410 likes | 665 Views
Denial of Service Attacks: Methods, Tools, and Defenses. Prof. Mort Anvari Strayer University at Arlington. Introduction. Basic types of DoS attacks Evolution of DoS tools Overview of DoS tools Defenses. What is Denial of Service Attack?.
E N D
Denial of Service Attacks:Methods, Tools, and Defenses Prof. Mort Anvari Strayer University at Arlington
Introduction • Basic types of DoS attacks • Evolution of DoS tools • Overview of DoS tools • Defenses
What is Denial of Service Attack? • “Attack in which the primary goal is to deny the victim(s) access to a particular resource.” (CERT/CC) • Very vide definition, covers lots of cases • This tutorial covers only subset of all DoS attacks
Modes of Denial of Service Attack • Consumption of limited resources • Network connectivity • Bandwidth consumption • Other resources: • Processing time • Disk space • Lockout of an account • Alteration of configuration information
DoS Attacks - Statistics • There are more than 4000 attacks per week • During 2000, 27% of security professionals detected DoS attack against their system • In February 2000 attacks, stream going to one of affected sites was about 800Mb/s
PPW – Performance in previous week PAW – Performance in attacking week CPW – Change from previous week Source:Keynote Systems DoS Attacks - Statistics Overall Internet performance degradation during February 2000 attacks
DoS Attacks - Basics Prof. Mort Anvari Strayer University at Arlington
DoS Attacks - Basics Attack has two phases: • Installation of DoS tools • Committing an attack
DoS Attacks - Basics Installation of DoS tools: • Finding a suitable machine: • Unprotected ports • Vulnerable services • Errors in operating systems • Trojan horses and worms • Installation of the tool itself • Installation of a root-kit
Ping of Death DoS Attacks - Basics • Maximum size of TCP/IP packet is 65536 bytes • Oversized packet may crash, freeze, reboot system • Obsolete
DoS Attacks - Basics Teardrop • IPpacket can be broken • Broken packet is reassembled using offset fields
DoS Attacks Basics Teardrop • Overlapping offset fields • Obsolete
Client SYNACK Server SYN ACK DoS Attacks - Basics Syn flood attack TCP Syn handshake • Finite length of backlog queue • Lots of half-open connections • Partially solved
chargen SpoofedRequest echo Victim Victim Attacker DoS Attacks - Basics UDP flood • UDP echo service • UDP chargen service • Spoofed address • Easy prevention • Brute force approach if this one doesn’t work
Attacker IntermediateSystems Victim DoS Attacks - Basics Smurf attack • ICMP packets • Broadcast request • Spoofed address • Two victims • Cannot be easily prevented
Evolution of DoS Attacks • Defenses were improved • Technology was improved, as well • Attackers had to improve their techniques for attacks
Intermediate Attacker Victim ICMP Reply Bad packet Evolution of DoS Attacks • Packet processing rate is more limiting than bandwidth • CPU can be a limit in SYN flood attack • “Reflected” attacks
(R)evolution of DoS Attacks Distributed DoS tools and networks • Client-Server architecture • Open-source approach • Several layers • Difficulties in tracking back the attacker
Evolution of DoS Attacks • All of the systems are compromised • Terminology: • Client • Handler • Agent
Evolution of DoS Attacks Implications of DDoS network: • One or two attackers • Small number of clients • Several handlers • Huge number of agents • Humongous traffic
DoS Attacks - Tools Prof. Mort Anvari Strayer University at Arlington
DoS Attacks - Tools History of DoS tools: • IRC disable tools • Single attack method tools • Distributed tools, with possibility of selecting the type of attack
DoS Attacks - Tools Trinoo • Distributed • UDP flood (brute force) • Menu operated • Agent passwords are sent in plain text form (not encrypted)
DoS Attacks - Tools TFN (Tribal Flood Network) • Multi-type attack • UDP flood • SYN flood • ICMP_ECHOREPLY flood • Smurf • Handler keeps track of its agents in “Blowfish” encrypted file
DoS Attacks - Tools TFN2K • Improved version of TFN • Agent can randomly alternate between the types of attack • Agent is completely silent - handler sends the same command several times, hoping that agent will receive at least one)
DoS Attacks - Tools TFN2K • All communication is encrypted • Random source IP address and port number • Decoy packets (sent to non-target networks)
DoS Attacks - Tools Stacheldraht • Several levels of protection: • Hard-coded password in client • Password is needed to take control over handler • Encrypted communication between handler and agent
DoS Attacks - Tools Stacheldraht • Automated update of agents • TCP is used for communication between client and handler, and ICMP_ECHOREPLY for communication between handler and agent
DoS Attacks - Tools Stacheldraht • ICMP_ECHOREPLY packets are difficult to stop • Each agent has a list of its handlers (Blowfish encrypted) and in case that there is no such list, agent uses several hard-coded IP addresses • Agent tests for a possibility of spoofing the source address
DoS Attacks - Tools Stacheldraht • Weakness: it uses rpc command for update • Listening on this port can lead to detection of an agent. • Drawback is in fact that this can generate a lot of false alarms (rpc is used by legitimate users too)
Defenses • There is no universal solution • There are some preventions that can help in minimizing the damage: • Prevention of becoming the source of an attack • Preparations for defending against an attack
Defenses • Disable and filter out chargen and echo services • Disable and filter out all unused UDP services. • Good practice is to block all UDP ports below 900 (excluding some specific ports like DNS)
Defenses • Install a filtering router to disable following cases: • Do not allow packet to pass through if it is coming to your network and has a source address from your network • Do not allow packet to pass through if it comes from your network and has a source address that doesn’t belong to your network
Defenses • Network administrators should log all information on packets that are dropped • If you are providing external UDP services, monitor them for signs of misuse
Defenses • The following networks are defined as reserved private networks, and no traffic should ever be received from or transmitted to these networks through a router: • 10.0.0.0 to 10.255.255.255 (reserved) • 127.0.0.0 to 127.255.255.255 (loopback) • 172.16.0.0 to 172.31.255.255 (reserved) • 192.168.0.0 to 192.168.255.255 (reserved) • 0.0.0.0 and 255.255.255.255 (broadcasts)
Defenses • Routers, machines, and all other Internet accessible equipment should be periodically checked to verify that all security patches have been installed • System should be checked periodically for presence of malicious software (Trojan horses, viruses, worms, root-kits, back doors, etc.)
Defenses • Train your system and network administrators • Read security bulletins like: www.cert.org, www.sans.org, www.eEye.com • From time to time listen on to attacker community to be informed about their latest achievements • Be in contact with your ISP. In case that your network is being attacked, this can save a lot of time
Conclusion • Several examples of large scale DoS attacks (yahoo, eBuy, CERT, FBI, Amazon) • Increased number of consumers with high bandwidth technologies, but with poor knowledge of network security • Easy accessible, easy to use DoS attack tools • No final solution for attacks
This tutorial is based on research paper done for isitworking.com • Isitworking is part of Biopop company, Charlotte, NC, USA • So far, it was presented on: • SSGRR 2002w, L’Aquila, Italy • YU-INFO 2002, Kopaonik, Serbia
Denial of Service Attacks:Methods, Tools, and Defenses Prof. Mort Anvari Strayer University at Arlington