CSCE 4560/5560 - Secure Electronic Commerce
Overview of Threats and Attacks
Structure
Part 1: Threat Components
Part 2: Distributed Denial of Service (DDoS)
Part 3: Malicious Software, Social Engineering, String Vulnerabilities, SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Buffer Overflow
Part 1: Threats and Attacks
Definitions and Concepts
Threat Components
Identification and analysis of various elements that contribute to threats in electronic commerce.
Reasons for Cyber Criminal Behaviors
Cyber Criminal Motivations
Power assurance: To bolster the criminal’s self-esteem through non-violent means.
Examples: Cyberstalking, control without harm.
Power assertive: A moderate to high aggression approach focusing on control.
Anger (Retaliatory): Acting out of rage against perceived injustices.
Sadistic: Gaining pleasure from inflicting pain on others.
Profit-oriented: Seeking financial or material gain.
Types of Damage from Cyber Attacks
Damage Categories
Interruption: Making assets unavailable (availability).
Redirection: Unauthorized access to assets (confidentiality).
Modification: Unapproved alterations to assets (integrity).
Fabrication: Inserting false objects into the system (integrity).
Denial: Falsely denying an action taken (authenticity).
Components of a Threat (Part 1)
Threat Agents
Entities deliberately manifesting threats.
Types include criminals, terrorists, disgruntled employees, hackers, and commercial attackers.
Capability
Resources enabling a threat: Software, technology, methods, education.
Components of a Threat (Part 2)
Threat Inhibitors
Elements that prevent or reduce the likelihood of a threat.
Examples: Fear of capture, cost, technical difficulties, public perception.
Threat Amplifiers
Factors that strengthen or encourage the manifestation of threats.
Examples: Peer influence, information access, changing technologies.
Threat Catalysts
Events or changes prompting the activation of threats.
Threat Agent Motivators
Motivations behind threats: Political, personal gain, religion, curiosity.
Threat Likelihood/Feasibility
Analyzed by method (skills, knowledge), opportunity (access), and motive (money, fame).
Types of Threats
Classification of Threats
Natural Threats: Fires, floods, general system failures, power outages.
Human Threats:
Benign: Unintentional damage.
Malicious: Intentional attacks.
Non-hostile: Curiosity-driven unauthorized access.
Hostile: Intent to cause harm or exploit systems.
Steps in a Successful Cyber Attack
Attack Phases
Reconnaissance: Investigating the target network/system.
Scanning: Identifying vulnerabilities.
Access and Escalation: Gaining admin privileges.
Exfiltration: Stealing/modifying data.
Sustainment: Establishing backdoors for future access.
Assault: Optionally launching overt attacks.
Obfuscation: Covering tracks by disabling logs/audits.
Types of Attacks
Non-technical Attacks
Social Engineering: Tactics to manipulate individuals into compromising security.
Technical Attacks
Any exploit of system knowledge or software for unauthorized access.
Part 2: Distributed Denial of Service (DDoS) Attacks
Overview of DDoS Attacks
A subclass of DoS attacks involving multiple compromised devices to inundate a target with traffic.
Goal: Render websites or services unavailable to legitimate users.
Botnets
A botnet is a collection of compromised devices (bots) controlled by an attacker.
Characteristics: Built over time, used to generate DDoS attacks and spam, not typically directly breaching security but overwhelming resources.
Objectives of DDoS Attacks
Primary Goal: Disrupt availability to legitimate users, causing financial loss and reputational damage.
Secondary Strategy: Often distract security teams to mask further malicious activities.
Types of DDoS Attacks
A. Network Layer Attacks
Target network infrastructure with high traffic.
Examples: UDP floods, ICMP floods, amplification attacks.
Characteristics: High volume, generally short-term duration (hours to 2 days).
B. Application Layer Attacks
Target specific applications and services, often harder to detect due to legitimate-looking traffic.
Examples: HTTP floods, slowloris attacks.
Characteristics: Mimic legitimate behavior, can persist for weeks to months, Measured in Requests Per Second (RPS).
DDoS Attack Methods
UDP Flood:
Send a UDP packet with different port. First checks if programs are listening for requests, if no programs are receiving packets. The server responds with a ICMP(ping) packet to tell the destination it is unreachable.
Used because it doesn’t require a request.
ICMP (Ping) flood
Attack aims to overwhelm the target’s ability to respond and/or overload with fake traffic.
Attacker sends many ICMP echo requests to server with multiple deceives
Server then sends an ICMP echo reply to each request
SYN flood
Attacker sends SYN packets to every port on server using fake IP address, meaning the server is unable to establish a connection.
Ping of Death
Attacker sends overside packets, when the server attempts to reassemble the fragments it causes a memory overflow.
Using firewalls, sites block ICMP ping message, good short term fix.
Slowloris:
Uses partial HTTP request to open connections but keeps those connections open as long as possible.
NTP Amplification:
Sends the requester a 600 Host list
HTTP flood:
The attack is most effective when it forces the server or application to allocate the maximum resources possible in response to each request.
DDoS Attack Patterns
Attacks can be short bursts, continuous, or in waves, with recovery taking days or weeks after an attack.
Real-World Example
DNS Flood Attack: A gaming website faced peak traffic of 25 million packets per second, illustrating the extensive impact of DDoS attacks on mid-sized websites.
DDoS Protection Strategies
Mitigation Services and Platforms
SolarWinds Security Event Manager: Detects DDoS attacks and blocks malicious IPs.
Indusface AppTrana: WAF with DDoS protection and bot control.
Sucuri Website Firewall: Blocks suspicious HTTP traffic using Geo-blocking.
Cloudflare: Handles large-scale attacks using IP reputation and content distribution.
AWS Shield: Monitors traffic to prioritize legitimate requests during an attack.
Best Practices for DDoS Protection
Implementation of Cloud-based DDoS Mitigation Services.
Use of CDNs: Spread traffic over several servers globally to absorb spikes.
Rate Limiting and Traffic Shaping: Control the number of requests per time interval.
Real-Time Traffic Monitoring: Detect unusual spikes in traffic quickly.
Regular Testing and Updates: Perform penetration tests and keep software updated.
Important Notes on VPNs
VPNs can protect individual users but are inadequate for website DDoS mitigation.
They conceal user IPs, not server IPs, and have limited traffic absorption capabilities.
Legal Considerations
Using DDoS attacks is illegal under the Computer Misuse Act 1990.
Tools for Testing and Simulation
HULK: Generates high-volume traffic for testing.
Slowloris: Maintains many connections open to exhaust server resources.
Loic: Generates traffic for network stress testing.
Payload Data Header Setup
Link Header: MAC Source & Destination
IP Header: IP Source & Destination
UDP: Port Sources & Destination
Application Header
Encouragement for Ethical Use
Many DDoS tools are dual-use; unauthorized use against real systems is illegal and unethical.
Key Takeaway
Building robust protections against DDoS attacks involves layered strategies combining technology, traffic analysis, and proactive management.