DDos Flashcards

1
Q

DoS

A

malicious consumption / exhaustion of resources

  • Volumetric attacks: cause congestion within or between target network and rest of the world
  • Protocol attacks: exhaust resources available on the target.
  • Application layer attack: target aspects of application layer, can be stealthy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Session State Exhaustion

A
  • each communication channel between two parties has session state number
  • attack: exhaust the session state table of the server
  • > server can’t accept any new connection
  • > might crash
  • > drop existing connections
    mitigation: encode state in a unique but determined way that allows the server to validate the state in the replay instead of keeping state table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SYN Flood Attack

A

Session state exhaustion attack

  1. SYN flood with spoofed source address
  2. server tries to keep state, eventually table overflows
    - > server unable to accept any leg. connections
    mitigation: server sends SYN cookie instead of keeping state
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP Spoofing defense

A
  • Ingress filtering: Gateway router drops packet with invalid scr ip. Problem: no deployment incentive
  • iTrace: 1 in 20’000 packets triggers router to send route information.
    +DDoS victim can reconstruct attack path
    -extra packet increases traffic
  • Packet marking: mark id field with info that enables reconstruction of IP address, needs ca 1000 packets for probabilistic marking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shrew attacks

A

achieve DoS with low bandwidth

  • Temporal lensing
  • TCP congestion control attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DDoS Defence

A
  • IP ingress filtering
  • computational puzzles
  • IP traceback
  • Network controll
  • Cloud or ISP based filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud & ISP based mitigation

A

Cloud based:
- service provider acts as man in the middle
- change bgp or DNS to redirect traffic to service provider
ISSUE: Can easily be bypassed if victims IP is known

ISP based:

  • traffic is redirected to scrubbing center of ISP
  • ISP inspects traffic and sends good traffic back to victim

ISSUES:

  • privacy issue
  • high cost
How well did you know this?
1
Not at all
2
3
4
5
Perfectly