DOS Flashcards
(51 cards)
Define DOS attack
an action that overwhelms target system with excessive traffic, preventing users from accessing services
Resources that are targets of DOS attacks?
- Network Bandwidth
- System Resources
- Application Resources
How to respond to DOS attacks?
- Implement antispoofing and rate limit or use CAPTCHA to filter human vs bot behavior
- Monitor network traffic for abnormal patterns
- Trace the source of the attack through ISPs then update incident response plans to prepare for future attacks
Define DDOS attack
A coordinated assult where many systems flood a target with overwhelming traffic/requests, making it unavaliable to users
Explain one or two defense mechanism against the SYN flooding attack
- Blocking spoofed addresses
- SYN cookies
Could you explain the SYN flooding attack method? Also, what resource of the system does the SYN flooding attack exhaust?
The SYN flooding attack sends TCP SYN packets with spoofed addresses, leading the server to maintain half-open connections until its connection table overflows.
System’s network handling resources
Describe the Session Initiation Protocol (SIP) flooding attack. Explain what resources are targeted by the attack.
Overloads SIP servers with too many session initiation requests.
Exhauses server’s memory and processing capacity.
Explain DNS Amplification Attack. This attack method is based on a specific feature of DNS. Explain whether this is an attack using sex.
Attacker sends tiny DNS queries with spoofed source addresses then server replies with large responses to the target, overwhelming resources.
What are the three common types of firewalls, and how do they function?
Packet-Filtering Firewall:
Checks each packet’s header against a set of rules.
Decides whether to allow or block the packet.
Application-Level Gateway:
Works as a middleman for specific applications.
Adds security by filtering traffic and requiring user authentication.
Circuit-Level Gateway:
Creates two separate TCP connections: one with the user and one with the external server.
Relays data between them without inspecting the actual content.
What are the advantages and disadvantages of packet-filtering firewalls?
Advantages:
Simplicity.
Transparency to users.
High speed.
Disadvantages:
Difficult to set up rules correctly.
Lack of user authentication.
Cannot deal with applications at the packet-filtering level
What is the key difference between stateful inspection firewalls and traditional packet filters?
Stateful Firewalls: Track connections and validate packets dynamically.
Packet-Filtering Firewalls: Use static rules without tracking connections.
What are the advantages of an application-level gateway over packet filters?
- Provides better security by scrutinizing traffic at the application level.
- Can be configured to support specific application features only.
- Makes it easier to log and audit incoming traffic
What is a screened subnet firewall configuration, and what are its advantages?
A screened subnet firewall uses two packet-filtering routers to create an isolated subnet.
Advantages:
1. Provides three levels of defense.
2. Hides the internal network from the internet by advertising only the screened subnet.
3. Prevents direct routing between internal systems and the internet
What are the advantages of host-based firewalls?
Filtering rules can be tailored to the host environment.
Provides protection independent of network topology.
Adds an extra layer of protection for individual hosts
What is the primary function of an Intrusion Prevention System (IPS), and how does it differ from a firewall?
An IPS detects and attempts to block malicious activities in real time. Unlike a firewall, which uses static rules to filter traffic, an IPS uses algorithms to identify anomalous or known malicious behaviors and then acts to prevent them
What are the limitations of a firewall?
- Cannot protect against attacks that bypass it, such as those using direct dial-up connections.
- Does not protect against internal threats, like malicious insiders.
- Cannot scan and block virus-infected files transferred via supported applications
Explain the anomaly detection method and the signature-based detection method. What are their advantages and disadvantages?
Anomaly Detection: Spots unusual behavior.
Pros: Detects new attacks.
Cons: High false positives.
Signature Detection: Matches known attack patterns.
Pros: Accurate for known threats.
Cons: Misses new attacks.
Define the terms ‘False Positive’ and ‘False Negative.’ What are the challenges if an IDS has a 1% false positive rate and a 1% false negative rate in real environments?
False Positive: When the IDS incorrectly classifies legitimate activity as malicious.
False Negative: When the IDS fails to detect an actual attack.
Challenges:
A 1% false positive rate in high-traffic environments could overwhelm administrators with alerts, leading to alert fatigue.
A 1% false negative rate leaves the system vulnerable to undetected attacks, potentially causing severe damage
When a hacker attacks a system, explain the general behavior pattern step by step.
- Gather info about the target
- use identified weaknesses to gain access
- Increase access rights to perform more actions
- Delete logs and evidence
List at least five IDS requirements and explain them.
Accuracy: Minimize false positives and negatives.
Scalability: Handle high volumes of data in large networks.
Real-Time Detection: Identify attacks as they happen.
Robustness: Operate effectively under attack.
Ease of Management: Allow for straightforward configuration and updates.
Compare a stateless firewall (packet filtering firewall) and a stateful firewall.
Stateless Firewall: Filters individual packets.
Pros: Simple, fast.
Cons: Can’t track connections, spoofing risk.
Stateful Firewall: Tracks connections.
Pros: Blocks SYN floods.
Cons: Higher overhead.
Describe an attack that can be blocked by a stateful firewall but not by a stateless firewall.
A SYN Flood Attack can be blocked by a stateful firewall because it tracks incomplete TCP handshakes and can drop excessive SYN packets. A stateless firewall, which only inspects individual packets, would not recognize the incomplete connections
Explain the TL and Fragment Offset fields among the fields in the IP header.
TTL: Limits packet lifespan; decrements at each hop. Used in traceroute.
Fragment Offset: Indicates a fragment’s position for proper reassembly.
Compare and explain the advantages and disadvantages of the signature-based method and the anomaly-based method in intrusion detection.
Signature-Based Detection:
Advantages: Accurate for known threats, low false positives.
Disadvantages: Cannot detect new, unknown threats. Requires constant updates to the signature database.
Anomaly-Based Detection:
Advantages: Can detect unknown attacks by monitoring deviations from normal behavior.
Disadvantages: High false-positive rate, as legitimate activities might deviate from the baseline.