CIS 450 – Network Security
Download
Report
Transcript CIS 450 – Network Security
CIS 450 – Network
Security
Chapter 6 – Denial of Service Attacks
Definition – an attack through which a person
can render a system unstable or significantly
slow down the system for legitimate users by
overloading the resources so no one else can
access it
Can be deliberate or accidental
Most operating systems, routers, and network
components that have to process packets at
some level are vulnerable to DoS attacks
Types of DoS Attacks
Crashing a system or network
Send victim unexpected data or packets that
causes the system to crash or reboot (Sasser
worm)
Can render a system inaccessible with a
couple of packets
Flooding the system or network
Attacker floods the network much more
information/packets that it can handle
More work for attacker
Types of DoS Attacks
Distributed DoS Attack (DDoS)
A traditional DoS attack involves a single
machine launching the attack
In DDoS an attacker breaks into several
machines, or coordinates with several friends,
to launch an attack against a target machine
or network at the same time
More difficult to block or detect
Things can be done to minimize DoS threat
but almost impossible to be 100% safe
Types of DoS Attacks
Ping of Death
Affects Most Operating Systems
Technically speaking, the Ping of Death attack involved
sending IP packets of a size greater than 65,535 bytes to the
target computer. IP packets of this size are illegal, but
applications can be built that are capable of creating them.
Carefully programmed operating systems could detect and
safely handle illegal IP packets, but some failed to do this.
ICMP (Internet Control Message Protocol) ping utilities often
included large-packet capability and became the namesake
of the problem, although UDP and other IP-based protocols
also could transport Ping of Death.
Operating system vendors quickly devised patches to avoid
the Ping of Death. Still, many Web sites today block ICMP
ping messages at their firewalls to avoid similar denial of
service attacks.
Types of DoS Attacks
SSPing
Microsoft Windows 95 & NT
The attack is designed to crash your
system by sending invalid IP fragments at
it. Receiving system locks when it tries to
put fragments together.
Defense
Most firewalls will automatically filter out
these packets.
Microsoft security patches
Types of DoS Attacks
Land Exploit
Most operating systems
A SYN packet in which the source address and port
are the same as the destination
Relies on the use of forged packets, that is, packets
where the attacker deliberately falsifies the origin
address
Defense
Apply vendor patches
Install filtering on your routers that requires packets
leaving your network to have a source address from
your internal network. This type of filter prevents a
source IP spoofing attack from your site by filtering all
outgoing packets that contain a source address from a
different network
Types of DoS Attacks
Smurf
Involves forged ICMP packets sent to a broadcast
address
Most OSs and routers
http://www.networkcommand.com/docs/smurf.
html
SYN Flood
Most Operating Systems
http://www.networkcommand.com/docs/synflood.doc
Types of DoS Attacks
CPU Hog
Microsoft NT
Win Nuke
Most Microsoft OSs
Test if your machine is vulnerable http://www.jtan.com/resources/winnuke.html
RPC Locator
Microsoft NT
http://support.microsoft.com/default.aspx?scid=http://s
upport.microsoft.com:80/support/kb/articles/q193/2/33.
asp&NoWebContent=1
Types of DoS Attacks
Jolt2
Operating Systems: Numerous
http://www.bindview.com/Support/RAZOR/Advis
ories/2000/adv_Jolt2.cfm
Bubonic
Operating System: Windows 98/2000
Microsoft Incomplete TCP/IP Packet
Vulnerability
Operating System: Windows NT/ME/9x
http://www.microsoft.com/technet/security/bulletin/
MS00-091.mspx
Types of DoS Attacks
HP Openview Node Manager SNMP DOS
Vulnerability
Operating System: Various
NetScreen Firewall DOS Vulnerability
Operating Systems: Various Net Screen
Screen OSs
http://www.secureroot.com/security/advisories/
9790497270.html
Tools for Running Attacks
DOS Attacks
Master List
http://www.cotse.com/dos.htm
Targa
http://www.cotse.com/sw/dos/misc/targa.c
DDOS Attacks
Tribal Flood Network 2000 (TFN2K)
Trinoo, http://www.donkboy.com/html/stuff.htm
Satcheldraht
Preventing DoS Attacks
Effective Robust Design
Build redundancy and robustness into system
Have multiple connections to the Internet and
connections from multiple geographic locations
Have services at different locations
The more machines and connections a company
has the harder it is for an effective Dos Attack
Bandwidth Limitations
Limit your bandwith based on protocol
Keep Systems Patched
Run the least amount of services
Windows 2000 server has 100 services
Preventing DoS Attacks
Allow only necessary traffic
Concentrates on your perimeter – mainly
your router and firewall
Make sure that your firewall allows only
necessary traffic in and out of your network
Most routers have firewall rulesets that you
can add to the IOS. Can provide backup and
checking for the firewall and help unload
some filtering from the firewall
Block IP addresses
Preventing DDoS Attacks
Keep the network secure
Install Intrusion Detection System
Networked-based
Host-based
A passive device that sits on the network and sniffs all packets
crossing a given network segment
Looks for signatures that indicate a possible attack and sets off
alarms on questionable behavior
Runs on an individual server and actively reviews the audit log
looking for possible indications of an attack
IDS technologies
Pattern matching – database of signatures of known attacks. Sets
off alarm for a given pattern.
Anomaly detection – determines what is normal for a network and
any traffic that is not normal is flagged as suspicious
Preventing DDoS Attacks
Use scanning tools
Run zombie tools