230 likes | 402 Views
Simulation and Analysis of DDos Attacks. 2012 – International Conference on Emerging Trends in Science, Engineering and Technology. Poongothai , M Department of Information Technology ,Institute of Road and Transport Technology, Erode Tamilnadu , India. Sathyakala , M
E N D
Simulation and Analysis of DDos Attacks 2012 – International Conference on Emerging Trends in Science, Engineering and Technology Poongothai, M Department of Information Technology ,Institute of Road and Transport Technology, ErodeTamilnadu, India Sathyakala, M Department of Information Technology ,Institute of Road and Transport Technology, ErodeTamilnadu, India Speaker:101061555鍾國君
Outline • Introduction to DDos Attack • DDos Attack Architecture • Advantages of DDos Attack • Four Phase of bot installation • DDos Attack Methods • DDos Defenses • Simulation • Conclusion
Intruduction to DDos Attack • Distributed Denial of Service(DDos) • Overloads the targeted server with useless traffic, crashes the server and leaves it unable to properly communicate with the legitimate users. • Consume mainly the victim’s bandwidth, processing capacity and storage capacity. • May need human intervention to resume.
Advantages of DDos Attack • Simple • No sophisticated mechanisms. • A single hacker can do. • Difficult to trace • Multi-tiered structure. • IP source spoofing.
Advantages of DDos Attack • Similar to legitimate traffic • Attack streams from numerous machines converge near the victim. • Robust • Attacks will continue even if one node is dead.
Four Phase of Bot Installation • What is Bot? • A program that automatically operates as an user or another program. • Installed in the internal-node computers called “handlers” or “agents”. • Wait for the hacker to initiate the attack remotely.
Four Phase of Bot Installation • 1.Scanning • Installed bots scan lots of computers for security flaws. • 2.Exploitation • Susceptible hosts are found and compromised hosts are listed.
Four Phase of Bot Installation • 3.Deployment • The “handler software” is installed in the compromised hosts. • 4.Propagation • Handler then scans for vulnerable hosts and compromises them, called “agents/Daemon”.
DDos Attack Methods • Methods • Smurf Floods • Floods the network with ICMP ECHO requests with the victim’s address, then the victim will filled with ping responses. • ICMP Floods • The Attacker generates lots of ICMP ECHO packets directed at the victim. Finally, the victim is busy replying all the ECHO requests.
DDos Attack Methods • UDP/TCP Floods • Send a large number of UDP/TCP packets to the victim and tie up the available network bandwidth. • TCP SYN Floods • Not to give the final ACK packet and make the victim waste the allocated buffer.
DDos Attack Methods • Dynamics • Application attacks • Protocol attacks • Operating system attacks • Host attacks • Network attacks • Infrastructure attacks
DDos Defense • Classification • Preventive • Eliminate the vulnerabilities in the system and prevent the attacker from gaining a group of zombie machines. • Survival • Increase the victim’s sources for surviving during the attack. • Responsive • Control the attack streams from influencing the victim.
DDos Defense • Strategy • Agent identification • who is attacking? • Rate limiting • Impose a rate limit on the incoming streams. • Filtering • Filter out the attack streams. • Reconfiguration • Change the topology of the networks near the victim.
DDos Defense • Countermeasures • Path isolation • Routers isolate traffic path, and this information can be used to deploy filters on the path. • Privileged customer • Customers used to communicate with the server will have the first priority.
DDos Defense • Traffic baselining • Filter the traffic when some traffic parameter exceed their expected value. • Resource multiplication • More resources are deployed to sustain large attacks. • Legitimate traffic inflation • Multiply the legitimate traffic.
Simulation • Three considerations • DDos attack traffic • Legitimate traffic • Network topology • Software used - NS2 • Can replicate threats of interests in a secure environment.
Conclusion • Evolution in intruder tools will continue. • Even if the system/network is robust, others may be not. Thus, the security issue still exists.