20
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology ,Institute of Road and Transport Technology, Erode Tamilnadu, India Sathyakala, M Department of Information Technology ,Institute of Road and Transport Technology, Erode Tamilnadu, India Speaker: 101061555 鍾鍾鍾 2012 – International Conference on Emerging Trends in Science, Engineering and Technology 1

Simulation and Analysis of DDos Attacks

Embed Size (px)

DESCRIPTION

Simulation and Analysis of DDos Attacks. 2012 – International Conference on Emerging Trends in Science, Engineering and Technology. Poongothai , M Department of Information Technology ,Institute of Road and Transport Technology, Erode Tamilnadu , India. Sathyakala , M - PowerPoint PPT Presentation

Citation preview

Page 1: Simulation and Analysis of  DDos  Attacks

1

Simulation and Analysis of

DDos Attacks

Poongothai, MDepartment of Information

Technology,Institute of Road and Transport

Technology, Erode Tamilnadu, India

Sathyakala, MDepartment of Information

Technology,Institute of Road and Transport

Technology, Erode Tamilnadu, India

Speaker: 101061555 鍾國君

2012 – International Conference on Emerging Trends in Science, Engineering and Technology

Page 2: Simulation and Analysis of  DDos  Attacks

2

OutlineIntroduction to DDos AttackDDos Attack ArchitectureAdvantages of DDos Attack Four Phase of bot installation DDos Attack MethodsDDos DefensesSimulationConclusion

Page 3: Simulation and Analysis of  DDos  Attacks

3

Intruduction to DDos Attack

Distributed Denial of Service(DDos)◦Overloads the targeted server with

useless traffic, crashes the server and leaves it unable to properly communicate with the legitimate users.

◦Consume mainly the victim’s bandwidth, processing capacity and storage capacity.

◦May need human intervention to resume.

Page 4: Simulation and Analysis of  DDos  Attacks

4

DDos Attack Architecture

Page 5: Simulation and Analysis of  DDos  Attacks

5

Advantages of DDos Attack

Simple◦No sophisticated mechanisms.◦A single hacker can do.

Difficult to trace◦Multi-tiered structure.◦IP source spoofing.

Page 6: Simulation and Analysis of  DDos  Attacks

6

Advantages of DDos Attack

Similar to legitimate traffic◦Attack streams from numerous

machines converge near the victim.

Robust ◦Attacks will continue even if one

node is dead.

Page 7: Simulation and Analysis of  DDos  Attacks

7

Four Phase of Bot Installation

What is Bot?

◦A program that automatically operates as an user or another program.

◦Installed in the internal-node computers called “handlers” or “agents”.

◦Wait for the hacker to initiate the attack remotely.

Page 8: Simulation and Analysis of  DDos  Attacks

8

Four Phase of Bot Installation

1.Scanning◦Installed bots scan lots of computers

for security flaws.

2.Exploitation◦Susceptible hosts are found and compromised hosts are listed.

Page 9: Simulation and Analysis of  DDos  Attacks

9

Four Phase of Bot Installation

3.Deployment◦The “handler software” is installed in

the compromised hosts.

4.Propagation◦Handler then scans for vulnerable

hosts and compromises them, called “agents/Daemon”.

Page 10: Simulation and Analysis of  DDos  Attacks

10

DDos Attack MethodsMethods

◦Smurf Floods Floods the network with ICMP ECHO

requests with the victim’s address, then the victim will filled with ping responses.

◦ICMP Floods The Attacker generates lots of ICMP

ECHO packets directed at the victim. Finally, the victim is busy replying all the ECHO requests.

Page 11: Simulation and Analysis of  DDos  Attacks

11

DDos Attack Methods ◦UDP/TCP Floods

Send a large number of UDP/TCP packets to the victim and tie up the available network bandwidth.

◦TCP SYN Floods Not to give the final ACK packet and

make the victim waste the allocated buffer.

Page 12: Simulation and Analysis of  DDos  Attacks

12

DDos Attack Methods

Page 13: Simulation and Analysis of  DDos  Attacks

13

DDos Attack Methods Dynamics

◦Application attacks◦Protocol attacks◦Operating system attacks◦Host attacks◦Network attacks◦Infrastructure attacks

Page 14: Simulation and Analysis of  DDos  Attacks

14

DDos Defense Classification

◦Preventive Eliminate the vulnerabilities in the

system and prevent the attacker from gaining a group of zombie machines.

◦Survival Increase the victim’s sources for

surviving during the attack.

◦Responsive Control the attack streams from

influencing the victim.

Page 15: Simulation and Analysis of  DDos  Attacks

15

DDos Defense Strategy

◦Agent identification who is attacking?

◦Rate limiting Impose a rate limit on the incoming

streams.

◦Filtering Filter out the attack streams.

◦Reconfiguration Change the topology of the networks near

the victim.

Page 16: Simulation and Analysis of  DDos  Attacks

16

DDos Defense Countermeasures

◦Path isolation Routers isolate traffic path, and this

information can be used to deploy filters on the path.

◦Privileged customer Customers used to communicate with the

server will have the first priority.

Page 17: Simulation and Analysis of  DDos  Attacks

17

DDos Defense ◦Traffic baselining

Filter the traffic when some traffic parameter exceed their expected value.

◦Resource multiplication More resources are deployed to sustain

large attacks.

◦Legitimate traffic inflation Multiply the legitimate traffic.

Page 18: Simulation and Analysis of  DDos  Attacks

18

SimulationThree considerations

◦DDos attack traffic◦Legitimate traffic◦Network topology

Software used - NS2◦Can replicate threats of interests in a

secure environment.

Page 19: Simulation and Analysis of  DDos  Attacks

19

Simulation

Page 20: Simulation and Analysis of  DDos  Attacks

20

ConclusionEvolution in intruder tools will

continue.

Even if the system/network is robust, others may be not. Thus, the security issue still exists.