Chapter 7 Flashcards
DoS attacks
Denial of service attack
action preventing authorized use of networks /systems/applications by exhausting resources
categories of resources
- network bandwidth - capacity of network links connecting server to internet
- system resource - aims to overload network handling software
- application resource - involves number of valid requests - each consumes significant resources - limit ability of server to respond to requests from other user
types of attacks
- flooding ping command - overwhelm capacity of network connection to target organizations
- SYN spoofing - attack ability of server to respond to new connection request by overflowing tables used to manage them
- flooding attacks - based on network protocol classified (ICMP flood - ICMP echo requests, UDP flood - UDP packet to port number, TCP SYN flood - TCP packets to target - total number of packets = aim of attack rather than system code)
DDos
multiple systems to generate attack- botnet
HTTP attack
- HTTP flood - bombard web servers with HTTP requests
- slowlorris - attempt to monopolize all available request handling threads on web server by sending HTTP requests that never complete
Reflection attacks
attacker sends packets to known service on intermediary with spoofed source address of actual target system
backscatter traffic
advertise routers to unused IP addresses to monitor attack traffic
DNS amplification attacks
use packets directed at legitimate DNS server as intermediary system- attacker create series of DNS requests containing spoofed source address of target system
basic defence
prevent use of spoofed source address
Dos attack defence prevention + pre-emption
- block spoofed source addresses
- filter applied before leaving ISP to check claimed source address
- use modified TCP connection handling code (encode critical info in cookie , responds with ACK packet containing inc sequence number cookie), drop entry for incomplete TCP connections when table overflows
- block IP directed broadcasts
- block suspicious services + combinations
- manage application attacks with from of graphical puzzle
- good general system security practices
- use mirrored + replicated servers when high performance
responding to Dos attacks
anti-spoofing , rate-limiting
1. identify type of attack - capture packets
2. have ISP trace packet flow back to source - for legal action
3. implement contingency plans - switch server
4. update incident response plan
good incidence response plan
- details on how to contact technical personnel for ISP
- impose traffic upstream
- details on how to respond to attack