1 / 88

Chapter 7

Chapter 7. Denial-of-Service-Attacks. Denial-0f-Service ( DoS ) Attack. The NIST Computer Security Incident Handling Guide defines a DoS attack as:

agnes
Télécharger la présentation

Chapter 7

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 7 Denial-of-Service-Attacks

  2. Denial-0f-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space.”

  3. Denial-of-Service (DoS) • a form of attack on the availability of some service • categories of resources that could be attacked are:

  4. Classic Denial-of-Service Attacks • flooding ping command • aim of this attack is to overwhelm the capacity of the network connection to the target organization • traffic can be handled by higher capacity links on the path, but packets are discarded as capacity decreases • source of the attack is clearly identified unless a spoofed address is used • network performance is noticeably affected

  5. Source Address Spoofing • use forged source addresses • usually via the raw socket interface on operating systems • makes attacking systems harder to identify • attacker generates large volumes of packets that have the target system as the destination address • congestion would result in the router connected to the final, lower capacity link • requires network engineers to specifically query flow information from their routers • backscatter traffic • advertise routes to unused IP addresses to monitor attack traffic

  6. SYN Spoofing • common DoS attack • attacks the ability of a server to respond to future connection requests by overflowing the tables used to manage them • thus legitimate users are denied access to the server • hence an attack on system resources, specifically the network handling code in the operating system

  7. TCP Connection Handshake

  8. TCP SYN Spoofing Attack

  9. Flooding Attacks • classified based on network protocol used • intent is to overload the network capacity on some link to a server • virtually any type of network packet can be used

  10. Distributed Denial of Service DDoS Attacks

  11. DDoS Attack Architecture

  12. Session Initiation Protocol (SIP) Flood standard protocol for VoIP telephony text-based protocol with a syntax similar to that of HTTP two types of SIP messages: requests and responses

  13. Hypertext Transfer Protocol (HTTP) Based Attacks HTTP flood Slowloris attempts to monopolize by sending HTTP requests that never complete eventually consumes Web server’s connection capacity utilizes legitimate HTTP traffic existing intrusion detection and prevention solutions that rely on signatures to detect attacks will generally not recognize Slowloris • attack that bombards Web servers with HTTP requests • consumes considerable resources • spidering • bots starting from a given HTTP link and following all links on the provided Web site in a recursive way

  14. Reflection Attacks • attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system • when intermediary responds, the response is sent to the target • “reflects” the attack off the intermediary (reflector) • goal is to generate enough volumes of packets to flood the link to the target system without alerting the intermediary • the basic defense against these attacks is blocking spoofed-source packets

  15. DNS Reflection Attacks

  16. Amplification Attacks

  17. DNS Amplification Attacks • use packets directed at a legitimate DNS server as the intermediary system • attacker creates a series of DNS requests containing the spoofed source address of the target system • exploit DNS behavior to convert a small request to a much larger response (amplification) • target is flooded with responses • basic defense against this attack is to prevent the use of spoofed source addresses

  18. DoS Attack Defenses four lines of defense against DDoS attacks • these attacks cannot be prevented entirely • high traffic volumes may be legitimate • high publicity about a specific site • activity on a very popular site • described as slashdotted, flash crowd, or flash event

  19. DoS Attack Prevention • block spoofed source addresses • on routers as close to source as possible • filters may be used to ensure path back to the claimed source address is the one being used by the current packet • filters must be applied to traffic before it leaves the ISP’s network or at the point of entry to their network • use modified TCP connection handling code • cryptographically encode critical information in a cookie that is sent as the server’s initial sequence number • legitimate client responds with an ACK packet containing the incremented sequence number cookie • drop an entry for an incomplete connection from the TCP connections table when it overflows

  20. DoS Attack Prevention • block IP directed broadcasts • block suspicious services and combinations • manage application attacks with a form of graphical puzzle (captcha) to distinguish legitimate human requests • good general system security practices • use mirrored and replicated servers when high-performance and reliability is required

  21. Responding to DoS Attacks • antispoofing, directed broadcast, and rate limiting filters should have been implemented • ideally have network monitors and IDS to detect and notify abnormal traffic patterns

  22. Responding to DoS Attacks • identify type of attack • capture and analyze packets • design filters to block attack traffic upstream • or identify and correct system/application bug • have ISP trace packet flow back to source • may be difficult and time consuming • necessary if planning legal action • implement contingency plan • switch to alternate backup servers • commission new servers at a new site with new addresses • update incident response plan • analyze the attack and the response for future handling

  23. Chapter 7 Summary • denial-of-service (DoS) attacks • network bandwidth • system resources • application resources • overwhelm capacity of network • forged source addresses (spoofing) • SYN spoofing/TCP connection requests • flooding attacks • ICMP flood • UDP flood • TCP SYN flood • distributed denial-of-service attacks (DDoS) • reflection attacks • amplification attacks • DNS amplification attacks • application-based bandwidth attacks • SIP flood • HTTP-based attacks • defenses against DoS attacks • responding to a DoS attack

  24. Chapter 8 Intrusion Detection

  25. Intruders • two most publicized threats to security are malware and intruders • generally referred to as a hacker or cracker • classes:

  26. Examples of Intrusion • remote root compromise • web server defacement • guessing / cracking passwords • copying databases containing credit card numbers • viewing sensitive data without authorization • running a packet sniffer • distributing pirated software • using an unsecured modem to access internal network • impersonating an executive to get information • using an unattended workstation

  27. Hackers • motivated by thrill of access and/or status • hacking community is a strong meritocracy • status is determined by level of competence • benign intruders consume resources and slow performance for legitimate users • intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are designed to help counter hacker threats • can restrict remote logons to specific IP addresses • can use virtual private network technology (VPN) • intruder problem led to establishment of computer emergency response teams (CERTs)

  28. Hacker Patterns of Behavior

  29. Criminals • organized groups of hackers now a threat • corporation / government / loosely affiliated gangs • typically young • often Eastern European, Russian, or southeast Asian hackers • meet in underground forums • common target is credit card files on e-commerce servers • criminal hackers usually have specific targets • once penetrated act quickly and get out • IDS / IPS can be used but less effective • sensitive data should be encrypted

  30. Criminal EnterprisePatterns of Behavior

  31. Insider Attacks • among most difficult to detect and prevent • employees have access and systems knowledge • may be motivated by revenge/entitlement • employment was terminated • taking customer data when moving to a competitor • IDS / IPS can be useful but also need: • enforcement of least privilege, monitor logs, strong authentication, termination process

  32. Internal ThreatPatterns of Behavior

  33. The following definitions from RFC 2828 (Internet Security Glossary) are relevant to our discussion: Security Intrusion: A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system (or system resource) without having authorization to do so. Intrusion Detection : A security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner.

  34. Intrusion Detection Systems (IDSs) host-based IDS monitors the characteristics of a single host for suspicious activity network-based IDS monitors network traffic and analyzes network, transport, and application protocols to identify suspicious activity

  35. IDS Principles assume intruder behavior differs from legitimate users overlap in behaviors causes problems false positives false negatives

  36. IDS Requirements

  37. Host-Based IDS • adds a specialized layer of security software to vulnerable or sensitive systems • monitors activity to detect suspicious behavior • primary purpose is to detect intrusions, log suspicious events, and send alerts • can detect both external and internal intrusions

  38. Host-Based IDS Approaches to Intrusion Detection anomaly detection signature detection involves an attempt to define a set of rules or attack patterns that can be used to decide that a given behavior is that of an intruder • threshold detection • involves counting the number of occurrences of a specific event type over an interval of time • profile based • profile of the activity of each user is developed and used to detect changes in the behavior of individual accounts

  39. Audit Records

  40. Table 8.2 Measures That May Be Used For Intrusion Detection

  41. Signature Detection • rule-based anomaly detection • historical audit records are analyzed to identify usage patterns • rules are generated that describe those patterns • current behavior is matched against the set of rules • does not require knowledge of security vulnerabilities within the system • a large database of rules is needed • rule-based penetration identification • key feature is the use of rules for identifying known penetrations or penetrations that would exploit known weaknesses • rules can also be defined that identify suspicious behavior • typically rules are specific to the machine and operating system

  42. Table 8.3USTAT Actions vs. SunOS Event Types

  43. Distributed Host-Based IDS

  44. Distributed Host-Based IDS

  45. Network-Based IDS (NIDS)

  46. NIDS Sensor Deployment inline sensor inserted into a network segment so that the traffic that it is monitoring must pass through the sensor passive sensors monitors a copy of network traffic

  47. Intrusion Detection Techniques • signature detection • at application, transport, network layers; unexpected application services, policy violations • anomaly detection • denial of service attacks, scanning, worms • when a sensor detects a potential violation it sends an alert and logs information related to the event • used by analysis module to refine intrusion detection parameters and algorithms • security administration can use this information to design prevention techniques

More Related