script kiddies: so easy to do it • On May 4th, 2001, a 13-year-old cracker used a denial of service a/ack to bring down GRC.com, the Web site for Gibson Research CorporaPon. Ironically, GRC.com focuses on Internet security. • In 2006, police in Hanoi, Vietnam arrested a high school sophomore for orchestraPng a DDoS a/ack on a Web site for the Nhan Hoa So]ware Company. He said the reason he did it was because he didn't like the Web site. COMP4631 21

  22. ClassificaPon of DoS a/acks • Direct a/acks – A/acker uses his/her computer to a/ack the targeted machine or system directly. – E.g., sending a huge number of emails to a mail server in a short Pme period. – It is easy to trace back to the a/acker. • ReflecPon a/acks (indirect a/acks) – A/acker spoofed source addresses to a/ack the targeted machine or system directly. – It is much harder to find out the a/acker. – Most DDoS a/acks are reflecPon a/acks. COMP4631 22

  23. Several Denial of Service (DoS) A/acks COMP4631 23

  24. Classical DoS a/acks • Simplest classical DoS a/ack: Flooding a9ack on an organizaPon: E.g., Ping flood a/ack Service denied to legiPmate users COMP4631 24

  25. Ping of Death • It exploits a flaw in many vendors' implementaPons of ICMP. – ping is a TCP/IP command that sends out an IP packet to a specified IP address or host name to see if there is a response from the address or host. It is o]en used to determine if a host is on the network or alive. – The typical ping command syntax would be: ping 150.24.35.46, or, ping www.acme.net – It works for Windows and Unix-like operaPng systems. Normally it requires a flood of pings to crash a system. • It is an a/ack on the network bandwidth. • It could be a direct or reflec<on a/ack • COMP4631 25

  26. Ping flood a/ack • Use of ping command opPons -n –l Ping of Death Source: learn-networking.com COMP4631 26

  27. Ping flood a/ack cont ’ d …. • Generally useless on larger networks or websites COMP4631 27

  28. Source address spoofing • It is one of the most frequently used spoofing a/ack methods, and can be employed in both direct and reflecPon a/acks. • In an IP address spoofing a/ack, an a/acker sends IP packets from a false (or “spoofed”) source address in order to disguise itself, and distribute the working load of the a/ack. • Denial-of-service a/acks o]en use IP spoofing to overload networks and devices with packets that appear to be from legiPmate source IP addresses. • IP spoofing a/acks can also be used to bypass IP address-based authenPcaPon. COMP4631 28

  29. How to spoof source addresses? • In the case of having privileged access to network handling codes, it can be done via raw socket interface – Allows direct sending and receiving of informaPon by applicaPons – Not needed for normal network operaPon • In absence of privilege, install a custom device driver on the source system • How to spoof your IP address using NMAP in Windows h/p://gregsumner.blogspot.hk/2013/02/how-to-spoof-your-ip-address-using-nmap.html – h/p://seclists.org/nmap-hackers/2004/0008.html – COMP4631 29

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend