+ All Categories
Home > Technology > Ddos attack definitivo

Ddos attack definitivo

Date post: 18-Nov-2014
Category:
Upload: lilith333
View: 1,088 times
Download: 2 times
Share this document with a friend
Description:
 
35
DDoS Attack Claudia Plantera I30033 2011.11.18 CyBerwar and Intelligence Fall 2011
Transcript
Page 1: Ddos attack definitivo

DDoS Attack Claudia Plantera

I300332011.11.18

CyBerwar and Intelligence

Fall 2011

Page 2: Ddos attack definitivo

Definitions

Types of Attack

Victims and Effects

Case Studies

Defense

Outline

CyBerwar and Intelligence

Page 3: Ddos attack definitivo

Definitions

CyBerwar and Intelligence

Page 4: Ddos attack definitivo

“Malware (for "malicious software") is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission.”

CyBerwar and Intelligence

Malware

Page 5: Ddos attack definitivo

“a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a CD. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect and some can be quite harmful, erasing data or causing your hard disk to require reformatting”

CyBerwar and Intelligence

Virus

Page 6: Ddos attack definitivo

“Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. To spread, worms either exploit a vulnerability on the target system or use some kind of social engineering to trick users into executing them. A worm enters a computer through a vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided.”

CyBerwar and Intelligence

Worms

Page 7: Ddos attack definitivo

“It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and spreading other malware, such as viruses). Trojans are also known to create back doors to give malicious users access to the system.Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet.”

CyBerwar and Intelligence

Trojan

Page 8: Ddos attack definitivo

“Bot" is derived from the word "robot" and is an automated process that interacts with other network services. Bots often automate tasks and provide information or services that would otherwise be conducted by a human being. A typical use of bots is to gather information (such as web crawlers ), or interact automatically with instant messaging (IM), Internet Relay Chat (IRC), or other web interfaces. They may also be used to interact dynamically with websites.Bots can be used for either good or malicious intent. A malicious bot is self-propagating malware designed to infect a host and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices, or "botnet.”

CyBerwar and Intelligence

Bot

Page 9: Ddos attack definitivo

Denial of Service (DOS) Attack

CyBerwar and Intelligence

“an attempt to make a computer resource run out and make it unavaible to its intended users”

Page 10: Ddos attack definitivo

DDoS AttackDoS Attack

The attacker mounts an attack from a single host

DDoS Attack

The attacker uses many systems to simultaneously launch attacks against a remote host

CyBerwar and Intelligence

Page 11: Ddos attack definitivo

Zombie Computer Is a computer connected on the Internet that has been compromised by cracker, computer virus or trojan virus and can be used to perform malicious tasks of one sort or another under remote direction

The computer attack is ampliefied:The rate of packetsThe size of packtesThe difficulty to trace back an attack to the

initiating attack

CyBerwar and Intelligence

Page 12: Ddos attack definitivo

Attack

CyBerwar and Intelligence

Page 13: Ddos attack definitivo

General Attack Classification

intended to overflow and consume resources available to the victim

attempt to exploit a software program design flaw

Bandwidth Attack

Logic Attack

Protocol Attack

take advantage of protocol inherent design

CyBerwar and Intelligence

Page 14: Ddos attack definitivo

DoS Attack

CyBerwar and Intelligence

Page 15: Ddos attack definitivo

Smurf Attack

CyBerwar and Intelligence

Attacker sends a huge amount of ICMP Echo Requests to victim

Once network links become overloaded, all legitimate traffic will be slowed or stopped

Use of bandwidth consumption to disable a victim's network resources using amplification of the attackers bandwitdh

Page 16: Ddos attack definitivo

The Fraggle

CyBerwar and Intelligence

Similar concept to ICMP flooding

Networked slowed to the point where all valid connections are stopped

Achieves a smaller amplication factor

Page 17: Ddos attack definitivo

SYN Flood

CyBerwar and Intelligence

– the client sends a SYN packet to the server

– the server sends a SYN-ACK back to the client

– the client sends an ACK back to the server tocomplete the three-way handshake andestablish the connection TCP

Page 18: Ddos attack definitivo

SYN Flood

CyBerwar and Intelligence

• The attack occurs by the attackerinitiating a TCP connection to the serverwith a SYN. (using a legitimate or spoofedsource address)

• The server replies with a SYN-ACK

• The client then doesn’t send back a ACK,causing the server to allocate memory forthe pending connection and wait.

• The half-open connections buffer on the victimserver will eventually fill• The system will be unable to accept any newincoming connections until the buffer is emptiedout.• There is a timeout associated with a pendingconnection, so the half-open connections willeventually expire.• The attacking system can continue sendingconnection requesting new connections faster thanthe victim system can expire the pendingconnections.

Page 19: Ddos attack definitivo

DDoS Attack

CyBerwar and Intelligence

Page 20: Ddos attack definitivo

How it worksAttackers recruits multiple

zombies machines

Zombie computers send the attack packets and recruit other machines

the identity of subverted machine is hide through

spooking of the source address filed in the attack packets

Page 21: Ddos attack definitivo

TrinOO

CyBerwar and Intelligence

• Affects Windows and many Unix OS’s• Attacker scans for exploits, gains root, anddownloads Trin00 programs.• Attacker->Master->Daemon hierarchy(One -> More -> Many)• Attacker can telnet into a Master toinitiate commands, which are distributedamongst its Daemons.

• Communication between Master->Daemonthrough a password-protected cleartextUDP-based protocol.

• Daemons attack the target with a UDP orTCP packet bombardment.

Page 22: Ddos attack definitivo

Other attacks

CyBerwar and Intelligence

• Smurf attack• The Fraggle• SYN flood

All three at once

TFN and TFN2k Stacheldraht

• Smurf attack• The Fraggle• SYN flood

Encrypted communication bw the attacker and the MastersThe Agents can upgrade their code automatically

Page 23: Ddos attack definitivo

Victim & Damage

CyBerwar and Intelligence

Page 24: Ddos attack definitivo

General Victim Classification

Exploit some feature of a specific application in order to make impossible the use of the resource

Application

CyBerwar and Intelligence

The access to the target machine is impossible because its communication mechianisms are overloading or disabling.

Host

Network

The incoming bandwidth of the target network is consumed

Infrastructure

Target some distributed service that is crucial for global internet operation or operation of a subnetwork

Page 25: Ddos attack definitivo

SymptomsUnusually slow network perfomance

Unavailability of a particular web site

Inability to access to any web site

Dramatic increase in the number of spam email

CyBerwar and Intelligence

Page 26: Ddos attack definitivo

MotivationMaterial gain

Personal reasons (revenge)

Fame

Political reasons

CyBerwar and Intelligence

Page 27: Ddos attack definitivo

Damage

CyBerwar and Intelligence

Deny the victim's service to its clients. In the case of recoverable attacks, the victim can recover as soon as the influx of the attack is stopped, but if is non recoverable it requires some human interventions.

Disruptive Degrade

Degrate some portion of a victim's resources. Since this kind of attack doesn't lead to total service disruption, it coul remain undected for a significant period of time.

Page 28: Ddos attack definitivo

Case Studies

CyBerwar and Intelligence

Page 29: Ddos attack definitivo

.

ROK&US

CyBerwar and Intelligence

The botnet fooled Estonian network routers into continuously resending useless packets of information to one another, rapidly flooding the infrastructure used to conduct all online business in the country.

Dispute with Russia over the removal of a Soviet-era war memorial, a giant bronze soldier statue, from the center of Tallinn  .

●Bank websites became unreachable, paralyzing most of Estonia's financial activity. ●Press sites also came under attack, in an attempt to disable news sources.● ISPs were overwhelmed, blacking out internet access for significant portions of the population.

●NATO stablished the alliance's cyber defense research center in Tallinn in 2008.●Motivated Estonia to call on the European Union to make cyber attacks a criminal offense.

Estonia

Page 30: Ddos attack definitivo

.

ROK&US

CyBerwar and Intelligence

Several Russian blogs, forums, and websites spread a Microsoft Windows batch script that was designed to attack Georgian websites.

In the weeks leading up to the five-day 2008 South Ossetia war, a DDoS attack directed ifirst to the Website of the Georgian president

The effects was the Georgians could not connect to any outside news or information sources and could not send email out of the country. The aim of the attack was to prevent Georgians from learning what was going on

Georgia’s banking operations were paralyzed. Credit card systems shut down, followed by the mobile phone system.

Georgia

Page 31: Ddos attack definitivo

Defence

CyBerwar and Intelligence

Page 32: Ddos attack definitivo

Main Problem: Zombie Computers

patches for software defects that were reported  and fixed months ago are never installed

anti-virus tools are not kept up to date

the computer owners give away control of their computers by indiscriminately running unknown programs.

CyBerwar and Intelligence

Page 33: Ddos attack definitivo

Local Solutions

the victim can try to stop the inflitrating IP packets on the local router by installing a filter to detect them

Local filtering

CyBerwar and Intelligence

Systems administrators must make a series of changes to lead the traffic to the new IP address, once the IP change is completed, all internet routers will been informed ad edge routers will drop the attacking packets.

Changing IPs

Creating client bottlnecksThe aim is creating bottleneck process on the zombie computers, such as solving puzzle or requiring to answer a random questions to the attacking computer before establishing the connection. In this way the attacking ability is limited because those strategies consume computtational power, limiting attacker in the number of connection requests it can make at the same time

Page 34: Ddos attack definitivo

Global Solutions

the victim can try to stop the inflitrating IP packets on the local router by installing a filter to detect them

improving the security of the entiry Internet

CyBerwar and Intelligence

to prevent the accomulation if a critical mass of attacking packets in time. A victim can send information that it has detected an attack, and the filters can stop attacking packets earlier preventing it to spread

Using globally coordinate filters

Tracing the source of IP address

to trace the intruders' path back to zombie computers and stop their attacks.

Page 35: Ddos attack definitivo

Thank you

CyBerwar and Intelligence


Recommended