Denial of Service - SCF Faculty Site Homepage

advertisement
10.1 Understand a Denial of Service attack, and analyze symptoms of a DoS Attack
Exam Focus: Understand a Denial of Service attack, and analyze symptoms of a DoS attack.
Objective includes:





Understand a Denial of Service attack.
Assess DoS attack techniques.
Gain insights on Distributed Denial of Service attacks.
Examine the working of Distributed Denial of Service attacks.
Analyze symptoms of a DoS attack.
Denial of Service (DoS) attack
A Denial of Service (DoS) attack is mounted for causing a negative impact on the performance
of a computer or network. It is also referred to as network saturation attack or bandwidth
consumption attack. Attackers send a large number of protocol packets to a network for making
Denial of Service attacks. A DoS attack can cause the following:



Saturate network resources.
Disrupt connections between two computers, thereby preventing communications
between services.
Disrupt services to a specific computer.
Common DoS attacks
Some of the common DoS attacks are as follows:



SYN attack: A SYN attack is a common Denial of Service (DoS) technique. Using this
technique, an attacker sends multiple SYN packets to the target computer. For each SYN
packet received, the target computer allocates resources and sends an acknowledgement
(SYN-ACK) to the source IP address. Since the target computer does not receive a
response from the attacking computer, it attempts to resend the SYN-ACK. This leaves
TCP ports in a half-open state. When an attacker sends TCP SYNs repeatedly, the target
computer eventually runs out of resources and is unable to handle any more connections,
thereby denying services to legitimate users. A SYN attack affects computers running on
the TCP/IP protocol. It is a protocol-level attack that can render a computer's network
services unavailable. A SYN attack is also known as SYN flooding.
PING attack: A PING attack is a Denial of Service technique. In this technique, a
computer repeatedly sends illegitimate, oversized ICMP echo requests to another
computer. PING attacks are targeted to specific TCP stacks that cannot handle ICMP
packets. These attacks overload the targeted servers with fake packets.
Flood attack: In flood attack, an attacker sends more and more traffic to the victim than
it could handle. It is the simplest denial attack but most difficult to completely prevent.





Teardrop attack: In teardrop attack, corrupt packets are sent to the victim's computer by
using IP's packet fragmentation algorithm. As a result of this attack, the victim's
computer might hang.
Smurf attack: In a smurf attack, an attacker sends a large number of ICMP echo requests
at IP broadcast addresses using a fake source address. These requests appear to be
coming from the victim's network address. Therefore, every computer within the
broadcast domain starts sending responses to the victim. As a result, the victim's
computer is flooded with responses.
Replay attack: A replay attack is a type of attack in which attackers capture packets
containing passwords or digital signatures whenever packets pass between two hosts on a
network. These attackers then filter the data and extract the passwords, encryption keys,
or digital signatures from the captured packets. In an attempt to obtain an authenticated
connection, the attackers then resend this information to the system.
Magic Packets attack: A Magic Packets attack is a class of DoS. In this attack, the
attacker causes a DoS attack by exploiting an existing vulnerability in the OS running in
the target computer or applications of the target computer by sending some specially
designed data packets to particular ports, for instance, Ping of Death and WinNuke.
Resource exhaustion attack: A resource exhaustion attack is a type of denial of service
(DoS) which is implemented by intentional utilization of the maximum resources and
then stilling information. It is a flood of fake RPCs; such floods would waste resources of
the nodes, specially, disk seeks on affirmative GETs, entries in the RAM index for PUTs,
and CPU cycles to process RPCs.
DoS attack techniques
The following are DoS attack techniques:



Bandwidth attack: It is not possible for a single machine to make enough requests to
overwhelm network equipment. Therefore, DDoS attacks are performed where several
computers are used by an attacker to flood a victim. Due to the significant statistical
change in the network traffic, flooding a network with requests can cause network
equipment such as switches and routers to be overwhelmed when a DDoS attack is
launched. Basically, all bandwidth is used and no bandwidth remains for legitimate use.
Attackers use a botnet and flood the network with ICMP ECHO packets to perform
DDoS attacks.
Service request flood: An attacker or a group of zombies tries to exhaust server
resources by establishing and tearing down TCP connections. In a service request flood
attack, servers are flooded with a high rate of connections from a valid source. On every
connection, a request is initiated.
SYN attack: In this attack, the attacker sends multiple SYN packets to the target
computer. For each received SYN packet, the target computer allocates resources and
sends an acknowledgement (SYN-ACK) to the source IP address. Since the target
computer does not receive a response from the attacking computer, it attempts to resend
the SYN-ACK. This leaves TCP ports in a half-open state. When the attacker sends TCP
SYNs repeatedly, the target computer eventually runs out of resources and is unable to
handle any more connections, thereby denying services to legitimate users. A SYN attack


affects computers running on the TCP/IP protocol. It is a protocol-level attack that can
render a computer's network services unavailable. A SYN attack is also known as SYN
flooding.
ICMP flood attack: An ICMP flood attack occurs when ICMP echo requests overload a
victim device with a large number of requests such that the victim's device expends all its
resources responding to these requests until the victim can no longer process valid
network traffic.
Peer-to-peer attack: Attackers use peer-to-peer attacks to instruct clients of peer-to-peer
file sharing hubs for the following purposes:
o To disconnect from their network
o To connect to the victim's fake website
Attackers exploit flaws appeared in the network that uses the DC++ (Direct Connect)
protocol. The DC++ (Direct Connect) protocol permits the exchange of files between
instant message clients. Attackers use peer-to-peer attacks to launch massive Denial of
Service attacks and compromise websites.

Permanent Denial of Service attack: Permanent DoS is also known as phlashing. It is
an attack that causes irreversible damage to system hardware. This attack is performed
using a method referred to as bricking a system. Attackers send fraudulent hardware
updates to the victims by using the "bricking a system" method.

Application-level flood attack: The application-level flood attack leads to the loss of
service of a specific network, such as emails, network resources, and the temporary
ceasing of applications and services. Attackers use the application-level flood attack to
destroy programming source code and files in affected computer systems. Attackers try to
do the following by using application-level flood attacks:
o Flood web applications in order to legitimate user traffic.
o
o
Disrupt service to a specific system or person. For example, repeat invalid login
attempts to block a user's access.
Craft malicious SQL queries to jam the application-database connection.
Symptoms of a DoS attack
The following are the symptoms of a DOS attack:




A particular website is unavailable.
A user cannot access any website.
There is a dramatic increase in the amount of spam emails received.
There is unusual slow network performance.
DDoS attack
In a Distributed Denial of Service (DDoS) attack, the attacker uses multiple computers
throughout the network that it has previously infected. Such computers act as zombies and work
together to send out bogus messages, thereby increasing the amount of phony traffic. The major
advantages to an attacker of using a Distributed Denial of Service attack are that multiple
machines can generate more attack traffic than one machine, multiple attack machines are harder
to turn off than one attack machine, and that the behavior of each attack machine can be
stealthier, making it harder to track down and shut down. TFN, TRIN00, etc. are tools used for
the DDoS attack. An attacker uses botnets and attacks a single system to launch a DDoS attack.
Working of a Distributed Denial of Service (DDOS) attack
An attacker sets a handler system. A large number of computers over Internet are infected by
handlers. Compromised PCs (zombies) are instructed to attack a target server.
Organized cybercrime: organizational chart
The following is the organized cybercrime: organizational chart:
Mail bombing attack
Mail bombing is an attack that is used to overwhelm mail servers and clients by sending a large
number of unwanted e-mails. The aim of this type of attack is to completely fill the recipient's
hard disk with immense, useless files, causing at best irritation, and at worst total computer
failure. E-mail filtering and properly configuring email relay functionality on mail servers can be
helpful for the protection against this type of attack.
UDP flood attack
The UDP flood attack takes place when an attacker sends IP packets containing UDP datagram
with the purpose of slowing down the victim so that the victim can no longer handle valid
connections.
10.2 Understand Internet Chat Query (ICQ), Internet Relay Chat (IRC), and botnets
Exam Focus: Understand Internet Chat Query (ICQ), Internet Relay Chat (IRC), and botnets.
Objective includes:



Understand Internet Chat Query (ICQ).
Understand Internet Relay Chat (IRC).
Understand botnets.
Internet Chat Query
Internet Chat Query (ICQ) is a chat client used for chatting with people. It assigns a Universal
Identifier Number (UIN). The Universal Identifier Number recognizes the user univocally among
other ICQ users. An ICQ user wakes up and attempts to connect to the Mirabilis, where there is a
database including all ICQ users' information when the ICQ user connects to the Internet. The
Mirabilis Company developed ICQ. At the Mirabilis server, ICQ looks for the requested UIN
number inside its database and updates its information. Now, as ICQ knows the IP address, the
user can contact his friend.
Internet Relay Chat
Internet Relay Chat (IRC) is a system used for chatting involving a set of rules and conventions
and client/server software. For easy file sharing between clients, IRC permits direct computer-tocomputer connections. A few websites such as Talk City or IRC networks such as Undernet
provide servers and help users in downloading IRC clients to a PC. A user can start a chat group,
known as a channel, or join an existing one after the user has downloaded the client application.
#hottub and #riskybus are popular ongoing IRC channels. Transmission Control Protocol is used
by the IRC protocol.
Bots
Bots are software applications. They run automated tasks over the Internet and carry out simple
repetitive tasks, such as web spidering and search engine indexing. A botnet is a huge network of
the compromised systems. An attacker can use the botnet to create Denial of Service attacks.
Botnet propagation technique
Botnet ecosystem
Working of bots
The following is the working of bots:





An attacker sets a bot C&C handler.
The attacker infects the machine.
Bots look for vulnerable systems and infect them to create a botnet.
Bots connect to C&C handler and wait for instructions.
An attacker sends command to the bot through C&C.

Bots attack a target server.
PlugBot
PlugBot is a hardware botnet project. It is a covert penetration device (bot). It is designed for
covert use during physical penetration tests.
Defending against botnets
The following techniques are used to defend against botnets:




RFC 3704 filtering: Packets should be originated from a valid, assigned address space,
consistent with the topology and space allocation. Before entering the Internet link, any
traffic that comes from unused or reserved IP addresses should be filtered as it is bogus.
Black hole filtering: In the network where traffic is forwarded and dropped, black holes
are placed. The RTBH filtering technique uses routing protocol updates in order to
manipulate route tables at the network edge. Before the undesired traffic enters the
service provider network, the RTBH filtering technique can be used to drop the
undesirable traffic.
Cisco IPS source IP reputation filtering: Cisco IPS receives threat updates from the
Cisco SensorBase Network, including serial attackers, botnet harvesters, malware
outbreaks, and dark nets. The Cisco SensorBase Network includes detailed information
regarding known threats on the Internet.
DDoS prevention offerings from ISP or DDoS service: A host can be prevented from
sending out spoofed packets as it becomes a bot itself by turning on the IP Source Guard
on the network switches.
10.3 Assess DoS/DDoS attack tools
Exam Focus: Assess DoS/DDoS attack tools. Objective includes:


Assess DoS/DDoS attack tools.
Describe detection techniques.
DoS attack tools
The following are some DoS attack tools:




Low Orbit Ion Canon (LOIC)
HTTP flood denial of service (DoS) testing tool
Sprut
PHP DoS
LOIC performs a Denial of Service (DoS) attack on a target site. It floods the server with TCP
packets or UDP packets for disrupting the service of a particular host. People have used LOIC to
join voluntary botnets. Trinoo, Tribe Flood Net, and TFN2K are DDoS attack tools.
Detection techniques
In detection techniques, the illegitimate traffic increase and flash events are identified and
discriminated from legitimate packet traffic. According to all detection techniques, an attack is
an abnormal and noticeable deviation from a threshold of normal network traffic statistics. The
following are detection techniques:



Active profiling: An attack is indicated by an increase in activity levels among clusters
and an increase in the overall number of distinct clusters. Active profiling is defined as
the average packet rate for a network flow, which comprises consecutive packets with
similar packet fields. Monitoring of the network packet's header information is required
to obtain an active profile.
Change-point detection: A traffic statistic's change that is caused by attacks is isolated
by change-point detection algorithms. In change-point detection algorithm, the traffic
data is initially filtered by address, port, or protocol and then the resultant flow is stored
as a time series. The custom algorithm identifies deviations in the actual versus
exceptional local average in the traffic time series to identify and localize a DoS attack.
Change-point detection is also required to identify the typical scanning activities of the
network worms.
Wavelet analysis: Wavelet analysis specifies an input signal in terms of spectral
components. Wavelets provide for concurrent time and frequency description. They find
the time at which certain frequency components are available. The presence of anomalies
is determined by analyzing each spectral window's energy.
10.4 Identify DoS/DDoS countermeasure, post-attack forensics, and Penetration Testing
Exam Focus: Understand DoS/DDoS countermeasure, post-attack forensics, and penetration
Testing. Objective includes:




Identify DoS/DDoS countermeasure strategies.
Analyze post-attack forensics.
Identify DoS/DDoS protection tools.
Understand DoS/DDoS penetration testing.
DoS/DDoS countermeasures
The following are DoS/DDoS countermeasures:







The firewall should be configured to deny external Internet Control Message Protocol
(ICMP) traffic access.
The use of unnecessary functions such as gets, strcpy, etc. should be prevented.
The remote administration and connectivity testing should be secured.
The return addresses should be prevented from being overwritten.
Data processed by the attacker should be stopped from being executed.
Thorough input validation should be performed.
A better network gateway card should be used to handle a large number of packets. The
network card is the gateway to the packets.







For each piece of broadband technology, efficient encryption mechanisms should be
proposed.
Particularly for the multi-hop WMN, improved routing protocols are desirable.
Unused and insecure services should be disabled.
All inbound packets that originate from the service ports should be blocked to block the
traffic from the reflection servers.
Kernel should be updated to the latest version.
The transmission of the fraudulently addressed packets at the ISP level should be
prevented.
Cognitive radios should be implemented in the physical layer so that the jamming and
scrambling kind of attacks can be handled.
Mitigate attacks
The following are mitigate attacks:


Load balancing: In the event of an attack, providers can increase the bandwidth on
critical connections in order to prevent them from going down. Additional failsafe
protection can be provided by replicating servers. Normal performances can be improved
and the effect of a DDoS attack can be mitigated by balancing the load to each server in a
multiple-server architecture.
Throttling: This method allows a user to set up routers that access a server to adjust
(throttle) incoming traffic to the level that is safe for the server to process. Flood damage
to servers can be prevented using throttling. Throttling can also be used to throttle DDoS
attacking traffic versus legitimate user traffic for better results.
Honeypots
Honeypots are systems established with limited security. They work as an enticement for an
attacker. They serve as a means to gain information about attackers. They facilitate storing a
record of activities of attackers and identifying types of attacks and software tools used by
attackers. The defense-in-depth approach should be used with IPSec at different network points
in order to divert suspicious DoS traffic to several honeypots.
Detecting potential attacks
The following techniques can be used to detect potential attacks:



Ingress filtering: It is used to protect from flooding attacks that originate from the valid
prefixes (IP addresses). It enables the tracing of originator to its true source.
Egress filtering: It scans the packet headers of IP packets that leave a network. It ensures
that unauthorized or malicious traffic never leaves the internal network.
TCP intercept: It should be configured to prevent DoS attacks by intercepting and
validating the TCP connection requests.
Detecting and neutralizing handlers
The following can be used to detect and neutralize handlers:



Network traffic analysis: To identify the network nodes that might be infected with a
handler, network traffic analysis involves study of communication protocols and traffic
patterns between handlers and clients or handlers and agents.
Neutralize botnet handlers: Usually few DDoS handlers are deployed in comparison to
the number of agents. Multiple agents can possibly be rendered useless by neutralizing
few handlers. This prevents the occurrence of DDoS attacks.
Spoofed source address: A good probability exists that the spoofed source address of
DDoS attack packets will not show a valid source address of the specific sub-networks.
Protecting secondary victims
The following actions should be taken to protect secondary victims:




Anti-virus and anti-Trojan software should be installed and kept updated.
Awareness of security issues and prevention techniques of all Internet users should be
increased.
Unnecessary services should be disabled, unused applications should be uninstalled, and
all the files received from external sources should be scanned.
Built-in defensive mechanisms in the core hardware and software of the systems should
be configured and regularly updated.
DoS/DDoS countermeasure strategies
The following are DoS/DDoS countermeasure strategies:



Absorb the attack: Additional capacity can be used to absorb the attack. It needs
preplanning and additional resources.
Degrade services: Critical services should be identified and non-critical services should
be stopped.
Shut down the services: All the services should be shut-down until the attack has
subsided.
Techniques to prevent DDoS attacks
The techniques to prevent DDoS attacks are as follows:







Applying router filtering
Blocking undesired IP addresses
Permitting network access only to desired traffic
Disabling unneeded network services
Updating antivirus software regularly
Establishing and maintaining appropriate password policies, especially for access to
highly privileged accounts such as UNIX root or Microsoft Windows NT Administrator
Limiting the amount of network bandwidth


Using network-ingress filtering
Using automated network-tracing tools
Post-attack forensics
To identify the source of the DoS traffic, router, firewall, and IDS logs should be identified. The
network administrators can use DDoS attack traffic patterns to develop new filtering techniques.
The new filtering techniques are useful in preventing DDoS attack traffic from entering or
leaving their networks.
Traffic pattern analysis: Data can be analyzed - post-attack-to look for particular characteristics
within the attacking traffic. Data can be used to update load-balancing and throttling
countermeasures by using these characteristics.
DoS/DDoS protection tools
The following are the various DoS/DDoS protection tools:




Find_ddos: It is used to scan a local system that contains a DDoS program. It can detect
several known DoS attack tools.
SARA: It is used to gather information about remote hosts and networks by examining
the network services.
RID: It is a scanning tool that is used to detect the presence of Trinoo, TFN, or
Stacheldraht clients.
Zombie Zapper: It is used to instruct zombie routines to go to sleep; thus stopping their
attacks.
The following are some more DoS/DDoS protection tools:









NetFlow Analyzer
D-Guard Anti-DDoS Firewall
NetScaler
SDL Regex Fuzzer
FortGuard
WANGuard
IntruGuard
Arbor Peakflow
Advanced Denial of Service Protection
IntelliGuard DPS
IntelliGuard DPS is used to mitigate DDoS attacks using a design that involves passing the
legitimate traffic rather than discarding attack traffic. The Learn-Rank-Protect strategy identifies
sites that are accessed by customers and its access is continuously prioritized and ranked. The
multi-level management of IntelliGuard DPS configures traffic limits and guarantees the
management of traffic at each part of the network.
Anti-DoS ACLs
Anti-DoS ACLs work by recognizing the protocol and port selection of the DoS attacks.
Precautions must be taken while using such type of ACLs, as they might block legitimate
applications that may have chosen the same high port values. In order to prevent internal hosts
(hosts inside the network) from participating in a DoS on an Internet host, these ACLs should be
placed on all interfaces and in both directions. At the minimum, these ACLs should be placed on
all the inbound interfaces that are connected to the Internet. To block the TRINOO DDoS, port
27665, 31335, and 27444 should be designed. To block the SubSeven DDoS, port 6776, 6669,
2222, and 7000 should be designed.
DoS/DDoS protection at ISP level
All requests are blocked by most ISPs during a DDoS attack to deny legitimate traffic from
accessing the service. ISPs provide in-the-cloud DDoS protection for Internet links to prevent
them from being saturated by the attack. During the attack, attack traffic is redirected to the ISP
so that it can be filtered and sent back. Administrators can request ISPs for the following
purposes:


Block the original affected IP
Move their site to another IP after performing DNS propagation
DoS attack penetration testing
In order to find out if the network server is susceptible to a DoS attack, the DoS attack should be
implemented into pen testing. A large amount of traffic sent to a vulnerable network cannot be
handled. It leads to subsequent crash or slowdown of the network and thus prevents authentic
users from accessing the network. A minimum threshold for a DoS attack on a system is
determined by DoS pen testing. The tester cannot ensure that the system is resident to DoS
attacks. DoS pen testing is required to flood a target network with traffic to keep the server busy
and unavailable.
The following actions should be taken during DoS attack pen testing:






Test the web server using automated tools such as Web Application Stress (WAS) and
Jmeter for load capacity, server-side performance, locks, and other scalability issues.
Discover any systems that are vulnerable to DoS attacks by scanning the network using
automated tools such as NMAP, GFI LANGuard, and Nesssus.
Use tools such as Trin00, Tribe Flood, and TFN2K to flood the target with connection
request packets.
Flood the port by using a port flooding attack and maintain all the connection requests on
the ports under blockade to increase the CPU usage. Automate the port flooding attack by
using Mutilate and Pepsi5 tools.
Send a large number of emails to a target mail server by using Mail Bomber, Attache
Bomber, and Advanced Mail Bomber tools.
Fill the forms with arbitrary and lengthy entries.
Chapter Summary
In this chapter, we learned about Denial of Service attacks, Distributed Denial of Service attacks,
working of Distributed Denial of Service attacks, and symptoms of a DoS attack. This chapter
focused on DoS/DDoS attack tools, detection techniques, DoS/DDoS countermeasure strategies,
post-attack forensics, DoS/DDoS protection tools, and DoS/DDoS penetration testing.
Glossary
Anti-DoS ACL
Anti-DoS ACLs work by recognizing the protocol and port selection of the DoS attacks.
Precautions must be taken while using such type of ACLs, as they might block legitimate
applications that may have chosen the same high port values.
Botnet
A botnet is a huge network of the compromised systems.
Bots
Bots are software applications. They run automated tasks over the Internet and perform simple
repetitive tasks, such as web spidering and search engine indexing.
DDOS
In a Distributed Denial of Service (DDOS) attack, the attacker uses multiple computers
throughout the network that it has previously infected.
Denial of Service (DoS) attack
A Denial of Service (DoS) attack is mounted with the objective of causing a negative impact on
the performance of a computer or network.
IntelliGuard DPS
IntelliGuard DPS is used to mitigate DDoS attacks using a design that involves passing the
legitimate traffic rather than discarding attack traffic.
Internet Chat Query
Internet Chat Query (ICQ) is a chat client used for chatting with people.
Internet Relay Chat
Internet Relay Chat (IRC) is a system used for chatting involving a set of rules and conventions
and client/server software.
Download