DENIAL OF SERVICE ATTACK

Download Report

Transcript DENIAL OF SERVICE ATTACK

DENIAL OF SERVICE ATTACK
YVONNE M. AKUTSA 128467
BEHROKH MOHEB 118451
2
Objectives
•
•
•
•
•
•
•
•
•
What is denial of service?
What is distributed denial of service?
Common forms of attack
Modes of attack
Consequences of attack
Real example of attack
Sign of attack
Prevention
Ethic on Denial of Service attack
3
WHAT IS DENIAL OF SERVICE ATTACK?
• Denial-of-service attack, is a type of attack on
a network that is designed to bring the network
to its knees by flooding it with useless traffic.
• DoS attack, denial-of-service attack, is an
explicit attempt to make a computer resource
unavailable by either injecting a computer virus
or flooding the network with useless traffic.
4
WHAT IS DENIAL OF SERVICE ATTACK? cont’
Its aim is to prevent legitimate users by:
• Attempting to flood a network
• To disrupt connections between computers
• Prevent certain individuals from accessing a
service
• Disrupt service to a specific system or person
5
Common forms of Attack
• SYN Floods
• Ping of death
• Smurf Attack
• Teardrop Attack
• Mail Bomb
• Ping of flood
6
SYN Floods
• It takes advantage of the flaw of TCP three-way
handshaking behavior.
• Sends many requests to the connection.
• Do not response to replies.
• The SYN flood attack sends TCP connections
requests faster than a machine can process them
7
Ping of death
• Is a denial of service (DoS) attack caused by an
attacker deliberately sending an IP packet larger
than the bytes allowed by the IP protocol. Since the
received ICMP(Internet Control Message Protocol)
echo request packet is bigger than the normal IP
packet size, the victim cannot reassemble the
packets. The OS may be crashed or rebooted as a
result.
8
Smurf Attack
• A smurf attack occurs when an attacker sends a
large amount of IP packets to the broadcast
address of an intermediate network with spoofed
IP addresses as the origin.
• This cause all hosts on the network to reply to
the ICMP request, causing significant traffic to
the victim's computer.
9
Teardrop Attack
• Divides large files into fragments.
• An attacker sends two fragments that cannot be
reassembled properly by manipulating the offset
value of packet and cause reboot or halt of victim
system.
• Teardrop exploits an overlapping IP fragment
bug present in Windows 95, Windows NT and
Windows 3.1 machines.
10
Mail Bomb
Email bombing is characterized by abusers
repeatedly sending an email message to a
particular address at a specific victim site. In
many instances, the messages will be large and
constructed from meaningless data in an effort
to consume additional system and network
resources
11
Ping of flood
• Attacker simply sends a huge number of "ICMP
Echo Requests(ping)" to the victim.
• It sends ICMP packets as fast as possible without
waiting for replies.
• The continuing combination of requests and replies
can slow the network or, in extreme cases, to
disconnect.
12
What does the DoS attack?
NETWORK BANDWITH
SERVER MEMORY
CPU USAGE
DATABASE CONNECTION POOL
DATABASE SPACE
HARD DISK SPACE
13
What is Distributed Denial of Service?
• DDOS, short for Distributed Denial of Service,
is a type of DOS attack where multiple
compromised systems , which are usually
infected with a Trojan -- are used to target a
single system causing a Denial of Service (DoS)
attack.
• DDoS = when multiple hosts attack
simultaneously
• DoS = when a single host attacks.
14
MODES OF ATTACK
Consumption of scarce, limited or non
renewable resources
Destruction or alteration of configuration
information
Physical destruction or alteration of network
components
15
CONSEQUENCES OF ATTACKS
• BRAND DAMAGE
• FINANCIAL LOSSES
• SABORTAGE
• EXTORTION
• REPEAT ATTACK IF NOT WELL PROTECTED
16
Examples of Attack
• Schwab Website Again Hit With Denial
of Service Attack
(http://www.euroinvestor.com/news/2013/04/24/s
chwab-website-again-hit-with-denial-of-serviceattack/12305777)
• Spamhaus hit by biggest-ever DDoS
attacks
(http://www.computerworld.com/s/article/923793
8/Update_Spamhaus_hit_by_biggest_ever_DDoS
_attacks)
17
SIGNS OF AN ATTACK
• Unusually slow network
• Certain websites become slower to open or
unavailable.
• A high increase in the amount of spam received.
• Disconnection of a wireless or wired internet
connection
18
PREVENTION OF ATTACK
• Businesses
Firewall and Router configuration
Block unnecessary ports
Filter broadcast messages
Verify source IP address (prevent IP
spoofing across subnets)
Install DDoS protection equipment or services
Monitor traffic under normal circumstances
and detect anomalies
19
Cont’
Apply latest patches to servers and PCs, Use
Antivirus software
Maintain a redundant environment (hot swap
server)
• End Users
Use a home firewall/router
Apply latest updates for operating system
Use Antivirus software
Use caution when opening email attachments or
clicking on links
20
ETHICS IN DOS ATTACK
• A Denial of Service Attack is unethical. This is
because it is an invasion of someone’s space and
with others the destruction of property which
denies them the right to use what rightfully
belongs to them as a legitimate owner.
21
CONCLUSION
• Denial of service attacks have now become
common forms of protests online for many
groups that feel unfairly treated or have
prejudices against companies.
22
References
• http://www.iplocation.net/tools/denial-of-service.php
• http://www.webopedia.com/TERM/D/DoS_attack.html
• http://www.webopedia.com/TERM/D/DDoS_attack.ht
ml
• http://ethics.csc.ncsu.edu/abuse/dos/study.php
• http://www.iss.net/security_center/advice/Exploits/TC
P/SYN_flood/default.htm
• http://searchsecurity.techtarget.com/definition/ping-ofdeath
• http://www.cert.org/tech_tips/email_bombing_spamm
ing.html