network attacks review denial of service dos
play

Network Attacks Review & Denial-of-Service (DoS) CS 161: - PowerPoint PPT Presentation

Network Attacks Review & Denial-of-Service (DoS) CS 161: Computer Security Prof. Vern Paxson TAs: Devdatta Akhawe, Mobin Javed & Matthias Vallentin http://inst.eecs.berkeley.edu/~cs161/ February 15, 2011 Goals For Today Review


  1. Network Attacks Review & Denial-of-Service (DoS) CS 161: Computer Security Prof. Vern Paxson TAs: Devdatta Akhawe, Mobin Javed & Matthias Vallentin http://inst.eecs.berkeley.edu/~cs161/ February 15, 2011

  2. Goals For Today • Review the different classes of network attacks and how they relate to network layering –Feedback requested: was this valuable? • Discuss Denial-of-Service (DoS): attacks on availability –Mostly network-based, but also OS

  3. Basic Types of Security Goals • Confidentiality: – No one can read our data / communication unless we want them to • Integrity – No one can manipulate our data / processing / communication unless we want them to • Availability – We can access our data / conduct our processing / use our communication capabilities when we want to

  4. Types of Security Goals, con’t • Attacks can subvert each type of goal – Confidentiality: eavesdropping / theft of information – Integrity: altering data, manipulating execution (e.g., code injection) – Availability: denial-of-service • Attackers can also combine different types of attacks towards an overarching goal – E.g. use eavesdropping ( confidentiality ) to construct a spoofing attack ( integrity ) that tells a server to drop an important connection ( availability )

  5. Network Attacks on Confidentiality 7 Application 4 Transport 3 (Inter)Network 2 Link Nature of physical signaling 1 Physical can allow eavesdropping by nearby attackers

  6. Network Attacks on Confidentiality 7 Application 4 Transport If they can eavesdrop, they see all of this 3 (Inter)Network 2 Link 1 Physical

  7. Network Attacks on Confidentiality 7 Application 4 Transport 3 (Inter)Network Some link layers (e.g., wired 2 Link Ethernet) also allow attackers to receive subnet traffic sent 1 Physical w/ broadcast (such as DHCP)

  8. Network Attacks on Confidentiality 7 Application 4 Transport For broadcasts an attacker receives, 3 (Inter)Network they see all of this 2 Link 1 Physical

  9. Network Attacks on Confidentiality 7 Application 4 Transport Access to network devices 3 (Inter)Network (IP router; Ethernet switch) enables eavesdropping 2 Link because attacker is in the 1 Physical forwarding path

  10. Network Attacks on Confidentiality 7 Application 4 Transport If an attacker is in the forwarding path, they see 3 (Inter)Network all of layers 3/4/7 … 2 Link … and perhaps layers 1 and 2 too, depending on their location 1 Physical

  11. Network Attacks on Confidentiality 7 Application 4 Transport Attackers can insert themselves 3 (Inter)Network into the forwarding path if they 2 Link can manipulate victims to send their traffic through systems 1 Physical controlled by the attacker (E.g., DHCP spoofing to alter “gateway”, or DNS cache poisoning to alter a server’s IP address)

  12. Network Attacks on Confidentiality 7 Application 4 Transport Again, once they are in the forwarding path, 3 (Inter)Network they see all of this 2 Link 1 Physical

  13. Network Attacks on Integrity 7 Application 4 Transport Access to ANY network 3 (Inter)Network allows attacker to spoof 2 Link packets. Spoof = send packets 1 Physical that claim to be from someone else.

  14. Network Attacks on Integrity 7 Application 4 Transport Once they can spoof, they can falsify any/all of this 3 (Inter)Network 2 Link 1 Physical

  15. Network Attacks on Integrity 7 Application 4 Transport (… or if the NIC lacks programmability, then these) 3 (Inter)Network 2 Link 1 Physical

  16. Network Attacks on Integrity 7 Application 4 Transport Similarly, attackers who 3 (Inter)Network can get themselves on the forwarding path … 2 Link can create or alter 1 Physical any/ all of this

  17. Network Attacks on Integrity 7 Application 4 Transport Similarly, attackers who 3 (Inter)Network can get themselves on the forwarding path … 2 Link can create or alter 1 Physical any/all of this Man-in-the-Middle (MITM)

  18. Combining Eavesdropping with Spoofing To fool a receiver into accepting 7 Application spoofed traffic, an attacker must 4 Transport supply correct Layer 2/3/4/7 values. 3 (Inter)Network 2 Link The easiest way to do so is to eavesdrop in order to discover the 1 Physical correct values to use.

  19. Example: DHCP Spoofing 7 Application 4 Transport 3 (Inter)Network Attacker exploits link layer’s broadcasting of 2 Link DHCP requests to know 1 Physical when a client has a particular pending request

  20. Example: DHCP Spoofing 7 Application 4 Transport 3 (Inter)Network 2 Link Attacker uses their direct 1 Physical access to network to spoof a corresponding DHCP response

  21. Example: DHCP Spoofing The fake DHCP response 7 Application includes bogus “gateway” 4 Transport and/or DNS server values 3 (Inter)Network 2 Link 1 Physical

  22. Blind Spoofing To fool a receiver into accepting 7 Application spoofed traffic, an attacker must 4 Transport supply correct Layer 2/3/4/7 values. 3 (Inter)Network 2 Link Another way to supply the correct values is to guess. Often requires 1 Physical additional information so “blind” guess has a prayer of being correct

  23. Blind Spoofing 7 Application 4 Transport Remote attackers that can deduce layer 3/4/7 values can 3 (Inter)Network make receivers unwittingly 2 Link accept unsolicited packets: blind spoofing 1 Physical

  24. Example: TCP Reset Injection 7 Application 4 Transport Attacker who can determine a connection’s IP addresses … 3 (Inter)Network … and TCP ports and 2 Link sequence numbers … … can forge a TCP packet 1 Physical with RST set that the receiver will be fooled into acting upon

  25. Example: TCP Reset Injection 7 Application 4 Transport Attacker who can determine a connection’s IP addresses … 3 (Inter)Network … and TCP ports and 2 Link sequence numbers … … can forge a TCP packet 1 Physical with RST set that the receiver will be fooled into acting upon

  26. Example: TCP Reset Injection 7 Application 4 Transport Attacker who can determine a connection’s IP addresses … 3 (Inter)Network … and TCP ports and 2 Link sequence numbers … … can forge a TCP packet 1 Physical with RST set that the receiver will be fooled into acting upon

  27. Violating Integrity Without Spoofing 7 Application Depending on how an application protocol works, an attacker can 4 Transport directly manipulate its functioning 3 (Inter)Network … 2 Link … without any need to spoof. 1 Physical

  28. Violating Integrity Without Spoofing 7 Application Our first example of DNS cache poisoning just involved 4 Transport an attacker manipulating 3 (Inter)Network layer-7 values. 2 Link No spoofing required. 1 Physical

  29. Violating Integrity With Blind Spoofing 7 Application The Kaminsky attack, OTOH, repeatedly guesses the DNS 4 Transport transaction ID (layer 7), and 3 (Inter)Network sends traffic seemingly from 2 Link the correct name server. Requires blind spoofing . 1 Physical

  30. Violating Integrity With Blind Spoofing If we randomize the source 7 Application port of our DNS requests, then attacker also has to 4 Transport guess a (16-bit) layer-4 value 3 (Inter)Network 2 Link 1 Physical

  31. 5 Minute Break Questions Before We Proceed?

  32. Attacks on Availability • Denial-of-Service (DoS, or “ doss ”): keeping someone from using a computing service • Two basic approaches available to an attacker: – Deny service based on a program flaw • E.g., supply an input that crashes a server • E.g., fool a system into shutting down – Deny service based on resource exhaustion • E.g., consume CPU, memory, disk, network • How broad is this sort of threat? – Very : huge attack surface • We do though need to consider our threat model … – What might motivate a DoS attack?

  33. Motivations for DoS • Showing off / entertainment / ego • Competitive advantage – Maybe commercial, maybe just to win • Vendetta / denial-of-money • Extortion • Political statements • Impair defenses • Espionage • Warfare

  34. DoS Defense in General Terms • Defending against program flaws requires: – Careful authentication • Don’t obey shut-down orders from imposters – Careful coding/testing/review – Consideration of behavior of defense mechanisms • E.g. buffer overflow detector that when triggered halts execution to prevent code injection ⇒ denial-of-service • Defending resources from exhaustion can be really hard. Requires: – Isolation mechanisms • Keep adversary’s consumption from affecting others – Reliable identification of different users • Know who the adversary is in the first place!

  35. DoS & Operating Systems • How could you DoS a multi-user Unix system on which you have a login? – # ¡rm ¡-­‑rf ¡/ • (if you have root - but then just “halt” works well!) – char ¡buf[1024]; int ¡f ¡= ¡open("/tmp/junk"); while ¡(1) ¡write(f, ¡buf, ¡sizeof(buf)); • Gobble up all the disk space! – while ¡(1) ¡fork(); • Create a zillion processes! – Create zillions of files, keep opening, reading, writing, deleting • Thrash the disk – … doubtless many more • Defenses? – Isolate users / impose quotas

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend