0% found this document useful (0 votes)
5 views

Module 10 Denial of Service

Uploaded by

brooklg1
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Module 10 Denial of Service

Uploaded by

brooklg1
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 49

Denial of Service

Denial of Service Attack


• Denial-of-service (DoS) is an attack that prevents
authorized users from accessing a computer or network.
DoS attacks target the network bandwidth or connectivity.
Bandwidth attacks overflow the network with a high
volume of traffic using existing network resources, thus
depriving legitimate users of these resources. Connectivity
attacks overflow a computer with a large amount of
connection requests, consuming all available operating
system resources, so that the computer cannot process
legitimate user requests.
Distributed Denial of Service Attacks
• A distributed denial-of-service (DDoS) attack is a
large-scale, coordinated attack on the availability of
services on a target's system or network resources,
launched indirectly through many compromised
computers on the Internet.
Symptoms of a DoS Attack
• Unavailability of a particular website
• Inability to access any website
• Dramatic increase in the amount of spam emails
received
• Unusually slow network performance
DoS Attack Techniques
• Bandwidth Attacks
• Service Request Floods
• SYN Flooding Attacks
• ICMP Flood Attacks
• Peer-to-Peer Attacks
• Permanent Denial-of-Service Attacks
• Application-Level Flood Attacks
Bandwidth Attacks
• A bandwidth attack floods a network with a large
volume of malicious packets in order to overwhelm
the network bandwidth. The aim of a bandwidth attack
is to consume network bandwidth of the targeted
network to such an extent that it starts dropping
packets. The dropped packets may include legitimate
users. A single machine cannot make enough requests
to overwhelm network equipment; therefore, DDoS
attacks were created where an attacker uses several
computers to flood a victim.
Service Request Floods
• Service request floods work based on the connections per
second principle. In this method or technique of a DoS
attack, the servers are flooded with a high rate of
connections from a valid source. In this attack, an attacker
or group of zombies attempts to exhaust server resources
by setting up and tearing down TCP connections. This
probably initiates a request on each connection, e.g., an
attacker may use his or her zombie army to fetch the home
page from a target web server repeatedly. The resulting
load on the server makes it sluggish.
SYN Attack
• A SYN attack is a simple form of DoS attack. In this attack,
an attacker sends a series of SYN requests to a target
machine (victim). When a client wants to begin a TCP
connection to the server.
• SYN flooding is a TCP vulnerability protocol that emerges
in a denial-of-service attack. This attack occurs when the
intruder sends unlimited SYN packets (requests) to the
host system. The process of transmitting such packets is
faster than the system can handle.
ICMP Flood Attack
• A DDoS ICMP flood attack occurs when zombies
send large volumes of ICMP_ECHO packets to a
victim system. These packets signal the victim's
system to reply, and the combination of traffic
saturates the bandwidth of the victim's network
connection. The source IP address may be spoofed.
Peer-to-Peer Attacks
• A peer-to-peer attack is one form of DDoS attack. In this
kind of attack, the attacker exploits a number of bugs in
peer-to-peer servers to initiate a DDoS attack. Attackers
exploit flaws found in the network that uses DC++ (Direct
Connect) protocol, which allows the exchange of files
between instant messaging clients. This kind of attack
doesn't use botnets for the attack. Unlike a botnet-based
attack, a peer-to-peer attack eliminates the need of
attackers to communicate with clients.
Permanent Denial-of-Service
Attack
• Permanent denial-of-service (PDoS) is also known as
plashing. This refers to an attack that damages the
system and makes the hardware unusable for its
original purpose until it is either replaced or
reinstalled. A PDoS attack exploits security flaws.
This allows remote administration on the
management interfaces of the victim's hardware
such as printers, routers, and other networking
hardware
Application-level Flood Attacks
• Application-level flood attacks have rapidly become a
conventional threat for doing business on the Internet.
Web application security is more critical than ever. This
attack can result in substantial loss of money, service and
reputation for organizations. Usually, the loss of service is
the incapability of a specific network service, such as
email, to be available or the temporary loss of all
network connectivity and services. Using this attack,
attackers destroy programming source code and files in
affected computer systems.
Botnet
• The term botnet is derived from the word roBOT
NETwork, which is also called zombie army. A botnet
is a huge network of compromised systems. It can
compromise huge numbers of machines without the
intervention of machine owners. Botnets consist of a
set of compromised systems that are monitored for a
specific command infrastructure.
Botnet cont’d
• Botnets are also referred to as agents that an
intruder can send to a server system to perform
some illegal activity. They are the hidden programs
that allow identification of vulnerabilities. It is
advantageous for attackers to use botnets to perform
illegitimate actions such as stealing sensitive
information (e.g., credit card numbers) and sniffing
confidential company information
Botnet cont’d
• Botnets are used for both positive and negative purposes.
They help in various useful services such as search engine
indexing and web spidering, but can also be used by an
intruder to create denial-of-service attacks. Systems that
are not patched are most vulnerable to these attacks. As
the size of a network increases, the possibility of that
system being vulnerable also increases. An intruder can
scan network ranges to identify which ones are vulnerable
to attacks. In order to attack a system, an intruder targets
machines with Class B network ranges
Botnet Propagation Technique
• Botnet propagation is the technique used to hack a
system and grab tradable information from it
without the victim's knowledge In this attack, the
criminal doesn't attack the victim system directly;
instead, he or she performs attacks with the help of
attackers. The criminal configures an affiliation
network as distribution channels. The job of
campaign managers is to hack and insert reference
to malicious code into a legitimate site. The malicious
code is usually operated by other attackers.
Botnet Ecosystem
• group of computers infected by bots is called botnet. A bot is a
malicious program that allows cybercriminals to control and use
compromised machines to accomplish their own goals such as
scams, launching DDoS attacks, distributing spam, etc. The
advent of botnets led to enormous increase in cybercrimes.
Botnets form the core of the cybercriminal activity center that
links and unites various parts of the cybercriminal world.
Cybercriminal service suppliers are a part of cybercrime
network. These suppliers offer services such as malicious code
development, bulletproof hosting, creation of browser exploits,
and encyrption and packing.
Botnet Ecosystem cont’d
• Typically, the botnet ecosystem is divided into three
parts, namely trade market, DDoS attack, and spam. A
botmaster is the person who makes money by facilitating
the infected botnet groups for service on the black
market. The master searches for vulnerable ports and
uses them as candidate zombies to infect. The infected
zombies further can be used to perform DDoS attacks.
On the other hand, spam emails are sent to randomly
chosen users. All these activities together guarantee the
continuity of malicious botnet activities.
Botnet Trojan: sharK
• sharK is a reverse-connecting, firewall- bypassing
remote administration tool written in VB6. With
shark, you will be able to administrate any PC (using
Windows OS) remotely.
Poison Ivy
• Poison Ivy is an advanced encrypted "reverse
connection" for firewall bypassing remote
administration tools. It gives an attacker the option
to access, monitor, or even take control of a
compromised system. Using this tool, attackers can
steal passwords, banking or credit card information,
as well as other personal information
Botnet Trojan: PlugBot
• PlugBot is a hardware botnet project. It's a covert
penetration testing device (bot) is designed for
covert use during physical penetration tests. PlugBot
is a tiny computer that looks like a power adapter;
this small size allows it to go physically undetected
all while being powerful enough to scan, collect, and
deliver test results externally.
NetBot Attacker
• NetBot attacker has a simple Windows user interface
to control botnets. Attackers use it for commanding
and reporting networks, even for command attacks.
It has two RAR files; one is INI and the other one is a
simple EXE. It is more powerful when more bots are
used to affect the servers. With the help of a bot,
attackers can execute or download a file, open
certain web pages, and can even turn off all PCs.
DDoS Attack
• In a DDoS attack, a group of compromised systems
usually infected with Trojans are used to perform a
denial-of-service attack on a target system or
network resource. The figure that follows shows how
an attacker performs a DDoS attack with the help of
an LOIC tool.
DDoS Attack Tool: LOIC
• LOIC is an open source tool, written in C#. The main purpose of
the tool is to conduct stress tests of web applications, so that the
developers can see how a web application behaves under a
heavier load. Of course, a stress application, which could be
classified as a legitimate tool, can also be used in a DDoS attack.
LOIC basically turns the computer's network connection into a
firehouse of garbage requests, directed towards a target web
server. On its own, one computer rarely generates enough TCP,
UDP, or HTTP requests at once to overwhelm a web server—
garbage requests can easily be ignored while legit requests for
web pages are responded to as normal.
Cont’d
• But when thousands of users run LOIC at once, the
wave of requests become overwhelming, often
shutting a web server (or one of its connected
machines, like a database server) down completely,
or preventing legitimate requests from being
answered
How botnet owners make money
• So how do botnet owners make money with infected
computers? There are several major sources of
income: DDoS attacks, theft of confidential
information, spam, phishing, SEO spam, click fraud
and distribution of adware and malicious programs.
It should be noted that, if chosen, any of these
sources can provide a cybercriminal with a good
income. But why choose? A botnet can perform all of
these activities… at the same time
DoS Attack Tools DoS HTTP
• DoSHTTP is HTTP flood denial-of-dervice (DoS)
testing software for Windows. It includes URL
verification, HTTP redirection, and performance
monitoring. It uses multiple asynchronous sockets to
perform an effective HTTP flood. It can be used
simultaneously on multiple clients to emulate a
distributed-denial-of-service (DDoS) attack. It also
allows you to test web server performance and
evaluate web server protection software.
Detection Techniques
• The detection techniques for DoS attacks are based on
identifying and discriminating the illegitimate traffic
increases and flash events from legitimate packet
traffic.
• There are three kinds of detection techniques: activity
profiling, change-point detection, and wavelet-based
signal analysis. All detection techniques define an
attack as an abnormal and noticeable deviation from a
threshold of normal network traffic statistics.
Wavelet-based Signal Analysis
• Wavelet analysis describes an input signal in terms of spectral
components. It provides a global frequency description and no time
localization. Wavelets provide for concurrent time and frequency
descriptions. This makes it easy to determine the time at which
certain frequency components are present. The input signal
contains both time-localized anomalous signals and background
noise. In order to detect the attack traffic, the wavelets separate
these time-localized signals and the noise components. The
presence of anomalies can be determined by analyzing each
spectral window's energy. The anomalies found may represent
misconfiguration or network failure, flash events, and attacks such
as DoS, etc.
Sequential Change-Point Detection
• Sequential change-point detection algorithms
segregate the abrupt changes in traffic statistics
caused by attacks. This detection technique initially
filters the target traffic data by port, address, and
protocol and stores the resultant flow as a time
series. This time series can be considered as the
time-domain representation of a cluster's activity.
The time series shows a statistical change at the time
the DoS flooding attack begins.
DoS/DDoS Countermeasure
Strategies
There are three types of countermeasure strategies
available for DoS/DDoS attacks
• Absorb the attack
• Degrade services
• Shut down services
Countermeasures
There are six countermeasures against DDoS attacks:
• Protect secondary targets
• Neutralize handlers
• Prevent potential attacks
• Deflect attacks
• Mitigate attacks
• Post-attack forensics
Protect Secondary Victims
Individual Users
• Potential secondary victims can be protected from
DDoS attacks, thus preventing them from becoming
zombies. This demands intensified security
awareness, and the use of prevention techniques. If
attackers are unable to compromise secondary
victims' systems and secondary victims from being
infected with DDoS, clients must continuously
monitor their own security.
Protect Secondary Victims
Network Service Providers
• Service providers and network administrators can
resort to dynamic pricing for their network usage so
that potential secondary victims become more active
in preventing their computers from becoming part of
a DDoS attack. Providers can charge differently as per
the usage of their resources. This would force
providers to allow only legitimate customers onto
their networks
Detect and Neutralize Handler
• The DDoS attack can be stopped by detecting and neutralizing
the handlers, which are intermediaries for the attacker to
initiate attacks. Finding and stopping the handlers is a quick
and effective way of counteracting against the attack.
• There are usually a few DDoS handlers deployed as compared
to the number of agents, so neutralizing a few handlers can
possibly render multiple agents useless. Since agents form the
core of the attacker's ability to spread an attack, neutralizing
the handlers to prevent the attacker from using them is an
effective strategy to prevent DDoS attacks
Detect Potential Attacks
• Ingress filtering: Ingress filtering doesn't offer
protection against flooding attacks originating from
valid prefixes (IP addresses); rather, it prohibits an
attacker from launching an attack using forged source
addresses that do not obey ingress filtering rules.
Cont’d
• Egress Filtering: In this method of traffic filtering, the IP
packet headers that are leaving a network are initially
scanned and checked to see whether they meet certain
criteria. Only the packets that pass the criteria are routed
outside of the sub-network from which they originated; the
packets which don't pass the criteria will not be sent. There
is a good possibility that the source addresses of DDoS
attack packets will not represent the source address of a
valid user on a specific sub-network as the DDoS attacks
often use spoofed IP addresses.
Cont’d
• TCP Intercept: In TCP intercept mode, the software
intercepts the SYN packets sent by the clients to the server
and matches with an extended access list. If the match is
found, then on behalf of the destination server, the
software establishes a connection with the client. Similar to
this, the software also establishes a connection with the
destination server on behalf of the client. Once the two half
connections are established, the software combines them
transparently. Thus, the TCP intercept software prevents
the fake connection attempts from reaching the server.
Deflect Attacks
• Recent research reveals that a honeypot can imitate all
aspects of a network including its web servers, mail servers,
and clients. This is done to gain the attention of the DDoS
attackers. A honeypot is designed to attract DDoS attackers,
so that it can install the handler or an agent code within the
honeypot. This stops legal systems from being
compromised. In addition, this method grants the owner of
the honeypot a way to keep a record of handler and/or
agent activity. This knowledge can be used for defending
against any future DDoS installation attacks.
Deflect Attacks cont’d
• KFSensor: KFSensor acts as a honeypot to attract and
detect hackers and worms by simulating vulnerable
system services and Trojans. By acting as a decoy
server, it can divert attacks from critical systems and
provide a higher level of information than can be
achieved by using firewalls and NIDS alone
Mitigate Attacks
There are two ways in which the DoS/DDoS attacks can be
mitigated or stopped
• Load Balancing: Bandwidth providers can increase their
bandwidth in case of a DDoS attack to prevent their servers
from going down. A replicated server model can also be used
to minimize the risk.
• Throttling: Min-max fair server-centric router throttles can be
used to prevent the servers from going down. This method
enables the routers in managing heavy incoming traffic so
that the server can handle it. It can also be used to filter
legitimate user traffic from fake DDoS attack traffic.
Post-Attack Forensics
• Sometimes by paying a lot of attention to the
security of a computer or network, malicious hackers
manage to break in to the system. In such cases, one
can utilize the post­attack forensic method to get rid
of DDoS attacks.
Techniques to Defend against
Botnets
• RFC 3704 Filtering
• Black Hole Filtering
• DDoS Prevention Offerings from ISP or DDoS Service
• Cisco IPS Source IP Reputation Filtering
DoS/DDoS Countermeasures
• Disable unused and insecure services
• Block all inbound packets originating from the
service ports to block the traffic from the
• reflection servers
• Update kernel to the latest release
• Improved routing protocols are desirable,
particularly for the multi-hop WMN
Cont’d
• Configure the firewall to deny external Internet
Control Message Protocol (ICMP) traffic access
• Prevent the use of unnecessary functions such as
gets, strcpy, etc
• Secure the remote administration and connectivity
testing
• Prevent the return addresses from being overwritten
DoS/DDoS Protection at the ISP
Level
• Most ISPs simply block all the requests during a DDoS
attack, denying legitimate traffic from accessing the
service. ISPs offer in-the-cloud DDoS protection for
Internet links so that they do not become saturated
by an attack. Attack traffic is redirected to the ISP
during the attack to be filtered and sent back.
Administrators can request ISPs to block the original
affected IP and move their site to another IP after
performing DNS propagation.
Advanced DDoS Protection
Appliances
• FortiDDoS-300A
• DDoS Protector
• Cisco Guard XT 5650
• Arbor Pravail: Availability Protection System
DoS/DDoS Protection Tool: D-
Guard Anti-DDoS — Firewall
• D-Guard Anti-DDoS Firewall provides DDoS
protection. It offers protection against DoS/DDoS,
Super DDoS, DrDoS, fragment attacks, SYN flooding
attacks, IP flooding attacks, UDP, mutation UDP,
random UDP flooding attacsk, ICMP, ICMP flood
attacks, ARP spoofing attacks, etc
Penetration Testing
• Step 1: Define the objective
• Step 2: Test for heavy loads on the server
• Step 3: Check for DoS vulnerable systems
• Step 4: Run a SYN attack on the server
• Step 5: Run port flooding attacks on the server
• Step 6: Run an email bomber on the email servers
• Step 7: Flood the website forms and guestbook with bogus
entries
• Step 8: Document all the findings

You might also like