What is a DoS attack and how can it be initiated? Which one is done mostly?
In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
A DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. As clarification, distributed denial-of-service attacks are sent by two or more people, or bots, and denial-of-service attacks are sent by one person or system. As of 2014, the frequency of recognized DDoS attacks had reached an average rate of 28 per hour. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.
A denial of service (DoS) attack is an attack on the availability of network resources.DoS attacks can be initiated in many ways, including:
- Transmission failure
- Traffic redirection
- DNS attacks
- Connection flooding
Which types of connection flooding attacks do you know?
A connection flooding attack seeks to negatively affect the availability of a network recourse by exhausting or overwhelming the capacity of a communications channel. Types:
- Echo chargen
- Ping of death
- Smurth attack
- SYN flood
- Teardrop
What is an echo chargen attack?
Basically, this attack is a form of an UDP flood attack. The attacker sends a forged UDP echo request packet (with source IP of the target) to the port 19 (chargen) of another computer. This in turn sends a packet with random strings to the echo service port of the target computer responds again. As a result, the bandwidth of the computer is busy fast.
Source: http://image.slidesharecdn.com/12-tcp-dns-140326164729-phpapp01/95/12-tcpdns-14-638.jpg?cb=1395870536
What is the speciality of a ping of death attack?
A correctly formed ping message is typically 56 bytes in size, or 84 bytes when the Internet Protocol (IP) header is considered. Historically, many computer systems could not properly handle a ping packet larger than the maximum IPv4 packet size of 65535bytes. Larger packets could crash the target computer. In early implementations of TCP/IP, this bug was easy to exploit. This exploit affected a wide variety of systems, including Unix, Linux, Mac, Windows, printers, and routers. Generally, sending a 65,536-byte ping packet violates the Internet Protocol as documented in RFC 791, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often causes a system crash.
Describe smurf attacks and their impacts?
The smurf attack is an attack in which a system is flooded with spoofed ping messages. This creates high computer network traffic on the victim’s network, which often renders it unresponsive.
Smurfing takes certain well-known facts about Internet Protocol and Internet Control Message Protocol (ICMP) into account. ICMP is used by network administrators to exchange information about network state, and can also be used to ping other nodes to determine their operational status. The smurf program sends a spoofed network packet that contains an ICMP ping. The resulting echo responses to the ping message are directed toward the victim’s IP address. Large number of pings and the resulting echoes can make the network unusable for real traffic.
Show in an example how a teardrop attack is carried out.
In the teardrop attack, packet fragments are sent in a jumbled and confused order. When the receiving device attempts to reassemble them, it obviously won’t know how to handle the request. Older versions of operating systems will simply just crash when this occurs. Operating systems such as Windows NT, Windows 95, and even Linux versions prior to version 2.1.63 are vulnerable to the teardrop attack. As stated earlier, upgrading your network hardware and software is the best way to stay secure from these types of attacks.
Why are DDoS attacks more efficient than DoS attacks?
In a distributed denial of service attack, an attacker uses any convenient method to distribute a Trojan horse to as many target machines as possible. After choosing a victim, a signal is transmitted from the attacker to each zombie machine to initiate the attack. The Trojan horse on each zombie machine then launches a denial of service attack on the target.
How does an Intrusion Detection System work? What is the difference to an Intrusion Prevention System? Which goals do they have?
An intrusion detection system (IDS) is a device that monitors system activities with a view toward detecting malicious or suspicious events
IDS attempt to detect:
- Outsiders breaking into a system
- Insiders attempting to perform inappropriate actions
Goals of IDS:
- Detect wide variety of instrusions
- Previously known and unknown attacks
- Suggest need to learn/adapt to new attacks or changes in behavior
- Detect instrusions in timely fashion
- May need to be real-time especially when system responds to instrusion
- May suffice to report instrusion ocurred a few minutes or hours ago
- Present analysis in simple, easy-to-understand format
- Ideally a binary indicator
- Usually more complex, allowing analyst to examine suspected attack
- User interface critical, especially when monitoring many systems
- Be accurate
- Minimize false positives, false negatives
- Minimize time spent verifying attacks, looking for them
Name the differences between host-based and network-based IDSs.
Host-based:
- IDS runs on a host
- IDS monitors activities on this host only
Network-based:
- The IDS is a stand-alone device
- The IDS monitors the entire network or sub-network
Name the different modes of operation of an IDS. Which one is most efficient for detecting an attack?
Signature-based:
- The looks for known attacks
- To detect an attack, current activities are matched to known attack signatures
- Problem: Unable to detect new attacks (unknown signatures)
Anomaly-based:
- IDS allows only permitted behavior
- Uses models of acceptable user activities
- Raises alarm upon detection of deviation from model behavior
Hybrid:
- IDS is a combination of anomaly, signature, and/or heuristic-based approaches
Heuristic-based:
- The IDS automatically constructs a model of "normal" system behavior
- Current activities are compared to what is considered normal in order to identify unacceptable system activities
What can be done with the responses of an IDS.
- Protect systems and reduce exposure
- Alert a human
- Monitor the attack and collect data
Sources:
http://en.wikipedia.org/wiki/Intrusion_detection_system
http://www.geniusguard.com/AboutDDoS.php
http://en.wikipedia.org/wiki/Denial-of-service_attack
https://www.youtube.com/watch?v=0_59AocrBVo
http://beyondcgpa.com/tag/hacking-website-attack/
http://www.techopedia.com/definition/17294/smurf-attack