当前位置:网站首页>[principles and technologies of network attack and Defense] Chapter 5: denial of service attack

[principles and technologies of network attack and Defense] Chapter 5: denial of service attack

2022-07-07 18:02:00 Godams

5.1 summary

Denial of service attacks (DoS Denial of Service), Through consumption ⽹ Network bandwidth or system resources , bring ⽹ The network or system is overloaded , With ⾄ Paralysis ⽽ stop ⽌ Provide normal ⽹ Contact service or ⽹ The quality of network service has decreased significantly , Or change the system configuration to make the system ⽆ The law is normal ⼯ do , Most of the time , Denial of service attacks refer to the former .

DDoS It refers to multiple attackers attacking ⼀ More than one ⽬ The target launches a denial of service attack .

Classification of denial of service attacks :
(1) Classified by attack target

  • Node type DoS
    • Host type : Mainly for the host CPU、 disk 、 Operating system, etc DoS attack
    • Applied : Mainly for application software DoS attack
  • ⽹ Network connection type :
    benefit ⽤⽬ mark ⽤ Users need to exchange when obtaining server resources DNS Packet characteristics , send out ⼤ Quantitative
    camouflage DNS Packets cause ⽬ mark ⽤ Household ⽹ Network congestion , Cannot access ⽬ Standard server .

(2) Sort by attack mode

  • Resource destroying DoS: Run out of network bandwidth 、 Host memory 、CPU And disks
  • Physically destructive DoS: Destroy the host or network node DoS attack
  • Service terminated DoS: The attack causes the service to crash or terminate

(3) By type of victim

  • Server side DoS: Target the server
  • client DoS: Target clients

(4) Classify by whether the attack is directed at the victim

  • Direct type DoS: Attack the victim directly
  • Indirect type DoS:

(5) Attribute taxonomy

  • Attack static attributes
  • Attack dynamic properties
  • Attack interaction properties

(6) Ballroom classification

  • Dance partners : Communicate with the victim host
  • Storms : Disturb the victim with a lot of noise
  • Trap class : Interfere with the communication between the normal user and the victim host
  • Intervention class : Cut off the communication connection between the normal user and the victim host

(7) Classified by attack mechanism

  • Highly toxic bag ( Killer bag ): Exploit loopholes in the protocol itself or software , Send some abnormal packets to the target , Make the target system exception when processing
  • Storm type : Send a large number of packets to the target
  • Redirection type ( Man-in-the-middle attack ): If the target host of redirection does not exist, it is a denial of service attack

5.2 Highly toxic packet denial of service attack

benefit ⽤ Loopholes in the protocol itself or software , Send to the victim host ⼀ Some malformed packets made the victim's host crash .

  1. Fragment attack (Teardrop)
    benefit ⽤ Abnormal data points ⽚ Cause to receive ⽅ In processing points ⽚ Data crash .
  2. Ping of Death attack ( Death ping or ICMP Bug attack )
    benefit ⽤ Loopholes in protocol implementation , Send super ⻓ Of ping package , Cause the victim's system to be abnormal
  3. Land attack
    Send to the victim TCP SYN package ,⽽ The source address of these packages and ⽬ Of IP The address was disguised as the victim's IP The earth site . Source end ⼝ and ⽬ End of ⼝ It's the same .( It feels a bit like it forms a circuit itself , Then the system crashed )
  4. Loop attack ( Oscillation attack )
    When both produce ⽣ Output end ⼝ Build between ⽴ After the connection , The first ⼀ Ends ⼝ The output of becomes the ⼆ Ends ⼝ The loss of ⼊, Lead to ⼆ Ends ⼝ production ⽣ Output , At the same time ⼆ Ends ⼝ The output of also becomes the ⼀ Ends ⼝ The loss of ⼊. such ,⼀ Two ends ⼝ There will be ⼤ Quantity data guarantee production ⽣. Cause a denial of service .

5.3 Storm denial of service attack

Mainly by sending a large number of data packets to the attack target , Achieve the goal of paralysis

Attack principle ( step ):
(1) The attacker finds one or more systems that can be invaded by scanning tools
(2) Attackers use scanning tools to scan and attack systems with security vulnerabilities
(3) Through Handler notice Agent The target and type of attack

The reason why the storm denial of service attack can succeed :
(1)TCP/IP Protocol vulnerability
(2) The Internet provides best-effort service , Do not distinguish whether the data traffic is attack traffic
(3) The Internet has no authentication mechanism , Thus, it is easy to IP cheating
(4) Routers in the Internet do not have data tracking capabilities , Therefore, it is impossible to verify whether a packet comes from the place it claims
(5) Network bandwidth and system resources are limited , This is the most fundamental reason

  • direct ⻛ Critical attack
    ⽤ The types of packets used for attacks include :TCP floods、ICMP echo request / In response to ⽂、UDP The flood
    • PING⻛ Violent attack
    • SYN⻛ Violent attack ( build ⽴TCP Half a connection ), Consume server half connection resources .
    • TCP Connection exhaustion ( build ⽴ complete TCP Connect )
    • UDP⻛ Violent attack : Send to the victim host ⼤ Quantity comparison ⻓ Of UDP Data packets , Occupy ⽤⽹ Network bandwidth , Reach blocking ⽹ It's complicated ⽬ Of .
    • HTTP⻛ Violent attack :⽤HTTP Protocol pair ⽹⻚ Resources on ⾏ Legitimate request , Keep getting data from the victims , Occupy ⽤ The connection accounts for ⽤ bandwidth .
    • An attack on the mail system
      • Mail bombs : Go to ⼀ Send to email address ⼤ Same amount of mail , Exhausted its storage space .
      • spam

Reflective denial of service attack :

  • Do not send packets directly to the target host , Instead, a large number of packets are sent indirectly to the target host through the intermediate host . The attacker ⼀ Generally, the camouflage source address is the victim host IP The earth site , towards ⼀ platform ⾼ speed 、⾼ Bandwidth server or ⼤ The volume server sends ⼤ Volume packets . After receiving these packets, the server will reply to the source address ⼤ Volume response package . In this way, it becomes multiple ⾼ Performance server to ⽬ The target host initiates DoS attack .⼀ Generally, the attacker will choose to make ⽤ The number of reply response packages is far ⼤ The protocol server that requests the packet , Form flow discharge ⼤ attack , Enhance destructive .

  • NTP Reflective denial of service attack

    • NTP agreement :⽹ Collateral ⽤ To synchronize the time of each computer . send ⽤UDP signal communication . When ⼀ individual NTP Server received ⼀ individual monlist After requesting package , Will return to NTP The server enters ⾏ Over communication
      Last 600 A client's IP Address . Response package according to 6 individual IP Address ⼀ Group ,⼀ Requests will return at most 100 A response package .
    • The attacker carried out NTP The steps of the attack
      • scanning . benefit ⽤ Scanning software in Internet The scan is open 123 End ⼝ Server for . Go in parallel ⼀ Step to confirm whether it is turned on NTP service .
      • attack . benefit ⽤ Stiff control ⼫⽹ Camouflage the attacked host IP towards NTP Server send monlist request .
    • prevention and cure ⽅ Law
      Basic telecom operators are needed throughout ⽹ Organize and implement source address verification within the scope .
      In the international market ⼊⼝ And interconnection layer ⾯ Yes NTP Flow into ⾏ Monitoring and regulation , Lower to ⾃ Abroad ⼤ scale NTP DRDoS The possibility of attack .
  • SSDP Reflective denial of service attack
    Simple Service Discovery Protocol .⽤ In the local area ⽹ Internal discovery connection ⽤ Plug and play ⽤ equipment .UPnP agreement .( through ⽤ Plug and play ⽤ technology )

    • SSDP DRDoS Attack traffic is ⼤ Quantitative SSDP Reply message .
    • The attacker forged SSDP Request source address field , Make intelligent plug and play ⽤ The device will SSDP Reply message sending ⾄ attack ⽬ mark
    • To guard against :
      • No need to start plug and play to close ⽤ Plug and play of service devices ⽤ service .
      • Confirm all connections ⽹ Your device will not plug and play ⽤ Services are exposed to the Internet ⽹ On . Yes ⾮ trust ⽹ Collaterals ⽤SSDP agreement . prevent ⽌ The device was exploited by the attacker ⽤ Reflect nodes for attacks .
  • Botnet
    Stiff ⼫ Lord ⼈ A coordinated group of malicious computers controlled by command and control channels

    • IRC Stiff ⼫⽹ Collateral
      IRC Botnet diagram

      • The controller passes ⼀ individual IRC Server control ⼤ Quantitative rigidity ⼫ host . But when IRC The server was compromised , The controller will lose control ⼫⽹ Control of the network . Simple structure , But the robustness is poor , Easily destroyed .
    • P2P Stiff ⼫⽹ Collateral
      P2P Botnet
      be based on P2P Control and command mechanism .⽹ Every in the network ⼀ Taiwan is stiff ⼫ The host is rigid with this ⼫⽹ One or some stiffness in the network ⼫ Host build ⽴ Connect .⽽ And build ⽴ After the connection , It can also connect to the host ⾏ to update . such , Stiff ⼫⽹ Luo Zhu ⼈ Just by going to ⼀ Peer hosts send control information , Into the ⽽ Control the whole ⽹ Collateral .

5.4 Application of denial of service attack

Denial of service attacks are not only directly used to paralyze the attack target , It can also be used as a privilege escalation attack , An auxiliary technology for obtaining illegal access .
SYN Flood It can be used for IP hijacked 、IP Cheating, etc .
Some systems have vulnerabilities when starting , It can be restarted through a denial of service attack , Then exploit the vulnerability
Yes DNS Denial of service attacks can achieve the purpose of impersonating addresses .

5.5 Denial of service attack detection and response technology

Denial of service attack detection technology

  • DoS Signature detection of attack tools : Specific port 、 Sign a 、 Specific data content
  • Detect according to abnormal flow : A large number of target host domain name resolution 、 Limit communication flow 、 Oversized ICMP and UDP Data packets 、 It does not belong to normal connection communication TCP and UDP Data packets 、 The content of the data segment contains only literal and numeric characters

Denial of service attack response technology

In principle , There are mainly 4 Kind of response DoS The way to attack : The first method is to discard malicious packets ; The second is to control at the source DoS attack ; The third is to trace the source of the attack ; The fourth is that the router dynamically detects and monitors traffic

  • Packet filtering , Discard malicious packets
  • Source side control : Usually participate DoS The source used by the attack group IP The addresses are fake , You can reduce or eliminate counterfeiting through source side filtering IP Address access , For example, use a router to check the network packet source directly connected to it IP Address , If the law is not thrown away .
  • trace :IP trace 、ICMP trace 、 Link test ( Start with the router closest to the victim host , Interactively test its upstream link , Recursive execution , Know to determine the attack path )
  • Router dynamic detection and control : Attack detection system 、 Attack mitigation system 、 Monitoring management system
  • Flow cleaning ( Most effective ) Yes DDoS Attacks are mixed with normal business data ⼀ The flow from the pump goes into ⾏ purify , Purify DDoS Attack traffic , Maintain normal business traffic .
原网站

版权声明
本文为[Godams]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/188/202207071521205930.html