Computer Security Fundamentals - Chapter 4: Denial of Service Attacks

Computer Security Fundamentals

Chapter 4: Denial of Service Attacks

Chapter Objectives
  • Understand how DoS attacks are accomplished.

  • Know how certain types of DoS attacks work, such as SYN flood, Smurf, and distributed Denial of Service (DDoS) attacks.

  • Take specific measures to protect against DoS attacks.

  • Know how to defend against specific types of DoS attacks.

Overview of DoS Attacks
  • Definition:

    • Denial of Service (DoS) attacks are aimed at preventing legitimate users from accessing a system or service.

  • Characteristics:

    • One of the most common types of cyber attacks.

    • Requires minimal technical skill to execute.

  • Effectiveness:

    • Effective due to physical limitations of computers and systems:

    • Number of simultaneous users.

    • Size of files.

    • Speed of data transmission.

    • Amount of data stored.

Common Tools Used for DoS Attacks
  • Low Orbit Ion Cannon (LOIC):

    • A tool widely known for launching DoS attacks.

  • XOIC:

    • Similar in function to LOIC, providing similar capabilities for DoS attacks.

  • Tribal Flood Network (TFN) and TFN2K:

    • Can perform various types of flood attacks.

    • Capable of encrypted communication which can hide the attack.

    • The master of the network can spoof its IP address.

  • Stacheldraht:

    • Translates to "barbed wire" in German.

    • A DDoS attack tool that can conduct various flood and Smurf attacks.

Types of DoS Attacks
TCP SYN Flood Attacks
  • Mechanism:

    • The attacker sends a SYN packet to the target.

    • The receiver must allocate space in its buffer, awaiting a response.

    • The client responds with an ACK flag set.

  • Defensive Techniques:

    • Micro blocks.

    • SYN cookies.

    • RST cookies.

    • Upstream filtering.

    • Stateful Packet Inspection (SPI) firewalls.

Smurf IP Attacks
  • Mechanism:

    • The attacker sends out an ICMP broadcast packet with a spoofed source IP address.

    • Intermediary devices respond back to the target IP address, flooding it with responses.

  • Protection:

    • Guard against Trojan horses.

    • Use virus scanners and proxy servers.

    • Block all inbound broadcast packets at the firewall.

UDP Flood Attacks
  • Mechanism:

    • The attacker sends UDP packets to random ports on the target.

    • This generates illegitimate packets causing the system to utilize and tie up resources in sending back responses.

ICMP Flood Attacks
  • Mechanism:

    • Involves flooding a target with ping requests or UDP packets.

    • "Nuking" potentially exploits known bugs in operating systems.

Specific Types of DoS Attacks
The Ping of Death (PoD)
  • Description:

    • Sends a single large packet that most operating systems can handle without issue.

    • Vulnerability is less common in modern systems; keeping software and patches updated helps prevent it.

Teardrop Attacks
  • Description:

    • An attacker sends fragmented messages that the victim's system struggles to reconstruct, potentially causing it to halt or crash.

    • Variations of Teardrop include: TearDrop2, Boink, Nestea Boink, Targa, NewTear, and SYNdrop.

Land Attacks
  • Description:

    • A straightforward concept wherein an attacker sends a forged packet with identical source and destination IP addresses, causing the system to hang while trying to process the communication.

Distributed Denial of Service (DDoS) Attacks
  • Description:

    • Involves tricking routers to direct massive flood attacks at a targeted victim.

    • The target becomes overloaded and thus unreachable.

Other Types of DoS Attacks
  • DHCP starvation.

  • HTTP POST DoS attacks.

  • PDoS (Permanent Denial of Service) attacks.

  • Registration DoS attacks.

  • Login DoS attacks.

  • Yo-Yo attacks.

  • CLDAP reflection attacks.

  • Challenge collapsar (CC) attacks.

Real-World Examples of DoS Attacks
  • Google Attack.

  • AWS (Amazon Web Services) Attack.

  • Boston Globe Attack.

  • Memcache Attacks.

  • DDoS Blackmail incidents.

  • Mirai Botnet incident.

How to Defend Against DoS Attacks
  • In addition to previously mentioned protections:

    • Configuring firewalls to:

    • Filter out incoming ICMP packets.

    • Disallow any unauthorized incoming traffic.

    • Use network monitoring tools such as NetStat.

    • Block traffic originating from outside your trusted network.

    • Disable all IP broadcasts.

    • Filter both external and internal IP addresses.

    • Keep antivirus signatures, operating system updates, and software patches current.

    • Establish and enforce an Acceptable Use Policy (AUP).

Summary
  • DoS attacks represent one of the most prevalent and straightforward types of attacks on the Internet.

  • Although unsophisticated in nature, they can lead to significant damage and service disruption.

  • Constant vigilance and a robust protection strategy are essential in mitigating risks associated with DoS attacks.