Denial of Service

advertisement
Denial of Service
By: Samarth Shah and Navin Soni
Contents
•
•
•
•
•
•
•
Introduction
Symptoms
Method of Attacks
Prevention and Response
Side-effects
Downfall
Conclusion
Introduction
• Denial-of-service (DoS) attack aims at disrupting
the authorized use of networks, systems, or
applications by sending messages which exhaust
service provider’s resources
• Distributed denial-of-service (DDoS) attacks
employ multiple compromised computers to perform a
coordinated and widely distributed DoS attack
• Victims
• service-providers
• legitimate service-seekers
WHO?? Their Motives
• Who
• Highly proficient attackers who are rarely identified or caught
• The motive
• Earlier attacks were proofs of concepts or simple pranks
• Pseudo-supremacy feeling upon denying services in large scale
to normal people
• DoS attacks on Internet chat channel moderators
• Political disagreements
• Competitive edge
Daemon
Master
Daemon
Daemon
Daemon
Daemon
Victim
Real Attacker
Symptoms
•
•
•
•
Unusually slow network performance.
Unavailability of a particular web site.
Inability to access any web site.
Dramatic increase in the number of spam emails
received.
• Also lead to problems in the network 'branches'
around the actual computer being attacked.
Methods of attack
• The five basic types of attack are:
– Consumption of computational resources.
– Disruption of configuration information.
– Disruption of state information.
– Disruption of physical network components.
– Obstructing the communication media
between the intended users and the victim so
that they can no longer communicate
adequately.
Classification of DoS Attacks
Attack
Affected Area
Example
Description
Network Level Device
Routers, IP Switches, Firewalls
Ascend Kill II,
“Christmas Tree Packets”
Attack attempts to exhaust
hardware resources using
multiple duplicate packets or a
software bug.
OS Level
Equipment Vendor OS, End-User
Equipment.
Ping of Death,
Teardrop
Attack takes advantage of the
way operating systems
implement protocols.
Application Level Attacks
Finger Bomb
Finger Bomb
Attack a service or machine by
using an application attack to
exhaust resources.
Data Flood (Amplification,
Oscillation, Simple Flooding)
Host computer or network
Smurf Attack (amplifier attack)
Attack in which massive
quantities of data are sent to a
target with the intention of using
up bandwidth/processing
resources.
Protocol Feature Attacks
Servers, Client PC, DNS Servers
SYN (connection depletion)
Attack in which “bugs” in
protocol are utilized to take
down network resources.
Methods of attack include: IP
address spoofing, and corrupting
DNS server cache.
Methods of Attack
•
•
•
•
Peer to Peer Attack
Permanent Denial of Service
Nuke
Degradation of Service attack
Countermeasures
Attack
Countermeasure
Options
Example
Description
Network Level Device
Software patches, packet
filtering
Ingress and Egress Filtering
Software upgrades can fix
known bugs and packet filtering
can prevent attacking traffic
from entering a network.
OS Level
SYN Cookies, drop backlog
connections, shorten timeout
time
SYN Cookies
Shortening the backlog time and
dropping backlog connections
will free up resources. SYN
cookies proactively prevent
attacks.
Application Level Attacks
Intrusion Detection System
GuardDog, other vendors
Software used to detect illicit
activity.
Data Flood (Amplification,
Oscillation, Simple Flooding)
Replication and Load Balancing
Akami/Digital Island provide
content distribution.
Extend the volume of content
under attack makes it more
complicated and harder for
attackers to identify services to
attack and accomplish complete
attacks.
Protocol Feature Attacks
Extend protocols to support
security.
ITEF standard for itrace, DNSSEC
Trace source/destination packets
by a means other than the IP
address (blocks against IP
address spoofing). DNSSEC
would provide authorization and
authentication on DNS
information.
Prevention and Response
•
•
•
•
•
•
•
•
Firewalls
Switches
Routers
Application front end hardware
IPS based prevention
Blackholing
Sinkholing
Clean Pipes
Side-Effects
• Backscatter is a side-effect of a spoofed denial of
service attack.
• The attacker spoofs the source address in IP
packets sent to the victim.
• Response packets are known as backscatter.
• The backscatter response packets from the victim
will be sent back to random destinations. This
effect can be used by network telescopes as
indirect evidence of such attacks.
Downfalls
• DoS attacks are unable to attack large bandwidth
websites.
• New distributed server architecture makes it
harder for one DoS to take down an entire site.
• New software protections neutralize existing DoS
attacks quickly.
• Service Providers know how to prevent these
attacks from effecting their networks.
• “Old” Internet Technology.
Conclusion
• Attack techniques continue to advance and the
number of software vulnerabilities continues to
increase.
• Service providers and vendors are quickly
adapting to the new landscape.
• Prevention is always the best measure.
• Regular scanning and auditing will prevent
configuration errors from exposing infrastructure
to known attacks.
• Preparation is the key for service providers to
mitigate attacks as they happen.
THANK YOU
Download