Network Attacks Review & Denial-of-Service (DoS)
CS 161: Computer Security
- Prof. Vern Paxson
Network Attacks Review & Denial-of-Service (DoS) CS 161: - - PowerPoint PPT Presentation
Network Attacks Review & Denial-of-Service (DoS) CS 161: Computer Security Prof. Vern Paxson TAs: Devdatta Akhawe, Mobin Javed & Matthias Vallentin http://inst.eecs.berkeley.edu/~cs161/ February 15, 2011 Goals For Today Review
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
… and perhaps layers 1 and 2 too, depending on their location
Application Transport (Inter)Network Link Physical
(E.g., DHCP spoofing to alter “gateway”, or DNS cache poisoning to alter a server’s IP address)
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
Application Transport (Inter)Network Link Physical
execution to prevent code injection ⇒ denial-of-service
– # ¡rm ¡-‑rf ¡/
– char ¡buf[1024]; int ¡f ¡= ¡open("/tmp/junk"); while ¡(1) ¡write(f, ¡buf, ¡sizeof(buf));
– while ¡(1) ¡fork();
– Create zillions of files, keep opening, reading, writing, deleting
– … doubtless many more
– Isolate users / impose quotas
maximize the packet arrival rate)
– Install a network filter to discard any packets that arrive with attacker’s IP address as their source
in benign traffic
– Filter = isolation mechanism – Attacker’s IP address = means of identifying misbehaving user
– Just pick a random 32-bit number of each packet sent
– They don’t! – Best they can hope for is that operators around the world implement anti-spoofing mechanisms (today about 75% do)
– Today they are very cheap to acquire … :-(
smurf attack