The "No Network is 100% Secure" series
- Denial of Service (DoS) Attack -
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
Contact Us
What is a denial of service (DoS) attack?: DoS attacks, also know as
Distributed DoS attacks and sometimes "The Ping of Death" are attacks designed
to deny legitimate computing service users of a particular resource. Typically,
DoS attacks would be targeted at high profile web servers such as Microsoft, Banks,
E-Commerce sites and so on. Other applications such as mail servers may be
attacked as well, although this is less common and is known as "mail bombing" or
SPAMMING attacks. Any IP addressable device including routers and DNS name
servers can be targeted. Attacks can be made using
wired networks acting in a distributed, coordinated manner (the most common method)
or via wireless technology. Essentially, a DoS attack floods the target
with more packets than it can handle, thus reducing the victims performance to
the point where it is effectively inoperable.
Denial-of-service attacks can also lead to problems in the network LAN/WAN connecting
to the actual computer being attacked. For example, the bandwidth of a router between
the Internet and a LAN may be consumed by an attack, effecting service and
performance not only on the targeted computer, but also on the entire network.
If an attack is conducted on a sufficiently large scale, entire geographical regions
of Internet connectivity can be compromised.
A common method of attack involves saturating the target (victim) machine with
communications requests, such as pings or port 25/80/443 requests such that
the server cannot respond to legitimate traffic, or responds so slowly as to be
rendered effectively unavailable. DoS attacks are often initiated by Techno-Geeks
with too much time on their hands known as "script kiddies". DoS attacks are
generally performed with malicious intent (or just for the fun of causing trouble)
versus having financial, espionage or theft motives.
However, cases of Blackmailing potential victims with the threat of attack is
not unheard of. It should be noted that during the 2008 South Ossetia war,
a DDoS attack against the Georgian Government site rendered several Government
servers inoperable for 24 hours. In addition, there is speculation that
"Terrorists" may start using DoS technology sometime in the near future.
Computers that have
been previously infected with a virus and can now be controlled remotely as a "bot"
or "zombie" are frequently used to deliver DoS attacks. Additionally, there are a
wide array of programs around that can be used to launch DoS-attacks. Most of
these programs are completely focused on performing DoS-attacks, while others are
also true Packet injectors, thus able to perform other tasks as well.
A permanent denial-of-service (PDoS), also known as phlashing, is an attack that
damages a system so badly that it requires replacement or reinstallation of
hardware. Unlike a DDoS, a PDoS attack exploits security flaws in the remote
management interfaces of the victim's hardware, be it routers, printers, or
other networking hardware. These flaws leave the door open for an attacker to
remotely 'update' the device firmware to a modified, corrupt or defective
firmware image, therefore bricking the device and making it permanently unusable
for its original purpose. The PDoS is a pure hardware targeted attack which can
be much faster, more destructive and requires fewer resources than using a
botnet in a DDoS attack.
Because of these features, and the potential and high probability of security
exploits on Network Enabled Embedded Devices (NEEDs), this technique has come
to the attention of numerous hacker communities such as Hack a Day.
PhlashDance is a tool created by Rich Smith, an employee of Hewlett-Packard's
Systems Security Lab, used to detect and demonstrate PDoS vulnerabilities.
What can be done to defend against DoS attacks? Unfortunately, not a lot.
Major web sites and networks have been brought to their knees by even primitive
DoS attacks. There are a few niche products that have limited abilities to
reduce the effects of certain types of attacks but for the most part, there is no
magic pill to immunize networks from this vulnerability.
Establishing a schedule for periodically checking for firmware updates for
devices susceptible to "phlashing' attacks and signing up for CERT bulletins
would certainly be a good first step. Having proactive monitoring (such as a
NOC) in place will help to quickly identify that an attack is under way. A
well designed NOC will provide the NOC Techs with enough information to be able
to identify the type of attack that is under way and may even have tools to
stop or at least abate it. IMO, there is nothing worse than learning about
IT outages from customers!
Having an independent consulting group such as
Easyrider LAN Pro
perform a security audit on your network will at least help to identify where
you are most exposed. The first step in plugging vulnerability holes is first
knowing where the holes are.
The easiest way to survive an attack is to plan for the attack well in advance.
Having a separate emergency block of IP addresses for critical servers with a
separate route can be invaluable. A separate route to the Internet (perhaps DSL)
is not extravagant, and it can be used for load balancing or sharing under
normal circumstances and switched to emergency mode in the event of an attack.
There are also products available that can simulate a DoS attack which can be
helpful in testing your defense strategy.
Filtering is often ineffective, since the route to the filter will normally
be swamped so that only a trickle of traffic will survive. However, by using
a resilient stateful packet filter that will inexpensively drop any unwanted
packets, surviving a DoS attack becomes somewhat easier. There are also firewalls,
routers and switches available that offer some measure of resiliance against at
least some modes of attack. But many DoS attacks are much too complext for common
defense mechanisms like firewalls to handle. For an example, some firewalls do not
know the difference between "good" packets and "bad" packets. So an attack on
a web server would most likely sail right through most firewalls, switches and
routers. In addition, even if a device drops the packet on the floor, doing
so still consumes CPU cycles and network bandwidth. Checkpoint, Juniper and Cisco
PIX are several that do have helpful DoS fighting features that "throttle" incoming
traffic. However, these schemes usually just stop all incoming traffic once
a DoS attack is detected. This protection method still denies service to
legitimate users which is not always helpful as far as maintaining service
availability is concerned.
How many types of DoS attacks are there?: Providing detailed explanations
about all of the many attack types that are out there is beyond the scope of
this white paper. However, I will briefly outline some of the more common
ones. Some DoS attacks include the execution of malware code. These variants
are discussed in the
virus white paper.
ICMP flood aka Smurf attack, Ping flood, and Ping of death.
A smurf attack relies on misconfigured network devices that allow packets to be sent
to the broadcast address of the network, rather than a specific machine. The network
then serves as a smurf amplifier. In such an attack, the perpetrators will send
large numbers of IP packets with the source address faked to appear to be the
address of the victim. The network's bandwidth is quickly used up, preventing
legitimate packets from getting through to their destination.
Ping flood is based on sending the victim an overwhelming number of ping
packets, usually by directing hundreds and even thousands of "botnet" infected
computers to coordinate an attack. It is very simple to launch. The primary
requirement is having access to greater bandwidth than the victim.
SYN flood sends a flood of TCP/SYN packets, often with a forged sender address.
Each of these packets creates a connection request. The victim server
spawns half-open connections, by sending back a TCP/SYN-ACK packet, and waiting
for a response (that will never come) from the sender address. These half-open
connections consume all of the available connections the server is able to make,
preventing it from responding to legitimate requests until after the attack ends.
Peer-to-peer attacks Peer-to-peer attacks are different from regular
botnet-based attacks. In this method, the attacker instructs clients of large
peer-to-peer hubs to disconnect from their peer-to-peer network and to connect
to the victim's website instead. As a result, several thousand computers may
aggressively try to connect to a target website. While a typical web server can
handle a few hundred connections per second before performance begins to degrade,
most web servers fail almost instantly under five or six thousand connections/sec.
With a moderate size peer-to-peer attack a site could potentially be hit with
up to a million or more connections in a short order. While peer-to-peer attacks
are easy to identify with signatures (assuming that logs are being actively
monitored), the large number of IP addresses that need to be blocked means that
this type of attack can overwhelm mitigation defenses. And even if a mitigation
device can block all of the attacking IP addresses, there are other problems to
consider. For example, there is a period of time after the connection is opened on
the server side but before the signature itself comes through. Mitigation cannot
start until the identifying signature can be detected and
the connection torn down. And even just tearing down thousands of connections
every second consumes resources that can significantly slow down service performance.
Reflected attack is a distributed denial of service attack (DDoS) that
involves sending forged requests of some type to a very large number of computers
that will reply to the requests. Using IP spoofing, the source address is set to
that of the targeted victim, which means all the replies will go to (and flood)
the target. Many services can be exploited to act as reflectors. Some are harder
to block than others.
Degradation-of-service attack "Pulsing" zombies are compromised computers
that are directed to launch intermittent and short-lived floodings of victim websites
with the intent of merely slowing it rather than crashing it. This type of attack,
referred to as "degradation-of-service" rather than "denial-of-service", can be
more difficult to detect than regular zombie invasions and can disrupt and hamper
connection to websites for prolonged periods of time, potentially causing more
damage than concentrated floods. Degradation-of-service attacks are
complicated further because of teh difficulty in discerning whether the attacks
really are attacks or just healthy and likely desired increases in website traffic.
Unintentional attack describes a situation where a website ends up denied,
not due to a deliberate attack, but simply due to a sudden enormous spike in popularity.
Denial-of-Service Level II The goal of DoS L2 (possibly DDoS) attack is to
cause a launching of a defense mechanism which blocks the network segment from
which the attack originated. In case of distributed attack or IP header modification,
this method may fully block the attacked network from Internet, but without system
crash.
A few high visibility incidents:
The first major attack involving DNS servers as reflectors occurred in January 2001.
The target was Register.com. This attack, which forged requests for the MX records
of AOL.com (to amplify the attack) lasted about a week before it could be traced back
to all attacking hosts and shut off. It used a list of tens of thousands of DNS
records that were a year old at the time of the attack.
In February, 2001, the Irish Government's Department of Finance server was hit by a
denial of service attack carried out as part of a student campaign from NUI Maynooth.
The Department officially complained to the University authorities and a number of
students were disciplined.
In July 2002, the Honeynet Project Reverse Challenge was issued. The binary that
was analyzed turned out to be yet another DDoS agent, which implemented several DNS
related attacks, including an optimized form of a reflection attack.
On two occasions to date, attackers have performed DNS Backbone DDoS Attacks on the
DNS root servers. Since these machines are intended to provide service to all
Internet users, these two denial of service attacks might be classified as attempts
to take down the entire Internet, though it is unclear what the attackers' true
motivations were. The first occurred in October 2002 and disrupted service at 9 of
the 13 root servers. The second occurred in February 2007 and caused disruptions at
two of the root servers.
In February 2007, more than 10,000 online game servers in games such as Return to
Castle Wolfenstein, Halo, Counter-Strike and many others were attacked by "RUS"
hacker group. The DDoS attack was made from more than a thousand computer units
located in the republics of the former Soviet Union, mostly from Russia, Uzbekistan
and Belarus. Minor attacks are still continuing to be made today.
In the weeks leading up to the five-day 2008 South Ossetia war, a DDoS attack
directed at Georgian government sites containing the message: "win+love+in+Rusia"
effectively overloaded and shut down multiple Georgian servers. Websites targeted
included the Web site of the Georgian president, Mikhail Saakashvili, rendered
inoperable for 24 hours, and the National Bank of Georgia. While heavy suspicion
was placed on Russia for orchestrating the attack through a proxy, the St.
Petersburg-based criminal gang known as the Russian Business Network, or R.B.N,
the Russian government denied the allegations, stating that it was possible that
individuals in Russia or elsewhere had taken it upon themselves to start the
attacks.
Next in the security white paper series:
Firewall White Paper
Virus White Paper
SPAM White Paper
Best Practices White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Shelfware White Paper
Last modified March 25, 2009
Copyright 1990-2009 Easyrider LAN Pro