Lecture7 - Denial of Service PDF
Lecture7 - Denial of Service PDF
Denial-of-Service Attacks
1
Denial-0f-Service (DoS) Attack
2
Denial-of-Service (DoS)
application
network bandwidth system resources
resources
relates to the capacity of the
network links connecting a typically involves a number
server to the Internet of valid requests, each of
which consumes significant
aims to overload or crash the
resources, thus limiting the
network handling software
ability of the server to
for most organizations this is respond to requests from
their connection to their other users
Internet Service Provider (ISP)
3
4
Classic Denial-of-Service Attacks
5
Source Address Spoofing
8
TCP SYN
Spoofing Attack
9
Flooding Attacks
classified based on network protocol used
intent is to overload the network capacity on some link to a server
virtually any type of network packet can be used
UDP flood • uses UDP packets directed to some port number on the target
system
11
DDoS Attack Architecture
12
Session Initiation Protocol (SIP) Flood
standard protocol for VoIP telephony
14
Reflection Attacks
17
Amplification Attacks
18
DNS Amplification Attacks
attack reaction
• after the attack
20
DoS Attack Prevention
block spoofed source addresses
on routers as close to source as possible
filters may be used to ensure path back to the claimed source
address is the one being used by the current packet
filters must be applied to traffic before it leaves the ISP’s
network or at the point of entry to their network
use modified TCP connection handling code
cryptographically encode critical information in a cookie that
is sent as the server’s initial sequence number
legitimate client responds with an ACK packet containing the
incremented sequence number cookie
drop an entry for an incomplete connection from the TCP
connections table when it overflows
21
DoS Attack Prevention