CH3
CH3
syn/ack pkts
y= server seq#
x= client seq#
SYN spoofing attack
13
Distributed DoS attacks
• Have limited volume if single source used
• Multiple systems allow much higher traffic volumes to
form a distributed DoS (DDoS) attack
• Often compromised PC’s/workstations
• Zombies with backdoor programs installed
• Forming a botnet
• Example: Tribe Flood Network (TFN), TFN2K
• did ICMP, SYN, UDPF and ICMP floods
DDoS control hierarchy
Attacker sends one command to the handler zombies;
the handler forwards to other handlers, agents
Application-based bandwidth attacks
• Force the victim system to execute resource-consuming operations
(e.g., searches, complex DB queries)
• VoIP Session Initiation Protocol (SIP) flood (see Figure 7.5): attacker
sends many INVITE requests; major burden on the proxies
• server resources depleted while handling requests
• bandwidth capacity is consumed
16
SIP invite
scenario
• Standard protocol for
VoIP telephony
• Text-based protocol
with a syntax similar to
that of HTTP
• Two types of SIP
messages: requests
and responses
HTTP-based attacks
• Attempts to monopolize by sending HTTP requests that never
complete
• Eventually consumes Web server’s connection capacity
• Utilizes legitimate HTTP traffic
• Spidering: Bots starting from a given HTTP link and following all links
on the provided Web site in a recursive way
• Existing intrusion detection and prevention solutions that rely on
signatures to detect attacks will generally not recognize Slowloris
Reflection attacks
• Attacker sends packets to a known service on the
intermediary with a spoofed source address of the actual
target system
• When intermediary responds, the response is sent to the
target
• “Reflects” the attack off the intermediary (reflector)
• Goal is to generate enough volumes of packets to flood the
link to the target system without alerting the intermediary
• The basic defense against these attacks is blocking
spoofed-source packets
Reflection attacks
Reflection attacks
• Further variation creates a self-contained loop between
intermediary and target (attacker spoofs using port 7
requiring echoes)
• Fairly easy to filter and block
DNS reflection attacks
DNS amplification attacks
• Use packets directed at a legitimate DNS server as the
intermediary system
• Attacker creates a series of DNS requests containing the
spoofed source address of the target system
• Exploit DNS behavior to convert a small request to a much
larger response (amplification)
• Target is flooded with responses
• Basic defense against this attack is to prevent the use of
spoofed source addresses
Amplification attacks
24
Four lines of defense against DDoS attacks
• Attack prevention and preemption (before attack)
• Attack detection and filtering (during the attack)
• Attack source traceback and identification (uring and after the attack)
• Attack reaction (after the attack)
DoS attack prevention
• Block spoofed source addresses
• On routers as close to source as possible
• Filters may be used to ensure path back to the claimed source address is
the one being used by the current packet
• Filters must be applied to traffic before it leaves the ISP’s network or at the point of
entry to their network
• Use modified TCP connection handling code
• Cryptographically encode critical information in a cookie that is sent as the server’s
initial sequence number
• Legitimate client responds with an ACK packet containing the incremented sequence
number cookie
• Drop an entry for an incomplete connection from the TCP connections table when it
overflows
Attack prevention
• Rate controls in upstream distribution nets
• On specific packets types e.g. some ICMP, some UDP, TCP/SYN
• Impose limits
• Use modified TCP connection handling
• Server sends SYN cookies when table full (reconstruct table data
from the cookie from legit clients)
• Sr selective or random drop when table full
Attack prevention
• Block IP directed broadcasts
• Block suspicious services and combinations
• Manage application attacks with a form of graphical puzzle
(captcha) to distinguish legitimate human requests
• Use mirrored and replicated servers when high-
performance and reliability is required
Responding to attacks
• Good incidence response plan
• Details on how to contact technical personal for ISP
• Needed to impose traffic filtering upstream
• Details of how to respond to the attack
• Implement anti-spoofing, directed broadcast, and rate limiting filters
• Ideally have network monitors and IDS to detect and notify abnormal
traffic patterns
Responding to attacks
• Identify type of attack
• Capture and analyze packets
• Design filters to block attack traffic upstream
• Or identify and correct system/application bug
• Have ISP trace packet flow back to source
• May be difficult and time consuming
• Necessary if planning legal action
• Implement contingency plan
• Switch to alternate backup servers
• Commission new servers at a new site with new addresses
• Update incident response plan
Summary
• Introduced denial of service (DoS) attacks
• Classic flooding and SYN spoofing attacks
• ICMP, UDP, TCP SYN floods
• Distributed denial of service (DDoS) attacks
• Reflection and amplification attacks
• Defenses against DoS attacks
• Responding to DoS attacks