Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon...

17
TEAM DNS Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams

Transcript of Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon...

Page 1: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

TEAM DNSDistributed Denial of Service Attacks

Dennis Galinsky, Brandon Mikelaitis, Michael Stanley

Brandon Williams, Ryan Williams

Page 2: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

Agenda

Types of Attack

Source of Attacks

Prevention

History of Attacks

Business Aspect

Page 3: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

TCP Connection Attack (SYN FLOOD)

Normal Connection SYN Flood

Page 4: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

HTTP Get Flood HTTP Post Flood

Application Layer Attack

Page 5: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

Source of Attack Botnets

What are they?How are they Created?Notable Botnet Army’s

○ Storm○ Rbot

For-HireHow much does it cost?Rent an ArmyThreat Level?

Page 6: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

Prevention

Detect the threat Mitigate the threat

Distinguish good traffic from bad trafficBlock bad traffic while still allowing good

traffic through. Protect all points of vulnerability.

Page 7: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

Prevention Methods

Blackholing Overprovision Routers Firewalls Intrusion Detection Systems (IDS) Third Party Protection

Page 8: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

Blackholing

Blocking all traffic the network as far upstream as possible.

Traffic is diverted to a “black hole” where it is discarded.

Good and bad packets are discarded.Not an efficient solution to a DDoS attack.Attacker’s objective is still fulfilled.

Page 9: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

Firewalls

Not purpose-built for DDoS attacks, but provide some protection.

Reside too far downstream in the network.

Lack of anomaly detection, can’t recognize when valid protocols are being used in an attack.

Cannot perform antispoofing on a packet by packet basis.

Page 10: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

Third Party Protection

DNS based redirect service. Border Gateway Protocol (BGP) based

service. Content Delivery Network (CDN)

providers.

Page 11: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

History of Attacks

Anonymous Hacktivist Group (Civil Disobedience)

Lizard Squad PlayStation 4 Network, Xbox Live, Facebook

GitHub Attack Chinese Government, Replaced JS Code to Force reload pages

Happening Now Digital Attack Map

Page 12: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.
Page 13: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

Business AspectCosts for Businesses

Page 14: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.
Page 15: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

DDoS Attacks Lead to: Software & Hardware Replacements Reduction in Revenue Loss of Consumer Trust Customer Data Theft

Page 16: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

Questions?

Types of Attack

Source of Attacks

Prevention

History of Attacks

Business Aspect

Demonstration

Page 17: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.

References https://www.youtube.com/watch?v=BzgsT-_GC4Q https://www.youtube.com/watch?v=sUrM7_G_y7A http://searchsecurity.techtarget.com/definition/SYN-flooding http://us.norton.com/botnet/ http://www.webroot.com/blog/2012/06/06/ddos-for-hire-services-

offering-to-take-down-your-competitors-web-sites-going-mainstream/

https://www.blacklotus.net/learn/about-ddos-attacks/ http://www.slate.com/articles/technology/technology/2010/12/

in_defense_of_ddos.html http://www.cbronline.com/news/cybersecurity/cost-of-ddos-attack

s-tops-half-a-billion-dollars-4498766

http://databreachinsurancequote.com/cyber-insurance/cyber-insurance-can-serve-as-an-ideal-ddos-attack-response-plan/

http://www.kaspersky.com/about/news/business/2015/A-single-DDoS-attack-can-cost-a-company-more-than-400000-dollar