You are on page 1of 2

IanComings InformationSecurityPrinciples 9/21/2012 DDOSPaper

ItisMondaymorningandyouaresittinginyourofficegettingreadytorolloutsome updatesandtheilk.Unfortunately,justasyouareabouttopresstheenterkeytoactivatethe updates,theservercrashesandyournetworkcrumblesdowntonothingbutaquiveringmess. Wonderingwhathappened,youcheckthenetworkconnectiononlytofindthatwhenyoupingthe server,thepingfailsduetotoomuchnetworktraffic.Guesswhat?Youmayhavebeenavictim ofaDDOSattackalsoknownasaDistributedDenialofServiceattack. WhatisaDistributedDenialofServiceAttackyoumayask?Itissimplywhathappens whenanentityorgroupofentitiesattemptingtodisrupttheservice(s)ofanetworkthrougha varietyofmethodssuchasfloodingyoursitewithmassiveamountsoftrafficbothlegitimateand nonlegitimate.Whatthisdoesisbogdownthetargetmachinetillitisunabletoprocess anythingeffectivelyhaltingallworkbeingdoneonthemachine.Onecommonresultoftheattack isthetargetmachineresettingduetoserveroverload. Howcanyoutellifyournetworkisundersuchanattack?Well,theUnitedStates ComputerEmergencyReadinessTeam(USCERT)http://www.uscert.gov/1 hasalreadylaidit alloutforus. DoS/DDoSattacksmaybethecauseofthesesymptoms:Anunusuallyslowperforming network,beingunabletoaccessacertainwebsiteorservice,beingcompletelyunabletoaccess theinternet,andlastlyamassiveinfluxofspamemails.Spamemailattacksarecalledemail bombs. So,whatarethetwomostcommontypesofDoSattacks?Simply,themostcommon typesofDoSattacksareonesthatcrashservicesandthosethatfloodthem.DoSattacksmay alsohavemaliciouscodeinjectedintothemthatissettoactivatethatwouldmaxoutyourCPU, createmicrocodeerrorsandnotlimitedtocrashingtheOSitself.SinceaDoS/DDoSattackis socomplexandIcouldspendalldaytalkingaboutit,Iamgoingtolistafewcommonformsof attackthatshouldyoubeattacked,youmaycomeacross.AccordingtoWikipedia2 ,thelistmay includebutisinnowaylimitedto:TheInfamous,PingofDeathakatheICMPflood.The
"UnitedStatesComputerEmergencyReadinessTeam."Wikipedia.WikimediaFoundation,09 June2012.Web.21Sept.2012. <http://en.wikipedia.org/wiki/United_States_Computer_Emergency_Readiness_Team>.
1 2

"DenialofserviceAttack."Wikipedia.WikimediaFoundation,18Sept.2012.Web.21Sept.

2012.<http://en.wikipedia.org/wiki/Denialofservice_attack>.

TCP/SYNPacketFloodalsoknownasaSYNFlood.ATeardropattacktargetingTCP/IP fragmentationreassemblycode.LowrateDenialofServiceattacksallowingtheattackeraless likelychanceofbeingdetected.PeertoPeerattackssometimesreferredtoasDDoSattacks sincetheymakeuseofthedecentralizednatureofP2Pnetworkstofloodthetargetnetwork. ResourceStarvingthenetworkattacks.APermanentDenialofServiceAttackorPDoSwhichso baditdamagesthehardwarewhichresultsinhavingtoreplacethesystem.Bufferoverflows whichconsumemassiveamountsofresources.Nukeswhichfloodasystemwithcorruptdata untilitcrashes.ICMPEchoRequestattackscommonlyreferredtoasSmurfAttackswhichcan reroutethepingrequestsofthenetworktotraveltothetargetedmachine. NowthatIhavegivenyousomebackgroundonsomeofthemorecommonmethodsof attack,letusdelveintomethodsofdefendingyournetworkfromDoS/DDoSattacks.According toMicrosoft 3 ,thereareseveralpracticesthatcanhelppreventaDoSorDDoSattack. Tostartoff,keepaseriesoflogsthatdefinethechangesmadetothesystem/network andthereasonsbehindthem.Next,startmakingStandardOperatingProcedure(SOP)Plans andContingencyplans.Understandthatjustbecauseyousucceededinpreventinganattack today,itdoesnotmeanthatyouaresafeindefinitely.Also,itiscriticalthateachadministrator knowstheconfigurationforwardandbackwardbecausesimplymonitoringthenetworkwillnot cutit.Rundrillsandtestslocallyandremotelytoensurethatshouldacrisishappenyouand yourteamareprepared.Justbecauseyouthinktheprogramsyourunaregooddoesnotmean theycannotharmyournetwork.Makeabackuplogofeachrevisionwithextensive documentationofthenetworkconfigurationincaseyouneedit.Ifyouseeananomalyinvestigate it,itcouldbethefirstwarningofanattack.Educateyourselfonthecomparisonofsimplicity, costandsurvivability.Lastly,doeverythingyoucantopreventbeinginfiltratedbyhackers. IhopethisbriefoverviewofDenialofServiceattackshashelpedyoutobetter understandtheveryrealthreatofDoSandDDoSattacks.

Cretzman,Michael,andToddWeeks."BestPracticesforPreventingDoS/DenialofService

Attacks."BestPracticesforPreventingDoS/DenialofServiceAttacks.Microsoft,n.d.Web.21 Sept.2012.<http://technet.microsoft.com/enus/library/cc750213.aspx>.

You might also like