denial of service attacks types causes motives remedies
play

Denial of Service Attacks Types, Causes, Motives & Remedies By - PowerPoint PPT Presentation

Denial of Service Attacks Types, Causes, Motives & Remedies By M. Raza ur Rehman NUST PAKCON 2004 Denial of Service Attacks Attempts to prevent or disturb legitimate access to co mputer resources Resources like bandwidth, services


  1. Denial of Service Attacks Types, Causes, Motives & Remedies By M. Raza ur Rehman NUST PAKCON 2004

  2. Denial of Service Attacks • Attempts to prevent or disturb legitimate access to co mputer resources • Resources like bandwidth, services etc. • The most common way:Network Flooding • Alter the Configurations so that configurations have to be fetched again and again

  3. Distributed DoS Attacks S la v e M a s te r S la v e S la v e N e tw o rk R e a l a tta c k e r S la v e V ic tim

  4. Common DoS Attacks • Smurf Ping of Death Attack • SYN Flooding • UDP Flooding (Fraggle) Etc …

  5. Smurf (Ping of Death Attack) ICMP echo (spoofed source address of victim) Sent to IP broadcast address ICMP echo reply Internet Perpetrator Victim

  6. SYN Flooding Source Destination Attacker Victim SYN n Listen SYN n Listen SYN n+1 SYN m , ACK n+1 SYN_RECVDD SYN_RECVDD SYN m , ACK n+1 SYN m+1 Port flooding occurs CONNECTED Normal TCP Connection SYN Flooding Establishment

  7. UDP Flooding (Fraggle) • Similar to SMURF Attacks • UDP Echo Request expects UDP Reply messages

  8. Causes of DoS Attacks • Flaws in the core Internet Protocols. • Lack of Security Concerns amongst masses • Distributed nature of Attacks • Nature of Internet

  9. Motives Political Reasons • India Pakistan Cyber Warfare (YAHA Worm) 2002 http://www.vnunet.com/News/1133119 • Attacks on Brazil Government sites 2000 http://www.computeruser.com/newstoday/00/03/18/news1.html • DDoS Attacks on Aljazeera 2003 http://www.infoworld.com/article/03/03/26/HNjazeera_1.html • SCO Website down by DDoS http://www.infoworld.com/article/03/08/25/HNscoweb_1.html

  10. Motives Economic Reasons • British Telecom (2000) “This is my payback to BT for ripping this country off.” http://www.theregister.co.uk/content/1/12097.html CNN, Yahoo, E-Bay Down by Ddos Attacks (2000) • Cloud Nine ( A British ISP )doomed by Dos Attacks (2002) http://www.wired.com/news/business/0,1367,50171,00.html • Attack on Microsoft.com (2003) http://www.informationweek.com/story/showArticle.jhtml?articleID=12808118

  11. Motives Other Reasons • Attack on Gibson Research — Revenge by Script Kiddies (2002) • DoS Attacks on DALNet IRC Servers..

  12. Other Developments DDoS Vulnerabilities in IPv6 protocols • http://www.packetstormsecurity.org/

  13. Detection and Prevention Difficulties Associated • Harder to Detect • Easier to Commit and easier to perpetrate • Difficult to Isolate from Normal Traffic • Difficult to track the origins

  14. Prevention Techniques Some general measures Software patches • Secure host computer from hacking, trojan horse, virus, back door, • … Configure router to deny spoofed source address • Reduce time-out of half-open connections • Increase resources for half-open connections (backlog) • Close unused TCP/UDP port • Firewall •

  15. Prevention Techniques SYN Cache • Replaces the per-socket linear chain of incomplete queued connections with a global hash table. • Hash Table provides two forms of protection against choking up of server resou rces • Total no of entries in the hash table provides an upper bound on the memory Syn Cache can take • The latter limit bounds the amount of time that the machine needs to spend searching for a matching entry, as well as limiting replacement of the cache entries to a subset of the entire cache

  16. Prevention Techniques SYN Cookies Source Destination • Does not allocate Resources on SYN Re SYN n Listen quest • Send back its initial sequence no (m )as a function of client properties SYN m , ACK n+1 • Client has to send back SYN_RECVDD Sequence no as (m+1) SYN m+1 CONNECTED

  17. Conclusions • Present State of Affairs in the Control of DoS Attacks. • Network Bandwidth congestion still unavoidable problem

  18. Q & A

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend