+ All Categories
Home > Documents > COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS)...

COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS)...

Date post: 18-May-2020
Category:
Upload: others
View: 7 times
Download: 0 times
Share this document with a friend
24
COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty [email protected] 8/10/2019 1
Transcript
Page 1: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

COMPSCI 316

Denial-of-Service Attacks

(DoS and DDoS)Manoranjan Mohanty

[email protected]

8/10/2019 1

Page 2: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

8/10/2019 2

When can it happen? Legitimate case Attack!

Page 3: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

DoS Attack

8/10/2019 3

“An action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space.”

-- NIST Computer Security Incident Handling Guide

Alice UoA Server

Page 4: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

DoS Attack Cont.

8/10/2019 4

Attack on the availability of some services.

Network bandwidth

Relates to the capacity of the network links connecting a

server to the Internet

For most organizations this is their connection to their Internet Service Provider

(ISP)

Alice UoA Server

Attacker Bob

Internet

Flooding attack.

Bob sends more data than what the connection to the UoA server can handle.

Page 5: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

DoS Attack Cont.

8/10/2019 5

Attack on the availability of some services.

System resources

Aims to overload or crash the network handling software

UoA Server

Attacker Bob

Poison Packet

Crashing system hardware resource (e.g., buffer) and software (e.g., exploiting a bug) using special packets. E.g. SYN spoofing, ping of death (poison packet).

SYN Spoofing

Page 6: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

DoS Attack Cont.

8/10/2019 6

Attack on the availability of some services.

Application resources

Typically involves a number of valid requests, each of

which consumes significant resources, thus limiting the

ability of the server to respond to requests from

other users

UoA Server

Attacker BobLarge number of

time taking queries

Attack on specific application, e.g., web server. Cyberslam (a large number of time-taking queries)

Page 7: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

Classic DoS Attacks

8/10/2019 7

Flooding Attack

Source Address Spoofing

SYN Spoofing

Page 8: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

Flooding Attack

8/10/2019 8

Attack packets must be useful

Large packets preferred

UoA Server

Internet

• Ping flood using ICMP echo request packets

• Traditionally network administrators allow such packets into their networks because ping is a useful network diagnostic tool

ICMP flood

• Uses UDP packets directed to some port number on the target system

UDP flood

• Sends a large number of TCP connection requests to the target systemTCP SYN flood

Attacker Bob

Page 9: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

Flooding Attack

8/10/2019 9

Source of the attack is clearly identified unless a spoofed address is used – legal case can be taken

Network performance of the attacker is noticeably affected due to victim’s response to the received packets – Attack can be affected!

UoA Server

InternetAttacker Bob

Page 10: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

Source Address Spoofing

8/10/2019 10

Forging source address and other packet attributes

UoA Server

Internet

Attacker Bob

AliceEve

Page 11: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

DoS: Source Address Spoofing

8/10/2019 11

A target system receives a large number of (forged) packets from different sources The attacker is much harder to be identified

The attacker is no more congested with a large number of response packets from the target (as response packets will be distributed)

Some response packets may generate error packets (more flood) to be sent to the target (as some source may not exist or may not expecting a packet)

Filtering of forged packets at destination router a practical countermeasure – but, ISPs do not care about this (DoS attack)

Page 12: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

SYN Spoofing

8/10/2019 12

Common DoS attack

Attack on network system resource of a server (rather than network bandwidth)

Attacks the ability of a server to respond to future TCP connection requests by overflowing the tables used (by server) to manage them

Let’s first understand what is TCP SYN

Page 13: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

TCP Three-way Handshake

13

Client Server 1. Client sends SYN packet with seq x

2. Server records all details about the connection request in a table (buffer), and sends SYN-ACK packet

3. After receiving SYN-ACK packet, client sends ACK packet

Since packets must be sent over IP, if there is no response by the receiver of the packet till a timeout, the sender resends the packet (overhead for making TCP reliable)

Page 14: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

SYN Spoofing

14

Exploits three-way handshake

1. Attacker generates many SYN connection requests with forged source address

2. Server stores all the connections parameters in buffer, and sends SYN-ACK to the source addresses

If system in spoofed address is busy or does not exist, no reply

Server resends the packet a number of times while also storing details of this fake connection request

Page 15: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

SYN Spoofing

15

Server has limited buffer size

If it has got a large number of fake connection requests, the buffer will fill quickly

Legitimate request will be denied

Page 16: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

Other DoS Attacks

8/10/2019 16

Distributed DoS (DDoS)

Reflector Attack

Amplifier Attack

Page 17: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

DDoS

8/10/2019 17

Many systems (some can be ours) to generate attack Attacker uses malware to take

control of a “good system”. Such systems are known as zombies Botnet: A large collection of

zombies controlled by an attacker40% DoS attacks in 2015 came

from botnet Botnet on hire – Underground

economy!Your system can be one of many without your knowledge!!!

Page 18: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

DDoS

8/10/2019 18

DDoS Cont.

Well organized botnet architecture

Page 19: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

Reflector Attack

8/10/2019 19

Attacker sends packets to a known service of an intermediary with a spoofed source address of the actual target system

Unlike DDoS, intermediaries are not compromised

When intermediary responds, the response is sent to the target – can flood the target system

https://blog.cloudflare.com/reflections-on-reflections/

Attack by flooding

Page 20: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

Reflector Attack

8/10/2019 20

“Reflects” the attack off the intermediary (reflector)

Goal is to generate enough volumes of packets to flood the link to the target system without alerting the intermediary

The basic defense against these attacks is blocking spoofed-source packets

Page 21: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

Amplification Attack

8/10/2019 21

A variant of reflection attack that also depends on address spoofing

They differ in sending multiple response packets per each original packet sent (e.g., by sending a request to broadcast address of a network so that all hosts of the network respond)

Page 22: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

These attacks cannot be prevented

entirely

High traffic volumes may be legitimate

High publicity about a specific site

flash crowd, or flash event

Dos Attack Defences

Page 23: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

Attack prevention and preemption

• Before attack

Attack detection and filtering

• During the attack

Attack source traceback and identification

• During and after the attack

Attack reaction

• After the attack

Four lines of defense against DDoS attacks

Dos Attack Defences Cont.

Prevent attack without affecting normal operations.

Detect from suspicious pattern. Filter attack packets

Identify the attack source for preventing future attacks

Minimize the effect of the attack.

Page 24: COMPSCI 316 Denial-of-Service Attacks · COMPSCI 316 Denial-of-Service Attacks (DoS and DDoS) Manoranjan Mohanty m.mohanty@auckland.ac.nz 8/10/2019 1. ... packets into their networks

Slides are based on the following book and its accompanying slides Computer Security Principle and Practice by William Stallings

and Lawrie Brown. Pearson.

Some images are taken from Google Images

Acknowledgement


Recommended