Dos Attacks
Dos Attacks
What it means .
• A denial-of-service, or DoS, attack is an attempt to defeat availability, the third of
the three basic properties to be preserved in computer security.
• A ping of death is a simple attack, using the ping command that is ordinarily used to
test response time from a host.
• Since ping requires the recipient to respond to the packet, all the attacker needs to do
is send a flood of pings to the intended victim.
• If the attacker is on a 10-megabyte (MB) connection and the path to the victim is
100 MB or more, mathematically the attacker alone cannot flood the victim.
• But the attack succeeds if the numbers are reversed: The attacker on a 100-MB
connection can certainly flood a 10- MB victim.
• It uses the same vehicle, a ping packet, with two extra twists.
• First, the attacker chooses a network of unwitting victims that become accomplices.
• The attacker spoofs the source address in the ping packet so that it appears to come from
the victim, which means a recipient will respond to the victim.
• Then, the attacker sends this request to the network in broadcast mode by setting the last
byte of the address to all 1s;
• In this way the attacker uses the entire subnetwork to multiply the attack’s effect.
Smurf
Echo–Chargen
• Chargen is an ICMP protocol that generates a stream of packets to test the network’s
capacity.
• Echo is another ICMP protocol used for testing; a host receiving an echo returns
everything it receives to the sender.
Echo–Chargen
• The attacker picks two victims, A and B, and then sets up a chargen process on host A
that generates its packets as echo packets with a destination of host B.
• But because these packets request the recipient to echo them back to the sender, host B
replies by returning them to host A.
• This series puts the network infrastructures of A and B into an endless loop, as A
generates a string of echoes that B dutifully returns to A, just as in a game of tennis.
• Alternatively, the attacker can make B both the source and destination address of the
first packet, so B hangs in a loop, constantly creating and replying to its own messages.
Echo–Chargen
SYN Flood
• This attack uses the TCP protocol suite, making the session-oriented nature of these protocols work
against thevictim.
• For a protocol such as Telnet or SMTP, the protocol peers establish a virtual connection,
called a session, to synchronize the back-and-forth, command–response nature of the
interaction.
• A session is established with a three-way TCP handshake.
• Each TCP packet has flag bits, one of which is denoted SYN (synchronize) and one denoted ACK
(acknowledge).
• First, to initiate a TCP connection, the originator sends a packet with the SYN bit on.
• Second, if the recipient is ready to establish a connection, it replies with a packet with both the SYN
and ACK bits on.
• Finally, the first party completes the exchange to demonstrate a clear and complete communication
Three-way TCP handshake.
SYN Flood
• Attackers can spoof a non-existent return address in the initial SYN packet.
1. The attacker does not want to disclose the real source address in case someone should
inspect the packets in the SYN_RECV queue to try to identify the attacker.
2. The attacker wants to make the malicious SYN packets indistinguishable from
• With too many processes, a system can enter a state called thrashing, in which its
performance fails because of nearly continuous context switching.
• Logging and log files can be swamped by a large number of errors or fault conditions
that must be handled.
• The attacker sends a series of datagrams that cannot fit together properly.
• One datagram might say it is position 0 for length 60 bytes, another position 30 for 90
bytes, and another position 41 for 173 bytes.
• In an extreme case, the operating system locks up with these partial data units it
cannot reassemble, thus leading to denial of service.
IP Fragmentation: Teardrop
Denial of Service by Addressing Failures
DNS Spoofing
• At the heart of Internet addressing is a protocol called DNS or Domain Name System protocol.
• DNS is the database of translations of Internet names to addresses, and the DNS protocol
• For efficiency, a DNS server builds a cache of recently used domain names; with an attack
• A standard DNS query and response in which the user requests a translation of the URL
microsoft.com, and the name server responds with the address 207.46.197.32.
DNS Spoofing
Rerouting Routing
•
Session Hijacking
Distributed Denial of Service (DDoS)
Botnets
Botnet operators make money by renting
compromised hosts for DDoS or other activity.
The rent is mostly profit.