You are on page 1of 5

Usage of Embedded Systems for DoS Attack Protection

I. Dodig1, D. Cafuta1, V. Sruk2


1
Politechnic of Zagreb
HR-10000 ZAGREB, I. Lucica 5, CROATIA
e-mail: {davor.cafuta, ivica.dodig}@tvz.hr
2
Faculty of Electrical Engineering and Computing
HR-10000 ZAGREB, Unska 3, CROATIA
e-mail: vlado.sruk@fer.hr

ABSTRACT – An embedded system commonly This approach increases reliability introducing


represents special-purpose device usually based on redundancy. In case of unit failure, other units can step
processor designed to perform one or a few dedicated in order to ensure functioning of the system. This
functions. Such systems are designed to maintain control approach requires implementation of failure detection
over specific functions by gathering and reporting data
received from sensors or some other devices. Embedded
and self-recovery in order to improve availability of the
systems show increasing trend to modify data or control whole system.
information flow, in some cases over the local area In this paper prospect of network attack
network or even Internet. Widespread network usage detection using an embedded system is presented.
results in rapid development of advanced network Denial of service (DoS) attacks as security threats and
connectivity in embedded systems. some common defense methodologies are presented
In this paper denial of service as a challenging problem in and network design using the embedded system is
network security is introduced. Different defense proposed. Second section presents common
methodologies are described. Further more, possibility of threats in network security. In third section, DoS
an embedded system advanced network connectivity
usage in hardening network security is explored.
attacks and common defense methodologies are
presented. To increase network security different
Key words: Embedded system, Network, DoS network designs strategies are described. Finally,
defense solution is proposed by adding embedded
I. INTRODUCTION systems in network design.

Computer systems are today widespread over II. NETWORK SECURITY ISSUES
multiple aspects of human life. In some aspects of
application, computer system can become invisible to Internet has become the largest network of
surrounding. Fractions of those systems are devices public data and information simplifying personal and
designed to master some specific task called embedded business communication. Rapid Internet expansion
systems. Small sized, low power consumption and induces rapid amplification in number of networks.
economically cost-effective are the common features of Increasing data and information flow exponentially
embedded systems. increases number of networks, Security threats,
Most commonly embedded system is realized vulnerabilities and harmful attacks become common
as a single processor board without the operating part in these networks. Hackers, viruses, revenges
system with single application performing given set of employees and human mistakes are some examples of
tasks. Application is limited to perform tasks the security risks. Security threats can become
conceived during the development process. Embedded significantly serious if critical data can be changed or
system hardware can be specially designed or a generic even deleted. Attacks can also harm network
solution can be used. Using generic hardware speeds infrastructure or business profit disabling part or even
up the development process and simplifies system the whole network.
upgrading but limits accessible hardware features and Increasing security measures often increases
response times of the whole system. Development complexity of the system and decreases reliability of
methodology needs to ensure cost-effective approach the system. Complexity of these measures can also
in design. effect on effectiveness or morale of employees,
Opposite to desktop computing embedded partners or clients [15,16,17]. This is especially
systems has better availability and security. An important for business users, which are encouraged to
example of increasing availability in hardware design create security policy to protect their businesses and
would be replacement of unreliable mechanical parts clients from threats. Security policy is a document
like hard disks and switches with electronic switches describing what it means to be secure for a system,
and solid-state disks. Another approach in embedded organization or other entity. It incorporates company
system design is a distributed system of embedded plans to protect the company's physical and
system units. Unit represents fully functional part of information technology assets incorporating set of
the system that collaborates with other devices to laws, rules, and practices for organization management,
ensure the collective goal of the embedded system. protection and sensitive information distribution.
There are three most common sources of III. DOS ATTACK
attacks. Hackers used attacks to gain some advantage
or to warn system administrator for problems in Most commonly used terms around network
network security. Revenge employees presents second traffic are format and flow. Flow is describing traveling
most common source. Their goal is to harm their firm packets that carry data in IP networks. IP network are
by exposing data and preventing business tasks. Third group of networks using the Internet protocol (IP)
common source represents users that inadvertently version 4 or version 6 depending on the form of the
leave security vulnerabilities and enable other two logical address. Format describes structure of the data,
sources to invade the network. segments, packets, frames and bits. At the highest
Most common types of attacks use viruses or application level, data is used or generated by
illegally installed remote administration programs application. In the lower transport layer, data is
known as Trojan horse. Remote administration segmented and marked to be recognized for which
software is a group of applications used by computer application is destined. Segments are encapsulated with
administrator to simplify computer configurations and logical source and destination address and are now
administration over the remote networks. Trojan horse known as packets on network layer. Packet is
is often used to open a path for installing new viruses. commonly referred to as a unit in networks. It is
Firewall protected secure computer networks can be encapsulated in the frame with physical source and
affected with a virus only if it is spread from inside the destination network at lower data link layer. Frame is
network. Most commonly, user executes its code as it changed whenever it passes the third layer network
receives it by e-mail or downloads it from Internet. In device (router). Finally, the frame is coded in bits to be
such cases antivirus software should prevent virus code processed by network interface card. At the transport
execution. Inadequately installed or lousy updated layer when forming a segment reliable or unreliable
antivirus software significantly increases risk in delivery has to be used. Protocol used for reliable
contaminating other computers in closed networks. delivery over IP network is Transport control protocol
Network security attacks can be classified in (TCP). Opposite of TCP is UDP (user datagram
three basic categories depending of the purpose of the protocol) providing unreliable delivery [17].
attack. Reconnaissance attack is known as the attacks Nowadays, there is an issue of blocking
that gather data about network. Access attack is known unwanted packets on the Internet. One of the mayor
as attack that tries to gain access to the network service issues are DoS attack packets which generate large
by exploit the vulnerabilities. Prevent access to amounts of network flow making networks unusable to
services or the whole computer system is the goal of end user. United States Computer Emergency
Denial of service attack [16]. Readiness Team (US CERT) has identified DoS attacks
Reconnaissance attacks are usually first to be symptoms as: significant decrease in network
used by attacker to gain data used in other attacks. performance making web sites and other network
Applications like IP and port scanners and packet services become unavailable, significant increase in
sniffers gather information and data about victim unwanted e-mail messages (spam). The last attack is
services. Using this information, data vulnerabilities known as mail-bomb [1].
can be searched and tools to exploit them can be An attack does not have to exclusively be
programmed or downloaded from the Internet. To formed as DoS attack. Attacks can use DoS as a part of
decrease and simplify development of the application the elaborate plan to overload the network to expose
and to accelerate application process programmers other vulnerabilities. DoS attacks can focus security
often neglect network security issues. Packet sniffers issues to them enabling unnoticed malware installation.
can catch packets from this kind of application A DoS attack is characterized by an explicit attempt by
containing unsecured data for example, usernames and attackers to prevent legitimate users of a service from
password in plain text. Third person gathering these using that service. Attacks can be directed at any
data can access various resources that can lead to network device, including attacks on routing devices
complete computer system access. and web, electronic mail, or Domain Name System
Denial of Service (DoS) attack is designed to servers. A DoS attack can be perpetrated in a number
prevent access to services or system overloading it with of ways. The five basic types of attack are:
requests. These attacks produce large amounts of 1. Consumption of computational resources,
requests to devices that are part of the victim computer such as bandwidth, disk space, or processor
network thus blocking access to valid users: partners, time
employees or clients. The worst case of this attack is 2. Disruption of configuration information, such
Distributed DoS attack. In these attack attackers, uses as routing information.
already compromised network devices (zombies) to 3. Disruption of state information, such as
increase the amount of the attack to the victim. unsolicited resetting of TCP sessions.
In the next chapter DoS attacks are examined 4. Disruption of physical network components
closely and some defense methodology will be
examined.
5. Obstructing the communication media
between the intended users and the victim so
that they can no longer communicate
adequately.
A DoS attack may include execution of
malware intended to max out the processor's usage,
preventing any work from occurring, trigger errors in Figure 1. An exaple of basic DoS atatck
the microcode of the machine, trigger errors in the A characteristic example of vulnerability in
sequencing of instructions to force the computer into TCP network protocol is a three-way handshake. It is
an unstable state or lock-up. used to form a TCP connection between two parties:
Basic type of DoS attack is presented in figure 1. Client is sending a SYN message to the server
1. Attacker from the Internet is creating large amount 2. When server receives the SYN message it
of unwanted packets directly to victim reserves requested resources and sends SYN-
Adding intermediators and agents between ACK message back to client.
attacker and victim transfer DoS attack to DDoS. 3. Client confirms receive of SYN-ACK by
DDoS attack is presented in figure 2. Attacker is using sending an ACK message. Upon receiving the
one or more intermediate to send request to agents. ACK message server establishes the
Finally, an agent sends request to the victim. Agents connection.
and intermediator are most commonly computers If in last step attacker never send an ACK
infected with viruses or Trojan horses. These message, server has to hold resources for certain time
computers in literature are known as Zombies and are before freeing it to the system. As the amount of
infected with computer programs designed for the system resources is known to be limited after multiple
purpose of generating attacks. This tree like structure open request all server resources can be blocked and
significantly increases overload and consequences on thus server would have to refuse any requests for
the victim computer system. DDoS significantly connection for significant amount of time.
complicates finding the source of the attack and thus In case of DoS attack, the investigative
complicate the defense strategies [3]. process should begin immediately after the DoS attack
Uninfected computers can also be used as begins. There will be multiple phone calls, callbacks,
attackers. Agents send requests with faked logical emails, pages and faxes between the victim
source address of the victim and destination address of organization, one's provider, and others involved. This
the uninfected computer known as reflector. Reflectors can be a very time consuming process. It has taken
responses accoring to the IP protocol to faked logical some very large networks with plenty of resources
address which results in overloading the victim with several hours to halt a DoS attack.
requests. This type of attack is known as Distributed The easiest way to survive an attack is to have
Reflective Denial of Service (DRDoS) [4]. planned for the attack. Having a separate emergency
Attack can be also carried out exploiting block of IP addresses for critical servers with a separate
specific vulnerability in application or network route can be invaluable. A separate route (perhaps a
protocol. Application vulnerabilities are most common DSL) is not that extravagant, and it can be used for
types of attack that can be eliminated as the load balancing or sharing under normal circumstances
applications are often updated or replaced. Cisco 7xx and switched to the emergency mode in the event of an
routers have exploits in some version of operating attack [14] .
system which manifest in complete shutdown in case Filtering is often ineffective, as the route to the filter
of trying to connect through telnet using very long will normally be swamped so only a trickle of traffic
password. Other examples of attacks using the will survive. However, by using an extremely resilient
application based vulnerabilities of operating systems statefull packet filter that will inexpensively drop any
are Ping of Death[5], Land[6], TearDrop[7]. Examples unwanted packets, surviving a DoS attack becomes
of attack based on application software are Finger much easier. When such a high performance packet
bomb[8] and Chargen attack[9]. Exploiting network filtering server is attached to an ultra-high bandwidth
protocol weakness lead to DNS cache connection (preferably an Internet backbone),
poisoning[10][11] attack which files DNS cache communication with the outside world will be
memory with incorrect data. unimpaired so long as not all of the available
Other groups of DoS attack are based on bandwidth is saturated, and performance behind the
starving the victim with valid client requests. An packet filter will remain normal as long as the packet
example of these attacks would be Ping Flooding[7], filter drops all DoS packets. It should be noted, that in
SYN Flooding[12] and UDP Flooding[13]. Most this case the victim of the DoS attack still would need
commonly referenced starving DoS attack is SYN to pay for the excessive bandwidth.
Flooding attack. This attack exploits the vulnerability Firewalls have simple rules such as to allow or
of the TCP network protocol. This type of attack deny protocols, ports or IP addresses. Some DoS
constitutes with 50% in DoS starving attacks. attacks are too complex for today's firewalls, e.g. if
there is an attack on port 80, firewalls cannot prevent
that attack because they cannot distinguish good traffic Presented architecture does not have any
from DoS attack traffic. Additionally, firewalls are too protection from attacks. If attack is executed on this
deep in the network hierarchy. Routers may be affected architecture, network and their resources will become
even before the firewall gets the traffic. Nonetheless, inaccessible to other users. Network consists of the
firewalls can effectively prevent users from launching router directly connected to Internet over the ISP
simple flooding type attacks from machines behind the (Internet service provider). If the router lacks any DoS
firewall. attack protection server would be attacked and very
Some firewall present built-in capability to likely become unreachable. In some cases, the server of
differentiate good traffic from DoS attack traffic. This the victim does not have to be goal of the attack. The
capability is known as a "Defender", as it confirms the goal can be a victim router to become zombie in
TCP connections are valid before proxying TCP elaborate attack on another victim.
packets to service networks (including border routers). Network security upgrade can be achieved by
Other measures include limiting number of incoming introducing firewall between router and server.
connections from IP range, protocol analysis, Firewall has to be equipped with several DoS defense
checksum verification (so that the packets are not strategies. Architecture is presented in figure 4.
altered since transmission). Routers and switches also Nowadays, this is the most common network
include options for managing connection speed and architecture. Disadvantage of this system is lack of any
ACL (Access Control List) as firewall. protection of the router. Router can be attacked from
Servers are usually equipped with Intrusion- the Internet and blocked. Amount of network traffic
prevention systems (IPS) but they are effective if the can even damage the router. Firewall protects the
attacks have signatures associated with them. However, server and his resource but router blocks the valid
the trend among the attacks is to have legitimate network traffic to reach firewall and thus the server.
content but bad intent. Upgraded network design with an embedded
These defense methodologies can not prevent system is presented in figure 5. Task of the embedded
DoS attacks by themselves. Combining several system is to detect attempt of DoS attack by analyzing
methods can gave better results. In this paper proposal and resolving packages. To be able to carry this tasks
in network design is made to integrate embedded system is equipped with database support. This
system as defense line from DoS attacks. architecture is very similar to those in figure 4. All of
figure 4 advantages are successive. Main drawback of
IV. ATTACK PREVENTION USING EMBEDDED figure 4 is solved. In case of DoS attacks it would be
SYSTEM stopped in front of ISP router saving router from
unwanted traffic. Embedded system can be at the back
Computer network is a group of directly of the router in case that ISP does not allow changes in
connected computers. Advantages of using computer network architecture in front of the router.
networks include information and resource sharing in Advantage of using an embedded system is by
large scale. First computer network was designed by executing a precise task of defending against DoS
the Ministry of Defense of the United States of attacks. Firewall behind the embedded system does not
America in 60’s. This network is known under name have to worry about this attack and can perform his
ARPANET (Advanced Research Projects Agency tasks more efficiently. Due to simple hardware and no
Network) designed by ARPA (Advance Research other process to occupy embedded system should
Projects Agency). Computer network has evolved and perform better than regular server with installed
become available all over the world. To adapt to application against DoS attacks. Reliability of the
hardware challenges, different topologies and protocols system can be significantly increased by using the
were designed and adopted. Bus, ring and star topology embedded system. Some issues that have to be
are the most known network topologies. As the addressed in design are overloading in case of DDoS or
network grows, security becomes issues. Simple DRDoS attacks and algorithms for managing database
network design is presented in figure 3. information and network packets flow.

Figure 3. Unprotected network architecture Figure 4. Network architecure with Firewall


Embodying an embedded system device in
network architecture, other network devices like
firewall and routers benefits in performance and
functionality. This way firewall and routers may well
focus to their primary tasks. Firewall itself should not
be the first line of defense in the case of DoS attacks.
In such cases decreasing time of threat detection and
preventing the attack sun as possible is of crucial
importance to achieve both adequate network
performance and security.

REFERENCES
Figure 5. Network architecure with Embedded system
[1] Mindi McDowell, National Cyber Alert System,,
Methodoly of building such embedded system http://www.us-cert.gov/cas/tips/ST04-015.html,2007.
would be: [2] Department of Homeland Security: Cyber Security
• Definition of possible DoS, DDoS, DRDoS attack Procurement, Language for Control Systems,
• Definition of maximal amount of traffic that http://www.us-cert.gov/control_systems/pdf/
system has to be designed to work with [3] Rocky K.C. Chang, Defending against flooding based
distributed denial of service attacks : A tutorial, IEEE
• Hardware selection: generic system or specific Communications Magazine, October 2002
hardware [4] Vern Paxson, An Analysis of Using Reflectors for
• Software selection: using operating system or not Distributed Denial-of-Service Attacks, 2001,
http://www.icir.org/vern/papers/reflectors.CCR.01.pdf
• Hardware and software verification
[5] CERT® Advisory CA-1996-26,Denial-of-Service
• System evaluation Attack via ping, http://www.cert.org/advisories/CA-
• Hardware and software design 1996-26.html
• Integration [6] Cisco Security Advisory: TCP Loopback DoS Attack
(land.c) and Cisco Devices , December 1997
• Verification http://www.cisco.com/warp/public/770/land-pub.shtml
[7] Wong Natepetcharachai and Bo Zhang, DDoS Attack
These steps do not have to be serially executed. In Tools and Incidents http://www.scf.usc.edu/
attempt to create full proof embedded system some ~bozhang/ personal/PDFs/ddos.pdf
steps can be skippeed or repeated several times. [8] Internet Security System http://www.iss.net/
security_center/advice/Exploits/Services/finger/finger
_bomb/default.htm
V. CONCLUSION [9] CERT® Advisory CA-1996-01: UDP Port Denial-of-
Service Attack, http://www.cert.org/advisories/CA-
In this paper network architecture 1996-01.html
modification is proposed in order to increase protection [10] Tom Olzak, DNS Cache Poisoning: Definition and
Prevention, 2006, http://adventuresinsecurity.com/
of network parts against DoS related attacks by Papers/ DNS_Cache_Poisoning.pdf
introducing an embedded system. [11] DNS Cache Poisoning - The Next Generation, 2007,
DoS attacks are well-known and widespread http://www.secureworks.com/research/articles/ dns-
security issues in computer networks. Methods and cache-poisoning/
vulnerabilities used to perform these attacks are well [12] CERT® Advisory CA-1996-21 TCP SYN Flooding
and IP Spoofing Attacks, http://www.cert.org/
known and documented. In addition, many solutions advisories/CA-1996-21.html
offer protection depending on the type of the attacks. [13] Indiana Ave, Advanced Networking Management
Combining different solution on one device can Lab (ANML), Distributed Denial of Service
become delicate, as this device should have sufficient Attacks(DDoS) Resources, 2008:
resources to accomplish it. Our proposal to improve http://www.anml.iu.edu/ddos
DoS attack prevention is introduction of the embedded [14] Corsaire White Papers, Surviving Distributed Denial
of Service (DDoS) Attacks, 2004,
system to simplify hardware and liberate it from other http://whitepapers.silicon.com/0,39024759,60461862
tasks requested by operating system or other system p,00.htm
software of a desktop computer or server. An [15] Computer and Network Security,
embedded system could be specialized hardware and http://comptechdoc.org/independent/security/
software optimized thus achieving better performance [16] Network Security, http://www.cisco.com/ warp/
public/cc/so/neso/sqso/
than regular server or generic embedded system [17] Marin, G.A., Network Security Basics, Security &
solution. Privacy, IEEE, Nov.-Dec. 2005, Volume: 3, Issue: 6,
On page(s): 68- 72

You might also like