Top Banner
Denial of Service Attacks Problem and Protection
16

04 denial of service.pptx

Dec 18, 2014

Download

Technology

Rap Payne

Part of the Web Application Security Course
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 04 denial of service.pptx

Denial of Service Attacks

Problem and Protection

Page 2: 04 denial of service.pptx

Anonymous fights for WikiLeaks

Page 3: 04 denial of service.pptx

A denial of service attack involves intentionally

overwhelming a server by flooding it with bogus

requests.

Page 4: 04 denial of service.pptx

How attackers do it

Using viruses, they get botnet software on PCs.

They coordinate botnets to send requests simultaneously.

Page 5: 04 denial of service.pptx

Developers can’t do much about DoS

o  It is the domain of system admins.

Page 6: 04 denial of service.pptx

How we protect ourselves

o  Prevent/remove botnet software o  Turn off unneeded services o  Enable quotas o  Overprovisioning o  Blackholing o  Block invalid traffic o  Block the attackers’ IPs o  DDoS mitigation appliances o  Wait for them to get bored and move on

Page 7: 04 denial of service.pptx

Prevent and remove botnet software

o  This doesn’t protect you. It protects others. o  Malware detectors can find and clean them.

Page 8: 04 denial of service.pptx

Turn off unneeded services

o  Attackers can’t misuse a service that doesn’t exist.

Page 9: 04 denial of service.pptx

Enable quotas

o  Turn on CPU, disk usage, and network traffic quotas per user.

o  Will allow your server to continue to run during an attack

o  But will hurt legitimate users during peak times

Page 10: 04 denial of service.pptx

o This is nigh impossible with a DDoS attack.

Page 11: 04 denial of service.pptx

Blackholing takes your business offline

Page 12: 04 denial of service.pptx

Block invalid traffic

o  Usually impossible because bogus requests look exactly like valid ones.

o  Sometimes though, attackers will use pings or bogus IP addresses. Routers can drop them.

Page 13: 04 denial of service.pptx

Block the attackers’ IPs

o  Isolate bogus traffic from valid traffic. •  Set your firewall to ignore requests from that IP

or range. •  Attackers can spoof their IP via relays.

Page 14: 04 denial of service.pptx

DDoS mitigation appliances will sanitize

traffic

Page 15: 04 denial of service.pptx

Wait for them to

get bored and

move on

Page 16: 04 denial of service.pptx

Summary

o  Denial of service attacks can be devastating to a business

o  They are impossible to predict and nearly indefensible.

o  We can turn on quotas, turn off services, over-provision, and use DDoS mitigation appliances beforehand.

o  We can blackhole, block IPs and strange traffic during the attack.

o  But none of these can completely protect us.