11.3 DoS Attacks Flashcards
Denial of Service
Attempts to exhaust resources such as:
Network bandwidth
TCP connections
Server resources
Defenses to DoS
- Ingress Filtering
- uRPF checks
3, Syn Cookies (TCP)
Ingress filtering
Fool proof, works at edges
but doesn’t work in core
look at this thing, does it direct to this thing? no? drop it
uRPF
if we see a packet with a particular source ip address on incoming interface that is different than where we would sent the packet in the reverse direction, DROP PACKET
benefits/downfalls of urpf
Benefits: automatic
Downfall: requires symmetric routing
Syn Cookies problem they solve
Process of TCP handshake is Syn->Syn-ack->ack->ack.
After the syn is sent, the recipient allocates buffer space regardless of what happens with the syn-ack
syn cookies
no buffers allowed after server receives syn
picks initial sequence number thats a function of srcIP, srcPort, dstIP, dstPort, and rand.
An honest sender can reply with the same sequence number which the server can check
Allocate buffer space
infer Denial of Service activity using Backscatter
when an attacker spoofs an ip address, the replies to that initial TCP SYN from the victim will go to the location of the source ip address.
backscatter calculations
if we monitor n IP Addresses
see m attack packets
expect to see (n/2^32)*m of the total back scatter packets and hence the total attack rate
computer total rate for backscatter
invert the fraction
m = x*(2^32/n)
where x is observed attack rate
n is the /8 rate. so telescope/8 = 2^24