Anil Antony Semester 8 Electronics and Communication Engineering

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 35

ANIL ANTONY

SEMESTER 8
ELECTRONICS AND
COMMUNICATION ENGINEERING
DDoS - Introduction
Although the Internet has made our life simpler the virtual
world is not as safe as we think it is.


Attacks to privacy , property or data can happen at any
time to anyone

DDoS is one such fearful attack which targets mainly those
companies or institutions which uses online services for
their customers

Some of the infamous DDoS attacks include
the in February 2000, Yahoo! Experienced one of the
first major DDoS flooding attacks that kept the
companys services off the Internet for about 2 hours
incurring a significant loss in advertising revenue
the attacks against major government news media and
financial websites in South Korea and the United
States in July 2009
the DDoS flooding attacks on organizations such as
Mastercard.com, PayPal, Visa.com orchestrated by a
group calling themselves Anonymous on December
2010,

What is DDOS ?
The concept of DDoS can be explained using an
example as follows.

Phases in a DDoS attack
STEP 1 :
Recruiting of slave/zombie machines
e.g. : using pirated softwares , unknown links ,
untrusted sites etc.
When a computer has become a zombie it has the code to
infect other computers to which it is connected
STEP 2 :
discovering the vulnerability of the target (using
small scale attacks before the actual attack)
This is done to check whether the target has taken any
precautionary measures or not.


STEP 3 :
Sending the attack instructions to the slaves
This is usually done using IRC or Internet Relay Chats
or by other forms of communication between the attacker ie
maker of the botnet and the virus which is present in a zombie
computer.
STEP 4 :
ATTACK
On getting the instruction to attack all the zombie
computers starts sending messages simultaneously
and continuously to the target server.The server tries
to reply to all requests but after sometime server gets
overpowered and it crashes.


AFTEREFFECT
After a websites server has been hit by a DDoS attack
all the other legitimate user who want to use the
website are denied access to it and they see a timeout
error as follws.



Why DDoS attacks done?
Some of the reasons for a DDoS attack are:
Financial/economical gain
Hackers in this case are hired by one company to attack
against its opponent
Revenge
Performed by an individual for the injustice he had
suffered
For fun or show off
Cyberwarfare (organised by terrorist groups or y one
country against another)
etc
TYPES OF DDOS ATTACKS

1. SMURF ATTACK
Before this we must know some basic terms.
1) Router
It is a switching device to which all the devices
in a network are connected to which has a specific
address called broadcast address.
2) Broadcast address
A broadcast address is an address at which all the
devices connected to a network are enabled to
receive packets. A message sent to a broadcast
address is typically received by all network-attached
hosts, rather than by a specific host.
2) IP address spoofing
In computer networking, IP address spoofing
or IP spoofing is the creation of Internet Protocol (IP)
packets with a fake source IP address, with the purpose
of concealing the identity of the sender for
impersonating another computing system.
3) ICMP messages
These are the messages which are send to
detect the status of a network. ICMP messages are
send to the broadcast address of a network , and after
receiving this ICMP message the devices connected to
this network sends back ICMP reply messages to the IP
address which had send them the ICMP messages.


Different phases of attack:
1. IP address of the victim is obtained by the attacking
computer.
2. Using this spoofed IP address the attacker sends
ICMF messages to a networks broadcasting address.
3. All the devices in this network gets these ICMF
messages and they send back ICMF replies to the IP
address of the victim.
4. Victim get flooded with packets coming from all
these zombies and crashes.

Steps to protect against
smurf attacks

Configure the router to not contact all the devices
connected to its network when an ICMF message is
obtained to its broadcast address.


Setup a firewall so as to filters unwanted messages.

2. TCP SYN/ACK ATTACK
Before explaining of this attack some basic terms
should be understood.
1) TCP or Transmission Control Protocol
It is a set of rules or protocol which is needed for
sending packets from one device to another. For a
system to send data packets to another system the
following procedure must take place initially.
Different phases of attack:
1. The attacker obtains the IP addresses of various
systems.
2. Impersonating as these systems the attacker sends a
number of SYN requests which is the first signal to
be sent for establishing a TCP connection with a 3
way handshake.
3. The server which holds the website replies with a
TCP SYN/ACK reply on receiving the SYN requests
and waits for the ACK signal to receive from the IP
address which had been spoofed by the attacker.
4. The server thus wastes it resources and bandwidth
and waits for the ACK signal to be received.
Steps to protect against
TCP/ACK attacks
1) Decrease the TCP Connection Timeout on the
victim server so that server waits for only little time
and stops waiting for TCP ACK signal after that
time.
2) Using firewall as an intermediatory between the
attacker and server.







3. UDP FLOOD ATTACK
Basic terminology used:
1) Ports used for different applications
In a computer network any computer is identified by
its IP address. But if there are more than one
application running in a computer at the same time
for eg sending a mail and browsing the web then a
port number is assigned to each of these
applications.
eg for sending mail port number 25 is used
for browsing port number 80 is used etc.
In this way each application uses different ports and
ports used for a particular application cant be used for
any other applications.

WHAT IF A DATA PACKET TO A SYSTEM IS
SEND TO A WRONG PORT ?
If received by a wrong port, the receiving device
rejects the received message and sends back a message
called destination unreachable to the device which
had sent the data packet to wrong port.

Different phases of attack:
1) As always the attacker obtains IP addresses of many
devices.
2) He now sends data packets to random ports of the the
server.
3) The server finds that the data packet received was in the
wrong port and tries to notify the sender of the data
packet that he has sent it to the wrong port by sending
back a destination unreachable message.
4) Even though the server does this the continuous flow of
data packets to different ports of the server continues and
server has time only to send destination unreachable
packet and server crashes due to overload.

Steps to protect against
UDP flood attacks

1) Limit the rate at which destination unreachable
messages are sent or not send such packets.

2) Introduce a firewall before the server to check
whether the incoming packets are assigned to the
correct port or not.If correct then pass the packets,
else reject the packet.
4. DNS DDoS ATTACK
Basic terminology used:
1) DNS or Domain Name System server:
Each and every hostname say www.fb.com is stored in
a server and each server has an IP address associated
with it. The actual hostname cant be used by a
machine. For a websites address to be easily processed
we represent it as an IP address. A DNS server is a
specialised server whose job is to keep a database of
hostnames as well as its corresponding IP addresses so
that when it gets a DNS request it can send a
corresponding IP address as reply.
2) DNS request:
It is the request send to a DNS server by a web
browser. The browser sends a hostname to the DNS
server and the server replies with the corresponding IP
address of the hostname.


Phases in attack:
1) Attacker asks the botnets ie zombies to send DNS
queries of a site say www.whatever.com to a DNS
server and the zombies are impersonated as the
target server. Target server is the server which
attacker tries to destroy.
2) The DNS server thinks that it is the target server
which is requesting the pages and so the DNS server
sends these requested pages IP address as reply to
the target server.
3) The target server is unaware of all these and
suddenly it starts receiving a load of DNS replies and
server crashes.

Steps to protect against
DNS DDoS attacks

1) Once you know the IP addresses of the sites which the
DNS server is sending to you continuously, it is a
simple matter to use your firewall to block traffic from
those addresses. This blocking stops further DNS
DDoS attacks.



5. PEER TO PEER ATTACKS
Basic terminology used:

1)Peer to peer(P2P) network:
A peer-to-peer (P2P) network is a type of
decentralized and distributed network architecture in
which individual devices in the network (called
"peers") act as both suppliers and consumers of
resources, in contrast to the centralized clientserver
model where client nodes request access to resources
provided by central servers.
Different phases in attack:
1) The attacker acts as a "puppet master," instructing
clients of large peer-to-peer file sharing networks to
disconnect from their peer-to-peer network and to
connect to the victim's website instead.
2) Several thousand computers may aggressively try to
connect to the target website specified by the
attacker for downloading/uploading files.
3) Server gets confused of whats going on with the
continuous arrival of requests from several thousand
computers and crashes.
Steps to protect against
P2P network attacks
1) To have a semi centralised authority to track large
scale malicious P2P network activity.
2) Update the torrent clients as most of the P2P attacks
are done using those computers running old torrent
clients whose loopholes hadn't been fixed.
Future developments in DDoS
Although present developments are almost adequate
for protecting servers and websites against DDoS
attacks, newer and newer DDoS techniques are
evolving.
This puts us in a position to develop newer, efficient
and sophisticated algorithms and methods to counter
this rapidly growing threat.
THANK YOU !!!

You might also like