defending against denial of service attacks

31
Defending Against Denial of Service Attacks Presented By: Jordan Deveroux 1

Upload: india-kelly

Post on 03-Jan-2016

63 views

Category:

Documents


2 download

DESCRIPTION

Defending Against Denial of Service Attacks. Presented By: Jordan Deveroux. Outline. What are Denial of Service Attacks and what makes the internet vulnerable to them? How do these attacks occur? How do we defend against such attacks? - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Defending Against Denial of Service Attacks

1

Defending Against Denial of Service Attacks

Presented By: Jordan Deveroux

Page 2: Defending Against Denial of Service Attacks

2

I. What are Denial of Service Attacks and what makes the internet vulnerable to them?

II. How do these attacks occur?III.How do we defend against such

attacks?IV.What are the ethical implications of

Denial of Service Attacks and their effect on our society ?

Outline

Page 3: Defending Against Denial of Service Attacks

3

Denial of Service (Dos)- An attack that is trying to deny access by legitimate users to shared resources or services

Distributed Denial of Service (DDoS)- A denial of service attack where the traffic comes from multiple sources

Denial of Service Attacks

Page 4: Defending Against Denial of Service Attacks

Attacker

Victim

Zombies

Page 5: Defending Against Denial of Service Attacks

5

Zombies

• Malicious Payload is Installed• Communication

takes place on IRC channels• Software

contains a flooding mechanism• Software can be

updated by attacker

Page 6: Defending Against Denial of Service Attacks

6

IP Spoofing- creating an IP packet with false information, often a false address.

Multipath routing makes packet tracing difficult

No centralized Internet authority

Internet Vulnerabilities

Page 7: Defending Against Denial of Service Attacks

7

I. What are Denial of Service Attacks and what makes the internet vulnerable to them?

II. How do these attacks occur?III.How do we defend against such

attacks?IV.What are the ethical implications of

Denial of Service Attacks and their effect on our society ?

Outline

Page 8: Defending Against Denial of Service Attacks

8

1. Consumes a host’s resources CPU Memory

2. Consumes network bandwidth Legitimate traffic is unable to go

through

Attack Power- level of resources consumed at the victim by the attack

What does DoS Attack?

Page 9: Defending Against Denial of Service Attacks

9

Protocol-BasedApplication-BasedDistributed Reflector Infrastructure Attacks

Categories of Bandwidth Attacks

Page 10: Defending Against Denial of Service Attacks

Protocol-Based: SYN Flood

Page 11: Defending Against Denial of Service Attacks

11

Protocol-Based: ICMP Flood

INTERNET

ATTACKER VICTIM

INTERMEDIARYNETWORK

Page 12: Defending Against Denial of Service Attacks

12

Application-Based: HTTP Flood

Attacking web servers with many http requests

Used in DDoS because it requires a genuine IP

Multiple ways to flood using this method

Page 13: Defending Against Denial of Service Attacks

Application Based:SIP FLOOD

VOIP Attack Flood proxy

servers with many invite packets

Affects not only proxy servers but legitimate callers

Page 14: Defending Against Denial of Service Attacks

Distributed Reflector Attacks

Page 15: Defending Against Denial of Service Attacks

15

Disable Critical components of the Internet

Significant Attack power is required to successfully execute an infrastructure attack

These types of attacks are why we need a globally-cooperative defense effort

Infrastructure Attacks

Page 16: Defending Against Denial of Service Attacks

16

I. What are Denial of Service Attacks and what makes the internet vulnerable to them?

II. How do these attacks occur?III.How do we defend against such

attacks?IV.What are the ethical implications of

Denial of Service Attacks and their effect on our society ?

Outline

Page 17: Defending Against Denial of Service Attacks

17

Attack PreventionAttack DetectionAttack Source Identification

Attack Reaction

Four Categories of Defense

Page 18: Defending Against Denial of Service Attacks

18

Attack Prevention: Ingress/Egress Filtering

Page 19: Defending Against Denial of Service Attacks

19

Router Based Packet Filtering Possible if Tier 1 ISPs are involved

SAVE Protocol Needs to be universally deployed

These Techniques prevent IP spoofing and filter traffic before it reaches the target, but need wide adoption to be effective

Other Attack Prevention Techniques

Page 20: Defending Against Denial of Service Attacks

20

Easy to detect Differentiate between flash crowds

and DoS attack Rely on certain assumptions

Attack Detection Techniques: DoS-attack-specific Anomaly-based

Attack Detection Techniques

Page 21: Defending Against Denial of Service Attacks

21

Dos-Specific

MULTOPS SYN Detection Kolmogorov Test Spectral Analysis Time Series

Analysis

Anomaly-Based Need to build a normal

profile Block irregular traffic Difficult to determine

all normal traffic Lightweight Intrusion

Detection System (LISYS)

The only way to detect a DDoS effectively and early is to monitor features attackers can’t change or are really difficult to change, (e.g. : Percent of new IP’s)

Page 22: Defending Against Denial of Service Attacks

22

Tracking IP traffic is difficult to do

Active IP traceback technique Probabilistic traceback technique

Hash-Based IP traceback

Attack Source Identification

Page 23: Defending Against Denial of Service Attacks

23

Attack Reaction Techniques

Page 24: Defending Against Denial of Service Attacks

24

Bottleneck Resource Management Fix Software-Based Vulnerabilities History-Based IP Filtering

Intermediate Network Reaction Harder to track the greater the distance Controller-Agent Scheme

Source End Reaction D-WARD

Attack Reaction Techniques

Page 25: Defending Against Denial of Service Attacks

25

Most of these are DoS defense Limited progress made on DDoS Attacker resources often surpass

victim’s resources Defenses are limited due to lack of

central control of the internet We need to increase the reliability of

global network infrastructure Most effective is to block attack close

to source

Conclusion on Defense Techniques

Page 26: Defending Against Denial of Service Attacks

26

I. What are Denial of Service Attacks and what makes the internet vulnerable to them?

II. How do these attacks occur?III.How do we defend against such

attacks?IV.What are the ethical implications of

Denial of Service Attacks and their effect on our society ?

Outline

Page 27: Defending Against Denial of Service Attacks

27

Security knowledge of users is decreasing while attacks are becoming more and more sophisticated

In 1988, 6 attacks were reported In 2003, 137, 529 attacks were reported CSI/FBI survey shows on average 35% percent who

participate suffered DoS attacks Vulnerabilities have increased to 35x the number

reported in 1995 Only 4 out of 1127 customer-based system attacks

used spoofed addresses in 2004

Growth of DoS and DDoS attacks

Page 28: Defending Against Denial of Service Attacks

28

Implementing defense schemes are expensive

Lack of economic incentive Personal users Internet Service Providers

Don’t want to spend money to protect someone else’s network

What’s taking so long?

Page 29: Defending Against Denial of Service Attacks

“Code Red” Worm (2001) 300,000 zombie army to launch DoS against

White House website Distributed Reflector Attack (2002)

Brought down www.grc.com Internet DNS Root Servers (2002)

SYN Flood and ICMP Flood All 13 DNS root servers were attacked at the

same time Total Attack Volume: 900 Mb/s Most queries answered but some parts of

internet experienced congestion or were unreachable

Blaster Worm (2003) Exploited vulnerability in RPC SYN Flood against windowsupdate.com

Page 30: Defending Against Denial of Service Attacks

30

These attacks can have lasting effects, including monetary damages

Used as a political statement Wikileaks fiasco (2010)

Operation : Payback Mastercard, PostFinance, Paypal

Ethics

Page 31: Defending Against Denial of Service Attacks

31

Survery of Network Based Defense Mechanisms Countering the DoS and DDoS Problems (Peng, Leckie, Ramamohanarao)

www.cert.org

http://www.pcmag.com/article2/0,2817,2374023,00.asp

References