Chapter06_NetworkSecurity
History of Denial of Service Attacks
- Early 1990s: Individual Attacks. First DoS Tools
- Late 1990s: Botnets, First DDoS Tools
- Feb 2000: First Large-Scale DDoS Attack
- CNN, Yahoo, E*Trade, eBay, Amazon.com, Buy.com
- 2004: DDoS for hire and Extortion
- 2007: DDoS against Estonia
- 2008: DDoS against political dissident groups
- 2008: DDoS against Republic of Georgia during military conflict with Russia
DoS Attacks
- Spaming(垃圾邮件) & e-mail bomb
-
Ping of Death(ICMP)
- 防御方法
- Block echo requests to broadcast networks
- Ban the IP of the attacker
- Filtering echo requests / Firewall
- 用伪装的IP进行ping攻击
- Smurf/Fraggle Attack
- Use intermediate networks as amplification points
- Measure
- Change firewall settings
- Change router settings to not forward to broadcast IP addresses
- Smurf/Fraggle Attack
- 防御方法
-
TCP SYN Flood DoS Attacks
- Attacker sends a SYN request and never responds to the SYN-ACK request
- Final ACK vs. IP spoofing
- Results in “half-open connection”
- Server resources consumed by these connections
- Timeout
- Allows no new connections
- Attacker sends a SYN request and never responds to the SYN-ACK request
-
Buffer Overflow
- Attempts to put more data, which would be long input strings, into the buffer than it can hold
- Code red, slapper and slammer are attacks that took advantage of buffer overflows
Access Attacks 访问权限的获取
- Eavesdropping
- Interception 拦截窃听
- Spoofing
- IP Spoofing
- Remote machine acts as a node on the local network to find vulnerabilities with your servers, and installs a backdoor program or Trojan horse to gain control over network resources
- Pharming: DNS Hijacking
- Interface Spoofing
- IP Spoofing
-
Password Guessing Attacks
- Brute Force Attack
- Dictionary Attack
-
Man-in-the-Middle Attacks
- placing a piece of software between a server and user that they are aware of
- Software intercepts data and then send the information to the server as if nothing is wrong
-
Social Engineering