introduction to computer security
play

Introduction to Computer Security Session 2.2 Denial of Service - PowerPoint PPT Presentation

CSCI-UA.9480 Introduction to Computer Security Session 2.2 Denial of Service Prof. Nadim Kobeissi 2.2a Defining Denial of Service 2 CSCI-UA.9480: Introduction to Computer Security Nadim Kobeissi What is a Denial of Service attack? An


  1. CSCI-UA.9480 Introduction to Computer Security Session 2.2 Denial of Service Prof. Nadim Kobeissi

  2. 2.2a Defining Denial of Service 2 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  3. What is a Denial of Service attack? An attack “where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.” 3 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  4. What is a Denial of Service attack? Some resource is being starved by an adversary: Network overload? ⚫ CPU overload? ⚫ Memory overload? ⚫ 4 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  5. What is a Denial of Service attack? Some resource is being starved by an adversary: Network overload: send too many packets. ⚫ CPU/memory overload: force the server to ⚫ carry out too many password stretching instances. Application overload: send too many ⚫ database/API requests. 5 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  6. Examples of Denial of Service vectors. UDP flood : unlike TCP, UDP has no flow control built in. Fork bombs : :(){ :|: & };: ⚫ SYN flood: Initiate several TCP connections but ⚫ never complete (ACK) them. LAND attack: Craft a TCP packet where the ⚫ source and destination IP addresses are both equal to the victim’s IP. Malformed packets: exploit parsing errors. ⚫ 6 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  7. Test your knowledge! Can you figure out why the following Bash command would be a “fork bomb”? :(){ :|: & };: 7 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  8. Test your knowledge! Can you figure out why the following Bash command would be a “fork bomb”? :(){ :|: & };: Define a function called “:” Run “:”, pipe output to “:” executed in Run “;” for the first time. the background. 8 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  9. DDoS: Distributed Denial of Service. Example: Mirai botnet (600,000+ victims): Caused serious damage to many leading ⚫ hosting providers (e.g. OVH, Dyn...) Among the highest ever recorded throughput ⚫ for DoS attacks. 9 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  10. DDoS: Distributed Denial of Service. Example: Mirai botnet (600,000+ victims): Caused serious damage to many leading ⚫ hosting providers (e.g. OVH, Dyn...) Among the highest ever recorded throughput ⚫ for DoS attacks. 10 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  11. DDoS: Distributed Denial of Service. Example: Mirai botnet (600,000+ victims): Caused serious damage to many leading ⚫ hosting providers (e.g. OVH, Dyn...) Among the highest ever recorded throughput ⚫ for DoS attacks. 11 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  12. DDoS: Distributed Denial of Service. Example: Mirai botnet (600,000+ victims): Caused serious damage to many leading ⚫ hosting providers (e.g. OVH, Dyn...) Among the highest ever recorded throughput ⚫ for DoS attacks. 12 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  13. DDoS: Mirai botnet device composition. 13 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  14. DDoS: Mirai botnet device composition. 14 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  15. DDoS: Mirai botnet victims. 15 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  16. Examples of other botnets. Srizbi botnet : responsible for most of the ⚫ spam in the world at some point. Carna botnet : used for estimating the size of ⚫ the Internet. 16 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  17. Another example: “Project Chanology” Instead of a slide, at this point in the class we will watch this short documentary on Project Chanology: https://www.youtube.com/watch?v=vRb6L7SCSro 17 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  18. 2.2b Mitigating Denial of Service Attacks 18 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  19. Basic defenses against Denial of Service. Firewalls, switches, and routers at ingress points of a network that use packet filtering. Build models of normal and abnormal behavior ⚫ and flag abnormal behavior. Intrusion detection systems that look for attack ⚫ signatures or abnormally high rates of traffic or both. CAPTCHAs to ensure that a human and not a ⚫ bot is carrying out the request. 19 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  20. Basic defenses against Denial of Service. CAPTCHAs to ensure that a human and not a bot is carrying out the request. Proof of work: request hashes, etc. ⚫ 20 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  21. Content Delivery Networks: CloudFlare. 21 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  22. Content Delivery Networks (CDNs). Akamai, CloudFlare, Amazon CloudFront, Microsoft Azure… Concerns regarding centralizing of Internet ⚫ traffic (i.e. man-in-the-middle capabilities). Questions w.r.t. freedom of expression ⚫ online: 22 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

  23. Next time: 2.3 Designing Secure Network Systems 23 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend