Denial of Service

au
Last updated 6 months ago

Objectives: Overview of DOS attacks and DDoS attacks, understanding the techniques of DoS/DDoS Attack Techniques, Understanding the Botnet Network, Understanding Various DoS and DDoS attack tools, DoS/DDoS countermeasures, Overview of DoS attack penetration testing

DoS/DDoS Concepts

  • Denial of Service (DoS) is an attack on a computer or network that reduces, restricts or prevents accessibility of system resource to its legitimate users

  • Attackers flood a victim system with non-legitimate service requests

  • DDoS attack involves a multitude of compromised systems attacking a single targeted system (botnet)

DoS/DDoS Attack Techniques

  • Basic categories of the attacks

    • Volumetric Attacks: consumes the bandwidth of the target network or service

    • Fragmentation: overwhelms target’s ability of reassembling fragmented packets

    • TCP state-exhaustion attack: consumes connection state table present such as load balancers ,firewalls, app servers

    • Application layer attack: consumes app resources or service making it unavailable to other legitimate users

    • SYN Attack

      • Attacker sends a large number of SYN request to target server

      • Target machine sends back a SYN ACK in response to the request waiting for the ACK to complete session

      • Attacker never sends ack

    • ICMP flood attack: type of DoS where perpetrators send a large number of ICMP packets causing the system to stop responding to legitimate TCP/IP requests

      • To protect yourself: set a threshold limit that invokes a ICMP protection feature

    • Peer to Peer Attack: attackers instruct clients of p2p file sharing hubs to disconnect for their p2p network and connect to victims fake website. Attackers can launch massive DoS attacks and compromise websites

    • Permanent Denial-of-Service Attack: Also known as phlashing, refers to attacks that cause irreversible damage to system hardware

      • Unlike other DoS attacks,, it sabotages the system hardware

    • Application-Level Flood Attack: Application-level flood attacks results in the loss of services

      • Using this attack , attackers exploit weaknesses in programming source code to prevent in the application from processing legitimate requests

    • Distributed Reflection Denial of Service (DRDoS)

      • Also known as a spoofed attack, involves the use of multiple intermediary and secondary machines that contribute to the actual DDoS attack against the target machine or application

Botnets

  • Bots are software applications that run-automated tasks over the internet

  • A botnet is a huge network of compromised systems and can be used by an attacker to launch a DoS attack

  • Scanning Methods for Finding Vulnerable Machines: Random Scanning, Hit-list scanning, topological scanning, local subnet scanning, permutation scanning

  • DoS and DDoS attack tools

  • LOIC, GoldenEye

Countermeasures

  • Techniques

    • Activity Profiling

      • Increases in activity levels, distinct clusters, average packet rate etc

    • Changepoint detection

      • Filters network traffic by IP addresses, targeted port numbers, stores traffic flow data in a graph that shows the traffic flow rate vs time

    • Wavelet-based signal analysis

      • Analyzes network traffic in terms of spectral components. Divides incoming signal into various frequencies for analyzation

  • DoS/DDoS countermeasure strategies

    • Absorbing the attack (requiring additional resources)

    • Degrading services (identify critical services and stop non-critical)

    • Shutting down the services

    • Deflect Attacks: Honeypots act as an enticement for an attacker. Serve as a means for gaining information about attackers, stores their activities

    • Ingress filtering: protects from flooding attacks. Enables originator be traced to its true source

    • Egress Filtering: scanning packet headers of IP address leaving a network. Ensures unauthorized or malicious traffic never leaves the internal network

    • Mitigate Attack: Load balancing, throttling

  • Post-Attack Forensics

    • Analyze traffic patterns for new filtering techniques, analyze router, firewall, and IDS logs , can update load-balancing and throttling countermeasures