DDoS Flashcards

1
Q

DDoS

A

Compromise availability by hindering/blocking the provision of some service
Prevents/impairs authorized use of system resources by exhaustion
last up to 30 mins
diversion from real attack, simple to setup, difficult to stop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SYN Spoofing

A

Attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage them
Subsequent legitimate requests will fail

Attacker generates SYN connection request packets with forged source address. All valid addresses will respond a RST (reset) to close connection.
If no system, keeps sending SYN-ACK until accepting failure (while this happens an entry in table is occupied)
once table is full all legitimate and non are rejected

volume is much lower than flooding traffic, enough just to fill table

SYN flooding differs because of the total volume of packets of the attack
Countermeasures
randomly dropping connections (selective drop or random drop)
Modify SYN handshake by sending cryptographic cookie in initial request to user, so user sends it back and server confirms it is a legitimate user (SYN cookies, FreeBSD)
extend TCP connection tables size and the timeout period to remove entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Poison packet

A

packets whose structure triggers a bug in the system’s network handling software, causing it to crash
Ping of death / teardrop attacks -> ICMP echo request packets / packet fragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyberslam / Flooding

A

attacker generates a large number of requests to load the server
flooding attack on an organization -> most common attack

Overload the server’s ability to handle and respond to this traffic
Valid traffic competes against malicious traffic.
It can use ICMP, UDP or TCP SYN even other IP packet types.

ICMP
destination unreachable and time exceeded are critical unless break TCP/IP

UDP directed to some port
UDP echo port attack, responds with ICMP unreachable if service is not running
zombie addresses can be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DDoS - Source address spoofing

A

Via raw socket interface
Historically used to test network interfaces/research into network protocols. Packets can be sent with forged attributes.

Forges source addresses that (if exist) will respond with an error and augment current traffic

TCP/IP does not include the ability to ensure source address is real.

Honeynets (unused IP addresses) can be used to trace back originator of attack (Backscatter traffic)

ISP can enforce by ensuring packet conserves origin address through routers with ACL “ip verify unicast reverse-path” (not all ISPs enforce)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application based bandwidth attacks

A

execute resource-consuming activities disproportionate to the attack effort.

SIP Flood
Session Initiation Protocol text-based similar to http
requests and responses, SIP INVITE establish session between agents.

INVITE requests trigger considerable resource consumption
flood attacks exerts proxy servers with requests to block access to VoIP call service.

Countermeasures
check with captchas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HTTP based attacks

A

HTTP Flood
execute resource-intensive actions on server like downloading a report
spidering -> follows all links on the website recursively

Slowloris -> exploits the common server technique of using multiple threads to support multiple requests to the same server applications.
sends incomplete request without terminating newline seq, keeps sending header lines to keep connection alive until threads are exhausted

IDS systems do not identify it as it mixes with legitimate HTTP traffic

Countermeasures
limit rate of incoming connections per host
timeout on connections
delayed binding -> load balancing (HTTP request header completeness check)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reflection attacks

A

attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system.
The intermediary is used to initiate the attack against the target system

Use UDP, DNS, SNMP, ISAKMP due to providing large response packets

If the attack is spread in a cyclic manner
Aim is to generate high enough volumes of packets
SYN flooding through intermediary, attacker can filter volume of traffic.

Hard to separate normal traffic from attacking traffic and intermediaries with high capacities exist in the internet.

self-contained loop between the intermediary and the target system. both become reflectors
botnets to have many intermediaries and hide source
harder due to no backscatter traffic

Countermeasures
Network/Host based firewall rules reject combinations of source and destination ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Amplification attacks

A

Variant of reflection attacks
Sends original request to a network broadcaster so every host generates a response back

uses ICMP (smurf) and UDP (fraggle) attacks. Not TCP because broadcasts are inherently connectionless

Countermeasures
Disallow directed broadcasts to be routed into network from outside (ISP or organization)
limite network access to echo/ping services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNS Amplification attacks

A

packets directed at a legitimate DNS server as intermediary
60 byte UDP request -> 512 byte UDP response

nameservers respond to the target flooding with larger responses.
using high-capacity well connected systems, intermediate systems can continue without flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Defenses against DDoS attacks

A

slashdotted, flash crowd, flash event when flood occurs due to popularity or linked from a more popular source.

attack prevention and preemption -> enforcing policies for resource consumption, providing backup resources, prevent modifying systems or protocols.
attack detection and filtering -> looking for suspicious patterns, filtering out packets
attack source traceback and identification -> identify source
attack reaction -> eliminate or reduce effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly