MS4 level being good citizen -imperative- (1) (1).pdf
D do s
1. Distributed Denial of Service Attacks Prepared For: Prof. Ruby Lee ELE 572 September 23, 2002 Princeton University Electrical Engineering Department
2.
3.
4.
5. Classification of DoS Attacks [1] September 23, 2002 Princeton University Electrical Engineering Department Specht Attack Affected Area Example Description Network Level Device Routers, IP Switches, Firewalls Ascend Kill II, “ Christmas Tree Packets” Attack attempts to exhaust hardware resources using multiple duplicate packets or a software bug. OS Level Equipment Vendor OS, End-User Equipment. Ping of Death, ICMP Echo Attacks, Teardrop Attack takes advantage of the way operating systems implement protocols. Application Level Attacks Finger Bomb Finger Bomb, Windows NT RealServer G2 6.0 Attack a service or machine by using an application attack to exhaust resources. Data Flood (Amplification, Oscillation, Simple Flooding) Host computer or network Smurf Attack (amplifier attack) UDP Echo (oscillation attack) Attack in which massive quantities of data are sent to a target with the intention of using up bandwidth/processing resources. Protocol Feature Attacks Servers, Client PC, DNS Servers SYN (connection depletion) Attack in which “bugs” in protocol are utilized to take down network resources. Methods of attack include: IP address spoofing, and corrupting DNS server cache.
6. Countermeasures for DoS Attacks [1] September 23, 2002 Princeton University Electrical Engineering Department Specht Attack Countermeasure Options Example Description Network Level Device Software patches, packet filtering Ingress and Egress Filtering Software upgrades can fix known bugs and packet filtering can prevent attacking traffic from entering a network. OS Level SYN Cookies, drop backlog connections, shorten timeout time SYN Cookies Shortening the backlog time and dropping backlog connections will free up resources. SYN cookies proactively prevent attacks. Application Level Attacks Intrusion Detection System GuardDog, other vendors. Software used to detect illicit activity. Data Flood (Amplification, Oscillation, Simple Flooding) Replication and Load Balancing Akami/Digital Island provide content distribution. Extend the volume of content under attack makes it more complicated and harder for attackers to identify services to attack and accomplish complete attacks. Protocol Feature Attacks Extend protocols to support security. ITEF standard for itrace, DNSSEC Trace source/destination packets by a means other than the IP address (blocks against IP address spoofing). DNSSEC would provide authorization and authentication on DNS information.
7.
8.
9. DDoS Architecture September 23, 2002 Princeton University Electrical Engineering Department Specht Client Client Handler Handler Handler Handler Agents
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21. GRC.com Network [7] September 23, 2002 Princeton University Electrical Engineering Department Verio Router T1 Trunk T1 Trunk Internet Internet GRC.COM Firewall Router 100Mbps 100Mbps Specht
22.
23.
24.
25.
26.
27.
28.
29. GRC.COM Attack Network Setup September 23, 2002 Princeton University Electrical Engineering Department Verio Router T1 Trunk T1 Trunk Internet GRC.COM IRC Servers Attacker 1. Attacker logs on to IRC server (IRC Server does not store IP address and provides anonymous access. 2. Zombie “bots” or DDoS tools that were previously inserted to PCs out in the network “wake up” and connect to IRC server waiting for instructions. Specht
30. GRC.COM Attack Network Attacking September 23, 2002 Princeton University Electrical Engineering Department Verio Router T1 Trunk T1 Trunk Internet GRC.COM IRC Servers Attacker 1. Attacker issues command to attack GRC.COM 2. Each DDoS daemon begins to attack the selected website. Specht
31.
32.
33.
34. Conceptual Model for Defending Against DDoS Attacks September 23, 2002 Princeton University Electrical Engineering Department Huang
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65. General Protections against DDoS September 23, 2002 Princeton University Electrical Engineering Department Bayazit
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78. What can be filtered? September 23, 2002 Princeton University Electrical Engineering Department Bayazit IP Comments Version Insignificant Header Length Insignificant TOS/DSCP Could Be Useful Length Insignificant Fragments If Not Using NFS, AFS, GRE TTL None (is it?) Protocol None Checksum None Source ???? Destination ????
79. What Can Be Filtered? September 23, 2002 Princeton University Electrical Engineering Department Bayazit ICMP Comments Request/Reply Filterable Problem Filterable TCP Comments Source Port Not Much, Depends SYN ACK Not Much, Depends RST Dangerous Sequence numbers DANGEROUS!
80. What Can Be Filtered? September 23, 2002 Princeton University Electrical Engineering Department Bayazit UDP Comments Connectionless No big deal Length Insignificant Checksum Insignificant