FIST Conference October 2004

Denial Of Service Attacks © Gabriel Verdejo Alvarez ([email protected]) Barcelona

INDEX „ „

Speaker’s introduction. Denial Of Service attacks (DOS). ¾

„

Distributed Denial of Service attacks (DDOS). ¾ ¾ ¾ ¾

„ „

Examples. DDOS tools analysis. Reflection DDOS Attack. Countermeasures. What the future brings.

Questions. Bibliography.

October’ 2004 by [email protected]

„

Denial Of service attacks

2

Speaker’s Introduction Gabriel Verdejo Alvarez, Barcelona 1973. Computer science engineer at UAB. PhD studies (DEA) at CCD department, UAB. Senior consultant over 5 years experience. Cisco Certified teacher (CNAP). Since 2002 working at LSI department located at UPC.

October’ 2004 by [email protected]

„

Denial Of service attacks

3

Denial Of service attacks I „

Historical context: „ „ „ „

„

90’s decade became the Internet age (WWW). Massive deployment of part-time connections (modem). Bandwidth increase → Interaction, pictures… A new mass media has born!

Hackers context: „ „

Simple attacks techniques (console VT, dial-out War games…) Almost inexistent networks attacks (IRC Wars).

October’ 2004 by [email protected]

„

Denial Of service attacks

4

Denial Of service attacks II „

A brief chronology: „

„

„

„

„

Until 1996 naive attacks. No worldwide connection available. 1997 TRIN00 tool became the starting point of Denial Of Service attacks. 1988 TFN tool improve DOS attacks. 1998 Ebay, Yahoo, Microsoft were the favorite targets for this kind of attacks. 1999 TFN2K the new generation for denial attacks.

October’ 2004 by [email protected]

„

Denial Of service attacks

5

Denial Of service attacks III „

Definitions: „

„

Denial Of Service (DOS) means the impossibility of getting access to a resource or service by the legitimate user. Denial Of Service attack is when the resource or the service is monopolized intentionally to prevent access from other users. This definition also includes the attempts to collapse the service or resource to deny access to anyone.

October’ 2004 by [email protected]

„

Denial Of service attacks

6

Denial Of service attacks IV „

DOS attack example 1: IP Flooding „

Used in local networks → Consumes great amount of bandwidth.

„

The attacker creates spurious traffic over the network:

„

¾

Random

¾

Guided

Traffic can be UDP, ICMP or TCP.

October’ 2004 by [email protected]

„

Denial Of service attacks

7

Denial Of service attacks V

October’ 2004 by [email protected]

„

Denial Of service attacks

8

Denial Of service attacks VI „

DOS attack example 2: ECHO-CHARGEN / Snork „

UNIX computers provides several well known services (Telnet, FTP, ECHO…). ¾

¾

„

ECHO: Replies any PING request received over the network. CHARGEN: Replies any network request with a random character generator.

The attacker spoof the source address of the request crossing both services.

October’ 2004 by [email protected]

„

Denial Of service attacks

9

Denial Of service attacks VII

October’ 2004 by [email protected]

„

Denial Of service attacks

10

Denial Of service attacks VIII „

DOS attack example 3: Ping Of Death „

„

The most famous DOS attack. Uses programming bugs and RFC791/RFC792 definitions of maximum packet length of TCP/IP family: ¾

¾

IP datagram has a maximum size of 64K (65535 bytes) with a typical header length of 20 bytes. ICMP packet is encapsulated into IP datagram and has a 8 bytes header.

October’ 2004 by [email protected]

„

Denial Of service attacks

11

Denial Of service attacks IX „

Attacker “can” send 65510 bytes of data using ICMP protocol because: 65535 – 8 (header) = 65527 bytes

„

The destination computer receives the request and tries to reassemble data: But the truth is we have 65535 – 20 – 8 = 65507 bytes free!!

„

This attack causes overflow in networks services or operative system failure.

October’ 2004 by [email protected]

„

Denial Of service attacks

12

Distributed Denial Of service attacks I „

Definitions: „

Distributed Denial Of Service Attacks (DDOS) can be defined as a deny of service attack with several sources distributed along the Internet that focuses on the same target. ¾

Unlimited number of sources can be used.

¾

Worldwide distribution.

¾

Any computer attached on Internet can be disabled.

October’ 2004 by [email protected]

„

Denial Of service attacks

13

Distributed Denial Of service attacks II

October’ 2004 by [email protected]

„

Denial Of service attacks

14

Distributed Denial Of service attacks III „

DDOS tools analysis: TRINOO / TRIN00

„

„

First DDOS tool find “in the wild”. Originally detected in Solaris machines but could be used in any UNIX computer. The deployment mode follows always these guidelines: ¾

The hacker goes into the computer (bugs exploit…).

¾

Software is compiled leaving a backdoor at port 1524/TCP.

¾

Other machines in the same network are hacked.

October’ 2004 by [email protected]

„

Denial Of service attacks

15

Distributed Denial Of service attacks IV „

Implements a hierarchical model based on a master-slave schema to permit the DDOS attacks.

October’ 2004 by [email protected]

„

Denial Of service attacks

16

Distributed Denial Of service attacks V „

„

„

„

A single attacker can control hundreds (even thousands) of machines in a very simple way. The attacker cannot be identified directly (the attacker computers are the slaves!). This tool implements IP flooding attack. The daemon lets the user run several commands (Telnet style) to start/stop service and to control the beginning and the end of every attack.

October’ 2004 by [email protected]

„

Denial Of service attacks

17

Distributed Denial Of service attacks VI „

DDOS tools analysis: TFN2K „

„

„

The most sophisticated tool find in the wild. Improves communication between master/slaves computers using TCP, UDP or ICMP packets (even all!!) to avoid firewalls / IDS. Implements different styles of attacks (TCP/UDP/ICMP flood, Smurf) that can be automatically rotated to avoid basic countermeasures.

October’ 2004 by [email protected]

„

Denial Of service attacks

18

Distributed Denial Of service attacks VII „

„

„

Packet headers are randomly changed to prevent IDS signatures. Daemons do not reply to the orders they receive. Every command is resend 20 times. This method make difficult to discover compromised computers because no outside communication exists. Uses CAST-256 as cipher method to prevent the sniffer tools over the network.

October’ 2004 by [email protected]

„

Denial Of service attacks

19

Distributed Denial Of service attacks VIII „

Reflection DDOS attack: „

„

„

„

This new approach is based on the use of legitimate (not hacked!) computers attached to the Internet. The slaves machines are not quickly discovered/banned so the attack can be done more time. The attacking method can be switched automatically. The “attackers” computers can change without randomly make more difficult the detection of the attack.

October’ 2004 by [email protected]

„

Denial Of service attacks

20

Distributed Denial Of service attacks IX

October’ 2004 by [email protected]

„

Denial Of service attacks

21

Distributed Denial Of service attacks X „

GRC.com DDOS reflection attack: „

„

„

On January 11 of 2002 an attack to GRC was discovered. 2 x T1 connection were collapsed few hours by several ISP computers as Verio or Qwest and well known places as Yahoo. Few hours before it was detected a filter was applied and the count of packets discarded were 1.072.519.399!!!

October’ 2004 by [email protected]

„

Denial Of service attacks

22

Distributed Denial Of service attacks XI „

Countermeasures: „

Ingress/Egress filtering → Deny spoofing address attacks.

„

Firewalls → Poor solution, increases routing overhead.

„

IDS → Bad detection mechanism and limited response.

„

Other solutions (Multops, Reverse Firewall, D-Ward) canot interoperate with external systems.

October’ 2004 by [email protected]

„

Denial Of service attacks

23

Distributed Denial Of service attacks XII „

What the future brings: „

„

The DDOS problem is not solved and periodically we read a new succefull attack against any major company (Ebay, SCO…). The future of DDOS are changing with virus symbiosis. Now the hacker does not need to enter into the computer, the virus let the door open. ¾

„

MyDoom (2004) www.sco.com → www.thescogroup.com

DDOS attacks in wireless Networks.

October’ 2004 by [email protected]

„

Denial Of service attacks

24

Distributed Denial Of service attacks XIII „

Bibliography: „ „ „ „ „

William R. Cheswick and Steven M. Bellovin, “Firewalls and Internet Security: Repelling the Wily Hacker", Addison-Wesley Publishing, 1994. W. Richard Stevens, “TCP/IP Illustrated Volume 1: The protocols”, AddisonWessley, 1998. David Dittrich, “The TRIBE FLOOD NETWORK distributed denial of service attack tool”, 1999. David Hoelzer, “Intrussion Detection FAQ: Why Egress Filtering Can Benefit Your Organization”, 2000. T. M. Gil, M. Poletto, ”MULTOPS: a data-structure for bandwidth attack detection”, 10th Usenix Security Symposium, 2001.

http://tau.uab.es/~gaby [email protected] October’ 2004 by [email protected]

„

Denial Of service attacks

25

Denial Of Service Attacks

90's decade became the Internet age (WWW). ▫ Massive .... Unlimited number of sources can be used. ➢ Worldwide .... DDOS attacks in wireless Networks.

996KB Sizes 3 Downloads 266 Views

Recommend Documents

Distributed Denial of Service Attacks and istributed Denial of Service ...
Hence, ingress and egress filtering are ineffective to stop DDoS attacks. 2) Router based packet filtering. Route based filtering, proposed by Park and Lee [23], extends ingress filtering and uses the route information to filter out spoofed IP packet

Distributed Denial of Service Attacks and istributed Denial of Service ...
1,2Patiala, Punjab, India. 147002 ... number of hosts can generate a lot of traffic at and near the target machine, clogging all the routes to the victim. Protection against such large scale .... handler program installed on a network server, an IRC

Adaptive Response System for Distributed Denial-of-Service Attacks
itself. The dissertation also presents another DDoS mitigation sys- tem, Traffic Redirection Attack Protection System (TRAPS). [1], designed for the IPv6 networks.

010- Denial of Service + Botnet.pdf
Whoops! There was a problem loading more pages. 010- Denial of Service + Botnet.pdf. 010- Denial of Service + Botnet.pdf. Open. Extract. Open with. Sign In. Details. Comments. General Info. Type. Dimensions. Size. Duration. Location. Modified. Create

An Efficient Methodology to Study Distributed Denial of Service ... - IJRIT
In order to measure and collect the traffic intensities from the routers that are .... DDoS attacks often exhaust the network bandwidth, processing capacity and in- ...

An Efficient Methodology to Study Distributed Denial of Service ... - IJRIT
Denial of Service Attack in Internet Community. Pabbati Suresh1, P.D.Chidambara .... The DAG is composed of routers and local area networks (LANs). For the ...

Denial of payment of HRA.PDF
T::fii:Y ll''iu1 1'*ioo purpo so rt has norhi ngro do i$i: |3:it1?i 1!e"*, where ; ; ;fiil; ilil-"# ffi;. ffiil-;iiidll"11'ffil'J1l;}H::T:i::-.-Tl:.:l'o*To,..fari1l*getssaIary-alcrng. :Tl:_:-:T,r*:it ^rules l'herc piovide"idrat benefii u" gi=r, ,;iir

A Survey of Bots Used for Distributed Denial of Service ...
websites of banking and financial companies, online gambling firms, web retailers and government [4-8] to ... their increase in number and their ability to exploit common system vulnerabilities such as the DCOM ..... 2005. 15. Felix C. Freiling, Thor

Denial Of LLB Seats.pdf
HOSUR ROAD ,NEAR LALBAGH MAIN GATE,. BANGALORE - 560 027. REP. BY ITS PRINCIPAL. 4. BAR COUNCIL OF INDIA. NO.21,ROUSE AVENUE,.

Denial of SGS Req Reconsideration.pdf
Page 1 of 6. 21. UNITED STATES DISTRICT COURT. DISTRICT OF MINNESOTA. CENVEO CORP.,. Plaintiff,. v. SOUTHERN GRAPHIC SYSTEMS, INC.,. MIKE AUSTIN, SHAWN AUSTIN,. TOM AUSTIN, PAUL PEDERSON,. EMILY RYAN, and SUSAN SPEARS,. Defendants. Civil No. 08-5521

Denial of Motion to Reallot.pdf
Page 1 of 1. UNITED STATES DISTRICT COURT. EASTERN DISTRICT OF LOUISIANA. In re: Oil Spill by the Oil Rig. “Deepwater Horizon” in the Gulf. of Mexico ...

Denial of regular promotion.PDF
Whoops! There was a problem loading more pages. Retrying... Denial of regular promotion.PDF. Denial of regular promotion.PDF. Open. Extract. Open with.

Denial of TA-DA.PDF
E-mail : [email protected]; [email protected], Website : www.nfirindia.org. EARLY DETECTION OF HIV / AIDS - PROLONGS QUALITY OF LIFE. Dated: lll05l20l5.

RRED: Robust RED Algorithm to Counter Low-Rate Denial-of-Service ...
IN the past decades, quite a few Active Queue Management. (AQM) algorithms such as Random Early Detection (RED). [1] and its variants have been proposed to handle congestion and to improve the TCP performance ([1], [2], [3], [4]). Although these AQM

Denial of family planning allowance.PDF
... Website : www.nfirindia.com. EARLY DETECTION OF HIV / AIDS - PROLONGS QUALITY OF LIFE. c. Page 1 of 1. Denial of family planning allowance.PDF.

Read PDF League of Denial
... ring Chronic traumatic encephalopathy CTE is a degenerative disease found in ... MLB NBA NHL MMA college football and basketball NASCAR fantasy sports ...

Embedding Denial
University of Melbourne [email protected]. April 10, 2011. 1 Introduction ...... denial fit to express disagreement? We've got half of what we want: if I assert.

Denial of regular promotion.PDF
EARLY DETECTION OF HIV / AIDS - PFOLONGS OUALITY OF LIFE. Page 1 of 1. Denial of regular promotion.PDF. Denial of regular promotion.PDF. Open.

Denial of retiring room.PDF
Page 1 of 2. Stand 02/ 2000 MULTITESTER I Seite 1. RANGE MAX/MIN VoltSensor HOLD. MM 1-3. V. V. OFF. Hz A. A. °C. °F. Hz. A. MAX. 10A. FUSED.

Denial of additional increments.PDF
Railway Board,. New Delhi. Dear Sir, ... DegreeAlorth West Railway-reg. ... Denial of additional increments.PDF. Denial of additional increments.PDF. Open.

Denial of payment of Hospital Patient Care Allowance.PDF ...
Page 1 of 1. Page 1 of 1. Denial of payment of Hospital Patient Care Allowance.PDF. Denial of payment of Hospital Patient Care Allowance.PDF. Open. Extract. Open with. Sign In. Main menu. Displaying Denial of payment of Hospital Patient Care Allowanc

Denial-of-Sleep-Resilient Session Key Establishment ...
Internet of things, link layer security, key management, denial-of-service, denial-of-sleep. 1 Introduction. IEEE 802.15.4 well established as a radio standard for im- plementing Internet of things (IoT) applications [1]. Main features of IEEE 802.15