Lecture 4: Denial of Service Flashcards

1
Q

Describe how an “ICPM (ping) flood” works, and some ways in which it can be prevented

A
  • High volumes of ping requests are sent to a device
  • Device will attempt to respond to requests by sending a message
  • The high volume of back and forth traffic might make the device inaccessible to other devices
  • Can be prevented by either disabling ping functionality, or
  • Limiting the amount and/or size of request packages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are two variations of the ICMP flood?

A
  • DDoS, where a distributed network is used to send requests

- Source address spoofing, to hide the identity of attacker. This also avoids back traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three different kinds of flooding attacks

A
  • ICMP flood
  • UDP flood
  • TCP SYN flood
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain how TCP SYN spoofing works

A
  • Attack ability of server to respond to future connection requests
  • Overflowing tables used to manage them
  • Possible even if attacker has small bandwidth
  • Time-out connections, meaning:
    • Send SYN
    • Let server respond SYN- ACK
    • Do not return ACK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain what DDoS is, why it’s used, and some ways of creating such attacks

A
  • Have limited volume if single source is used
  • Multiple systems allow much higher traffic volumes
  • Often uses compromised PCs/workstations
    • Zombies/bots with backdoor programs installed
    • Forming a botned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain what a “Reflection attack” is, and how it’s done

A
  1. Attacker initiates connection with target
  2. Target attempts to authenticate attacker by sending challenge
  3. Attacker opens another connection to target, and “reflects” the challenge as its own
  4. The target responds to the challenge
  5. Attacker sends that response back to the target on the original connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give an example of DOS over email, and how to defend against it

A
  • If A and B have set vacation messages
  • Send message to A with B as sender
  • A will respond to B, who in turn will respond to A
  • The loop continues
  • To defend, keep track of auto-generated mails and use auto-submitted tag
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give two examples of ways in which email filters can be attacked

A

Infinite recursive zip:
- A malicious archive that takes exorbitant time to unpack, effectively disabling virus protection software
Bombs (e..g non-recursive files)
- Archives that increase massively in size when unpacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain what an “XML bomb” is

A

It’s an DOS attack where the XML entities are recursively defined, giving and exponential size increase when parsed. E.g., a 1 KB file could become 3GB XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give an example of a “Fork bomb”, and how it works

A
  • PostgreSQL 7.2
  • Uses elapsed milliseconds to compute number of threads to spawn
  • No limit check
  • If date is advanced, e.g. to next year, a large number of threads will be spawned
  • “Network time protocol attack”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain how a “Slowloris” attack works

A
  • Open TCP connection
  • Infinitely (and slowly) send HTTP headers
  • Consume the thread pool and connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give examples of involuntary and voluntary WEB DOS

A
Involuntary: 
- Slashdotted
- Distributed flood (spiders)
Voluntary:
- Target supporting services, e.g. DNS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the three lines of defence against (D)DOS

A
  • Attack prevention and preemption
  • Attack detection and filtering
  • Attack source traceback and identification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give examples of general measures in order to prevent DOS

A
  • Block external requests to broadcasts
  • Block suspicious services (e.g. Echo)
  • Block suspicious combinations (DNS to echo port)
  • Manage application attacks with puzzles to distinguish legitimate human requests
  • Good general system security practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give one example of a measure that can be implemented to protect against flood attacks

A

Rate controls in upstream.

  • On specific packet types
  • E.g., some ICMP, some UDP, TCP/SYN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Give one example of how to protect against TCP/SYN spoof

A

Use modified connection handling

  • Use SYN cookies when table full, or
  • Selective or random drop when table is full
17
Q

Give some examples of some suitable responses to a DOS attack

A

Identify type of attack:
- Capture and analyse packets
- Design filters to block attack traffic upstream, or
- Identify and correct system/application bug
Have ISP trace packet flow back to source:
- Maybe difficult and time consuming
- Necessary if legal action desired