SlideShare a Scribd company logo
DoS Attack and Mitigation
by
Gopi Krishnan S
Society for Electronic Transactions & Security
Denial of Service Attack
● To make the victim server to deny the service to
intended clients. It is often done by keeping the server
busy in handling meaningless request.
● It is achieved by exhausting either the bandwidth of
communication channel or computational resource
available on the server.
Analogy
You are visiting a hotel to have dinner – Hotel has only
one server person. When we ask for menu card to order
food, the others interrupt the server person and chat
unnecessarily.
Result: You are the one with intention to get service, but
not getting it; because the server is busy in responding
others.
(D)DoS Attack perspective
● From Server
– Flood Attack
– S(L)ow Attack
– Vulnerability Exploitation Attack
– Non-Vulnerability/Misuse Attack
● From Client
– Reflected DDoS Attack
– Spoofed DDoS Attack
– Exploit based (D)DoS Attack
Flooding Attack
● Flooding attack is a kind of resource exhaustion attack.
● An attacker floods the victim with many packet than it
could handle.
● Flooding Attack can be done at various layers of OSI
model to take-down different devices.
● Example:
– MAC Flooding, TCP SYN Flood, UDP Flood, SSL
Handshake Flood, HTTP Flood
MAC Flood
● The target is Ethernet switch.
● Hub will broadcast all the packet and results in data leak.
● To devoid potential risk of data leak, an Ethernet switch is
used instead of hub.
● MAC flood overflows the buffer of Ethernet switch and
makes it acts like a hub, results in data leak.
PkM = (Ether(src=RandMAC(),dst="ff:ff:ff:ff:ff:ff")/
ARP(op=2, psrc="0.0.0.0", hwdst="ff:ff:ff:ff:ff:ff"))
TCP SYN Flood
● The target is any server uses TCP in transport layer.
● Example: HTTP, FTP, SMTP, IRC, etc.
● In TCP Handshake, SYN is the first packet in 3-Way handshake.
● Flooding victim with TCP SYN packet leaves too much of half
open connection.
● Attack can be mitigated using TCP SYN Cookie.
PkT = Ether(src=RandMAC(),dst="08:00:27:67:f9:1a")/
IP(ttl=32,dst='10.1.1.2')/
TCP(sport=RandShort(),dport=80,flags='S')
UDP Flood
● The target is any server uses UDP in transport layer.
● Example: DNS, TFTP, SysLog, NTP, etc.
● UDP is connectionless – It doesn't maintain any state.
● Flooding victim with UDP overwhelms the application
service running on top of OS.
PkU = Ether(src=RandMAC(),dst="08:00:27:67:f9:1a")/
IP(ttl=32,dst='10.1.1.2')/
UDP(sport=RandShort(),dport=53)
SSL Flood
● The target is any server uses SSL/TLS to secure the
connection.
● Example: HTTPS, SSH, VPN, etc.
● Popularly launched by PushDo botnet.
● During client key exchange in SSL Handshake, a client
would send a bogus data instead of sending the valid key.
● To send a valid pre-master secret, the client must compute
XY
 mod N , – no matter RSA or DHE or ECDHE Protocol.
● Can be mitigated by process outsourcing or TLS puzzle.
HTTP Flood
● The target is Web Server
● Example: Apache, NGINX, IIS
● Popularly launched by LOIC, HOIC, HTTPerf
PkH = Ether(src="0a:00:27:00:00:00",
dst="08:00:27:67:f9:1a")/
IP(ttl=32,src='10.1.1.1',dst='10.1.1.2')/
TCP(seq=1111,ack=2222,
sport=12098,dport=80)/
"GET / HTTP/1.0 rnrn"
Non-Vulnerability/Misuse Attack
● Misusing the feature of a system to DoS attack it.
● Example
– HTTP Post flood
– SSL Renegotiation
– TCP Syn Flood → Already covered in flood attack
HTTP POST Flood
● The target is Web Server – a type of HTTP Flood attack.
● Any server that performs back-end operations with
POST data.
● Often web applications process POST data with
database.
– Example: Login, Registration, Ticket Booking, etc
● Web server and database server tends to execute
expensive operation.
● It can be prevented by using HASH based interactive
puzzle integrated with form submission.
SSL Renegotiation Attack
● The target is any SSL Application with Renegotiation
support.
● Often launched using THC-SSL-DOS
● Immediately after establishing a new SSL session,
parameters for the SSL session are renegotiated
continuously again and again to exhaust the server
resource.
● Apache was vulnerable to this attack; but can be
prevented using configuration keyword in apache.conf
– SSLRenegotiation off
State-of-Art DDoS mitigation software/systems are
developed at SETS
● HTTP Post Flood mitigation using interactive client-puzzle
integrated with HTML form
● Protection for entire cloud based/individual web hosting using
platform/client independent Puzzle R-Proxy service
● Alleviating SSL attacks using Crypto-chip platform
● And progressing to mitigate other attacks too.

More Related Content

PDF
DDoS-bdNOG
PPTX
DDoS ATTACKS
PPTX
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
PPTX
DDoS attacks
PDF
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
PDF
DDoS Attacks
PPTX
What is DDoS ?
PDF
Practical steps to mitigate DDoS attacks
DDoS-bdNOG
DDoS ATTACKS
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
DDoS attacks
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
DDoS Attacks
What is DDoS ?
Practical steps to mitigate DDoS attacks

What's hot (20)

PDF
Rise of Dr Dos DDoS Attacks - Infographic
PPT
Module 9 Dos
PPTX
Denial of service attack
PPTX
Denial of service attack
DOCX
Type of DDoS attacks with hping3 example
PPTX
5 Ways To Fight A DDoS Attack
PPT
DDoS Attacks
PPT
10 DDoS Mitigation Techniques
PPTX
Time-based DDoS Detection and Mitigation for SDN Controller
PPT
PPTX
Entropy and denial of service attacks
PPTX
DDoS Attack and Mitigation
DOCX
Entropy based DDos Detection in SDN
PPTX
Assingement on dos ddos
PDF
DDoS Attack Preparation and Mitigation
PPT
Denail of Service
PPTX
DoS/DDoS
PPTX
Ddos and mitigation methods.pptx (1)
PPTX
Denial of Service Attacks (DoS/DDoS)
Rise of Dr Dos DDoS Attacks - Infographic
Module 9 Dos
Denial of service attack
Denial of service attack
Type of DDoS attacks with hping3 example
5 Ways To Fight A DDoS Attack
DDoS Attacks
10 DDoS Mitigation Techniques
Time-based DDoS Detection and Mitigation for SDN Controller
Entropy and denial of service attacks
DDoS Attack and Mitigation
Entropy based DDos Detection in SDN
Assingement on dos ddos
DDoS Attack Preparation and Mitigation
Denail of Service
DoS/DDoS
Ddos and mitigation methods.pptx (1)
Denial of Service Attacks (DoS/DDoS)
Ad

Similar to DDoS Attack (20)

PDF
Common Dos and DDoS
PDF
ECE560 Denial of Service Attacks Fall2020.pdf
PPTX
Denial of service
PDF
denialofservice.pdfdos attacck basic details with interactive design
PDF
12 types of DDoS attacks
PDF
A Comparative Approach to Handle Ddos Attacks
PDF
50120140502001 2
PDF
A vivacious approach to detect and prevent d do s attack
PDF
Enhancing the impregnability of linux servers
PDF
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
PPTX
DoS Attack - Incident Handling
PDF
DDoS Threat Landscape - Ron Winward CHINOG16
PDF
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
PDF
Detection of Distributed Denial of Service Attacks
DOC
V1_I2_2012_Paper4.doc
PDF
DoS Attacks
PDF
What is a TCP Flood Attack.pdf
PDF
Aw36294299
PPTX
Security Threats at OSI layers
PPTX
Denial of-service (do s) attack
Common Dos and DDoS
ECE560 Denial of Service Attacks Fall2020.pdf
Denial of service
denialofservice.pdfdos attacck basic details with interactive design
12 types of DDoS attacks
A Comparative Approach to Handle Ddos Attacks
50120140502001 2
A vivacious approach to detect and prevent d do s attack
Enhancing the impregnability of linux servers
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
DoS Attack - Incident Handling
DDoS Threat Landscape - Ron Winward CHINOG16
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
Detection of Distributed Denial of Service Attacks
V1_I2_2012_Paper4.doc
DoS Attacks
What is a TCP Flood Attack.pdf
Aw36294299
Security Threats at OSI layers
Denial of-service (do s) attack
Ad

DDoS Attack

  • 1. DoS Attack and Mitigation by Gopi Krishnan S Society for Electronic Transactions & Security
  • 2. Denial of Service Attack ● To make the victim server to deny the service to intended clients. It is often done by keeping the server busy in handling meaningless request. ● It is achieved by exhausting either the bandwidth of communication channel or computational resource available on the server.
  • 3. Analogy You are visiting a hotel to have dinner – Hotel has only one server person. When we ask for menu card to order food, the others interrupt the server person and chat unnecessarily. Result: You are the one with intention to get service, but not getting it; because the server is busy in responding others.
  • 4. (D)DoS Attack perspective ● From Server – Flood Attack – S(L)ow Attack – Vulnerability Exploitation Attack – Non-Vulnerability/Misuse Attack ● From Client – Reflected DDoS Attack – Spoofed DDoS Attack – Exploit based (D)DoS Attack
  • 5. Flooding Attack ● Flooding attack is a kind of resource exhaustion attack. ● An attacker floods the victim with many packet than it could handle. ● Flooding Attack can be done at various layers of OSI model to take-down different devices. ● Example: – MAC Flooding, TCP SYN Flood, UDP Flood, SSL Handshake Flood, HTTP Flood
  • 6. MAC Flood ● The target is Ethernet switch. ● Hub will broadcast all the packet and results in data leak. ● To devoid potential risk of data leak, an Ethernet switch is used instead of hub. ● MAC flood overflows the buffer of Ethernet switch and makes it acts like a hub, results in data leak. PkM = (Ether(src=RandMAC(),dst="ff:ff:ff:ff:ff:ff")/ ARP(op=2, psrc="0.0.0.0", hwdst="ff:ff:ff:ff:ff:ff"))
  • 7. TCP SYN Flood ● The target is any server uses TCP in transport layer. ● Example: HTTP, FTP, SMTP, IRC, etc. ● In TCP Handshake, SYN is the first packet in 3-Way handshake. ● Flooding victim with TCP SYN packet leaves too much of half open connection. ● Attack can be mitigated using TCP SYN Cookie. PkT = Ether(src=RandMAC(),dst="08:00:27:67:f9:1a")/ IP(ttl=32,dst='10.1.1.2')/ TCP(sport=RandShort(),dport=80,flags='S')
  • 8. UDP Flood ● The target is any server uses UDP in transport layer. ● Example: DNS, TFTP, SysLog, NTP, etc. ● UDP is connectionless – It doesn't maintain any state. ● Flooding victim with UDP overwhelms the application service running on top of OS. PkU = Ether(src=RandMAC(),dst="08:00:27:67:f9:1a")/ IP(ttl=32,dst='10.1.1.2')/ UDP(sport=RandShort(),dport=53)
  • 9. SSL Flood ● The target is any server uses SSL/TLS to secure the connection. ● Example: HTTPS, SSH, VPN, etc. ● Popularly launched by PushDo botnet. ● During client key exchange in SSL Handshake, a client would send a bogus data instead of sending the valid key. ● To send a valid pre-master secret, the client must compute XY  mod N , – no matter RSA or DHE or ECDHE Protocol. ● Can be mitigated by process outsourcing or TLS puzzle.
  • 10. HTTP Flood ● The target is Web Server ● Example: Apache, NGINX, IIS ● Popularly launched by LOIC, HOIC, HTTPerf PkH = Ether(src="0a:00:27:00:00:00", dst="08:00:27:67:f9:1a")/ IP(ttl=32,src='10.1.1.1',dst='10.1.1.2')/ TCP(seq=1111,ack=2222, sport=12098,dport=80)/ "GET / HTTP/1.0 rnrn"
  • 11. Non-Vulnerability/Misuse Attack ● Misusing the feature of a system to DoS attack it. ● Example – HTTP Post flood – SSL Renegotiation – TCP Syn Flood → Already covered in flood attack
  • 12. HTTP POST Flood ● The target is Web Server – a type of HTTP Flood attack. ● Any server that performs back-end operations with POST data. ● Often web applications process POST data with database. – Example: Login, Registration, Ticket Booking, etc ● Web server and database server tends to execute expensive operation. ● It can be prevented by using HASH based interactive puzzle integrated with form submission.
  • 13. SSL Renegotiation Attack ● The target is any SSL Application with Renegotiation support. ● Often launched using THC-SSL-DOS ● Immediately after establishing a new SSL session, parameters for the SSL session are renegotiated continuously again and again to exhaust the server resource. ● Apache was vulnerable to this attack; but can be prevented using configuration keyword in apache.conf – SSLRenegotiation off
  • 14. State-of-Art DDoS mitigation software/systems are developed at SETS ● HTTP Post Flood mitigation using interactive client-puzzle integrated with HTML form ● Protection for entire cloud based/individual web hosting using platform/client independent Puzzle R-Proxy service ● Alleviating SSL attacks using Crypto-chip platform ● And progressing to mitigate other attacks too.