Hi, I have indexed the below text file "filename.txt" using the test code G1.java..
When I search for "check for old" trm.seekceil() method gives "checking" and "checks" and ignores "check" which is there in text document.. It is working for most cases except a few Please kindly help me.. -- Thanks and Regards Vignesh Srinivasan
COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Aravind N Samsung SDS 10-01-2012 Network Security COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL TABLE OF CONTENTS 1 S No. MODULE SUB MODULE 1 INTRODUCTION Case Studies Network Vulnerabilities Protocol Attacks & Solutions VPN IPSec Firewall Attacks & Prevention Evasion Techniques 2 DoS Attacks Firewall DoS Attacks Network DoS Attacks OS Specific DoS Attacks Network DoS Défense Mechanism 3 Network Solutions Content Monitoring & Filtering Deep Inspection Sample Attack Objects & Groups 4 References References COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security CASE STUDY 1: •A consultant wants to evaluate how secure a website is? •What all information he needs ? •What can be the intermediate steps? 2 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security Solution: •Network Scanning tools •Check for vulnerable ports •Check for old and vulnerable versions of services on open ports •Transfer a code which exploits buffer overflow of that service. •Gain access to the host (gateway or Web Server) 3 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security CASE STUDY 2: •You are a Project Manager of a software firm and you want that the designers practice coding standards which ensures/enhances the security of the network where the product will be used. 4 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security Solution: •Use Tools to catch Memory Leaks •Check Buffer Overflow conditions in the code. •Exploiting a Buffer Overflow: 5 void foo() { char buf[512]; ... gets(&buf); ... } buf Return address SP Input pushl $68732f ('/sh\0') pushl $6e69622f ('/bin') movl sp, r10 pushl $0 pushl $0 pushl r10 pushl $3 movl sp, ap chmk $3b COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security CASE STUDY 3: •You are the System Administrator of a company and you want to ensure that your company’s resources are protected from various attacks through the network. 6 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security Solution: 7 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security Agenda of the Presentation: •Vulnerabilities •Protocol Attacks & Solutions 8 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Picture 9 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security Layer 2 Vulnerabilities •Switches are Key components to communications at the Data Link Layer Possible Attacks: - Content-Addressable Memory (CAM) table overflow - VLAN hopping - Spanning-Tree Protocol (STP) manipulation - Media Access Control (MAC) Address spoofing - Address Resolution Protocol (ARP) attack - Private VLAN - DHCP “starvation” 10 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security Layer 3 Vulnerabilities •Most Popular protocol in Layer 3 is IP (Internet Protocol) Following are the vulnerabilities related to IP: - IP Spoofing (Blind Attack) - Routing Attacks - ICMP & DNS Attacks - Ping flood - Ping of Death attack - Teardrop attack - Packet sniffing (Passive Attack) 11 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security Layer 4 Vulnerabilities •Key risks associated with TCP and UDP at the Transport Layer Possible Attacks: - TCP “SYN” Attack - Man in Middle attack - Port Scan Attack - UDP Flood Attack - TCP Session Hijacking (Active Attack) - Land Attack 12 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security Application Layer Vulnerabilities •Exploit weaknesses in HTTP servers, FTP servers and Telnet servers, SMTP, POP3, IMAP, SNMP, SSH, SNTP, SIP, H.323 protocols to launch attacks. •Application layer attacks include Viruses, Worms, Spam etc. Possible Attacks: - Scripting vulnerabilities - Buffer overflows - Cookie poisoning - Hidden field manipulation - Parameter tampering - Cross-site scripting - SQL injection 13 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security Solutions 14 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Security Data Privacy Privacy provides security by allowing information to be accessed by authorized parties Integrity Integrity ensures that the data can be modified by authorized parties Authentication Authentication ensures that the authenticated party is the one who he claims to be and not a n imposter Non-Repudiation Non-repudiation ensures that there is no replay of the data sent through the channel in the past 15 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Data Privacy •Cryptography •Types of Cryptography - Encryption: Secret Key, Public Key - Hash Functions: HMAC, MD5, SHA •Encryption Algorithms - DES, 3DES, RSA •Key Exchange Algorithms - Diffie-Hellman 16 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Virtual Private Networks VPN •A virtual private network (VPN) provides a means for securely communicating between remote computers across a public wide area network (WAN), such as the Internet. •A VPN connection can link two local area networks (LANs) or a remote dialup user and a LAN. The traffic that flows between these two points passes through shared resources such as routers, switches, and other network equipment that make up the public WAN. To secure VPN communication while passing through the WAN, the two participants create an IP Security (IPSec) tunnel. IPSec: •IP Security (IPSec) Tunnel to secure VPN communication while passing through the WAN. •IPSec constitutes of a pair of unidirectional Security Associations (SAs) that specify –Security Parameter Index (SPI) –Destination IP address –Security protocol (Authentication Header or Encapsulating Security Payload) •IPSec provides following security functions through SA –Privacy via encryption –Content Integrity via data authentication –Sender authentication if using certificates and –Non-repudiation via data origin authentication 17 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL IPSec VPN Tunnels 18 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Protecting a Network •There can be many reasons for invading a protected network: Gather information about the protected network Overwhelm a host with bogus traffic to induce a Denial-of-Service (DoS) Overwhelm the protected network with bogus traffic to induce a network wide DoS Overwhelm the firewall with bogus traffic to induce DoS Cause damage to and steal data from a host on a protected network Gain access to a host to obtain information Gain access to a host to launch other exploits Gaining control of a firewall to control access to network that it protects •Stages of Attack – Each attack progresses in two major stages: Perform reconnaissance a. Map the network and determine which hosts are active (IP address sweep). b. Discern which ports are active (port scans) on the hosts discovered by the IP address sweep. c. Determine the operating system (OS), which might expose a weakness in the OS or suggest an attack to which that particular OS is susceptible. Launch the attack a. Conceal the origin of the attack. b. Perform the attack. c. Remove or hide evidence. 19 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Firewall •Firewalls are used to thwart the efforts of attackers to achieve the previous objectives when they attempt to target a protected network. They provide security against the following types of attacks: IP Address Sweep Port Scanning Network Reconnaissance using IP Options Operating System Probes •SYN and FIN flags set •FIN Flag without ACK Flag •TCP Header without Flags set Evasion Techniques •FIN scan •Non-SYN Flags •IP Spoofing •IP Source Route Options 20 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Firewall IP Address Sweep: •An address sweep occurs when one source IP address sends 10 ICMP packets to different hosts within a defined interval (5000 microseconds is the default). The purpose of this scheme is to send ICMP packets - typically echo requests - to various hosts in the hopes that at least one replies, thus uncovering an address to target. •Using the default settings, if a remote host sends ICMP traffic to 10 addresses in 0.005 seconds (5000 microseconds), the security device flags this as an address sweep attack, and rejects all further ICMP echo requests from that host for the remainder of the specified threshold time period. The device detects and drops the tenth packet that meets the address sweep attack criterion. 21 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Firewall Port Scanning: •A port scan occurs when one source IP address sends IP packets containing TCP SYN segments to 10 different ports at the same destination IP address within a defined interval (5000 microseconds is the default). The purpose of this scheme is to scan the available services in the hopes that at least one port will respond, thus identifying a service to target. •Using the default settings, if a remote host scans 10 ports in 0.005 seconds (5000 microseconds), the device flags this as a port scan attack, and rejects all further packets from the remote source for the remainder of the specified timeout period. The device detects and drops the tenth packet that meets the port scan attack criterion. 22 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network Reconnaissance Using IP Options IP Options: •The Internet Protocol standard RFC 791, Internet Protocol, specifies a set of options to provide special routing controls, diagnostic tools, and security. These options appear after the destination address in an IP packet header, as shown below: 23 The following IP Options can be used by an attacker for reconnaissance: •Record Route •Timestamp •Stream ID •No Options •Security •Strict Source Route •Loose Source Route COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Operating System Probes SYN and FIN Flags Set: •Both the SYN and FIN control flags are not normally set in the same TCP segment header. •The SYN flag synchronizes sequence numbers to initiate a TCP connection. •The FIN flag indicates the end of data transmission to finish a TCP connection. Their purposes are mutually exclusive. •A TCP header with the SYN and FIN flags set is anomalous TCP behavior, causing various responses from the recipient, depending on the OS. •Firewall checks if the SYN and FIN flags are set in TCP headers. If it discovers such a header, it drops the packet. 24 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Operating System Probes FIN Flag without ACK Flag: •Figure below shows TCP segments with the FIN control flag set (to signal the conclusion of a session and terminate the connection). Normally, TCP segments with the FIN flag set also have the ACK flag set (to acknowledge the previous packet received). •Because a TCP header with the FIN flag set but not the ACK flag is anomalous TCP behavior, there is no uniform response to this. The OS might respond by sending a TCP segment with the RST flag set. Another might completely ignore it. The victim’s response can provide the attacker with a clue as to its OS. •Firewall checks if the FIN flag is set but not the ACK flag in TCP headers. If it discovers a packet with such a header, it drops the packet. 25 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Operating System Probes TCP Header Without Flags Set: •A normal TCP segment header has at least one flag control set. •A TCP segment with no control flags set is an anomalous event. Because different operating systems respond differently to such anomalies, the response (or lack of response) from the targeted device can provide a clue as to the type of OS it is running. •Firewall drops all TCP packets with a missing or malformed flags field. 26 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Firewall Evasion Techniques: •When gathering information or launching an attack the attacker tries to avoid detection by firewalls. •Although some IP address and port scans are blatant and easily detectable, more wily attackers use a variety of means to conceal their activity. Such techniques as using FIN scans instead of SYN scans - which attackers know most firewalls and intrusion detection programs detect - indicate a evolution of reconnaissance and exploit techniques to evade detection and successfully accomplish their tasks. •Below are the evasion techniques to avoid being detected by Firewalls: –FIN scan –Non-SYN Flags –IP Spoofing –IP Source Route Options FIN scan 27 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Evasion Techniques •FIN Scan: •A FIN scan sends TCP segments with the FIN flag set in an attempt to provoke a response (a TCP segment with the RST flag set) and thereby discover an active host or an active port on a host. •An attacker might use this approach rather than perform an address sweep with ICMP echo requests or an address scan with SYN segments because he or she knows that many firewalls typically guard against the latter two approaches - but not necessarily against FIN segments. •The use of TCP segments with the FIN flag set might evade detection and thereby help the attacker succeed in his or her reconnaissance efforts. •To thwart a FIN scan: –Block TCP segments with FIN flag set but not the ACK Flag –Reject all non-SYN packets that do not belong to an existing session 28 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Firewall •Non-SYN Flags: •By default, the security device checks for SYN flags in the first packet of a session and rejects any TCP segments with non-SYN flags attempting to initiate a session. •When the security device with SYN flag checking enabled receives a non-SYN TCP segment that does not belong to an existing session, it drops the packet and sends the source host to a TCP RST - unless the code bit of the initial non-SYN TCP packet is also RST. In that case, the security device simply drops the packet. 29 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Evasion Techniques •IP Spoofing: •To insert bogus source address in the packet header to make the packet appear to come from a trusted source and gain access to a restricted area of network. •Layer 3 IP Spoofing: •When interfaces on the security device are operating in Route or NAT mode, the mechanism to detect IP spoofing relies on route table entries. If, for example, a packet with source IP address 10.1.1.6 arrives at ethernet3, but the security device has a route to 10.1.1.0/24 through ethernet1, IP spoof checking notes that this address arrived at an invalid interface - as defined in the route table, a valid packet from 10.1.1.6 can only arrive via ethernet1, not ethernet3. Therefore, the device (Firewall) concludes that the packet has a spoofed source IP address and discards it. 30 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Evasion Techniques •IP Source Route Options: •Source routing was designed to allow the user at the source of an IP packet transmission to specify the IP addresses of the routers (also referred to as “hops”) along the path that he or she wants an IP packet to take on its way to its destination. •The original intent of the IP source route options was to provide routing control tools to aid diagnostic analysis. You can then use either the loose or strict source route option to direct traffic along a specific path, using the addresses you learned from the results that the record route or timestamp options produced. •By changing router addresses to alter the path and sending several packets along different paths, you can note changes that either improve or lessen the success rate. Through analysis and the process of elimination, you might be able to deduce where the trouble lies. •Attackers can use IP source route options to hide their true address and access restricted areas by specifying a different path. 31 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Evasion Techniques 32 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Evasion Techniques •IP Source Route Options: •Users can enable the Firewall device to either block any packets with loose or strict source route options set or detect such packets and then record the event in the counters list for the ingress interface. Various Options available are: •Deny IP Source Route Option: Enable this option to block all IP traffic that employs the loose or strict source route option. Source route options can allow an attacker to enter a network with a false IP address. •Detect IP Loose Source Route Option: The security device detects packets where the IP option is 3 (Loose Source Routing) and records the event in the counters list for the ingress interface. This option specifies a partial route list for a packet to take on its journey from source to destination. The packet must proceed in the order of addresses specified, but it is allowed to pass through other routers in between those specified. •Detect IP Strict Source Route Option: The security device detects packets where the IP option is 9 (Strict Source Routing) and records the event in the counters list for the ingress interface. This option specifies the complete route list for a packet to take on its journey from source to destination. The last address in the list replaces the address in the destination field. 33 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Denial of Service (DoS) Attack Defences •The intent of a denial-of-service (DoS) attack is to overwhelm the targeted victim with a tremendous amount of bogus traffic so that the victim becomes so preoccupied processing the bogus traffic that it is unable to process legitimate traffic. •If a DoS attack originates from multiple source addresses, it is known as a distributed denial of service (DDoS) attack. Typically, the source address of a DoS attack is spoofed. The source addresses in a DDoS attack might be spoofed or the actual addresses of hosts that the attacker has previously compromised and which he or she is now using as “zombie agents” from which to launch the attack. 34 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Denial of Service Attacks Firewall DoS Attacks Session Table Flood SYN-ACK-ACK Proxy Flood Network DoS Attacks SYN Flood SYN Cookie ICMP Flood UDP Flood Land Attack OS Specific DoS Attacks Ping of Death Teardrop Attack Win Nuke 35 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Firewall DoS Attack Defences •If an attacker discovers the presence of the firewall, he might launch a denial- of-service (DoS) attack against it instead of the network behind it. •Session Table Flooding: –When the session table is full, that host cannot create any new sessions and begins rejecting new connection requests. –The following settings on firewall can mitigate such attacks •Source and Destination Based Session Limits •Aggressive Aging 36 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Firewall DoS Attack Defences 37 •Source & Destination Based Session Limiting: COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Firewall DoS Attack Defences 38 •Aggressive Aging out Sessions: •In this example, you set the aggressive aging out process to commence when traffic exceeds a high-watermark of 80 percent and cease when it retreats below a low-watermark of 70 percent. You specify 40 seconds for the aggressive age-out interval. When the session table is more than 80 percent full (the high-mark threshold), the security device decreases the timeout for all sessions by 40 seconds and begins aggressively aging out the oldest sessions until the number of sessions in the table is under 70 percent (the low-mark threshold). COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Firewall DoS Attack Defences 39 •SYN-ACK-ACK Proxy Flood: •To thwart such an attack, you can enable the SYN-ACK-ACK proxy protection SCREEN option. After the number of connections from the same IP address reaches the SYN-ACK-ACK proxy threshold, the firewall rejects further connection requests from that IP address. COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network DoS Attack Defences 40 A denial-of-service (DoS) attack directed against one or more network resources floods the target with an overwhelming number of SYN, ICMP, or UDP packets, or with an overwhelming number of SYN fragments. Depending on the attacker’s purpose and the extent and success of previous intelligence gathering efforts, the attacker might single out a specific host, such as a router or server; or he or she might aim at random hosts across the targeted network. Either approach has the potential of upsetting service to a single host or to the entire network, depending on how critical the role of the victim is to the rest of the network. SYN Flooding SYN Cookie ICMP Flooding UDP Flooding Land Attack COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network DoS Attack Defences SYN Flooding: •A SYN flood occurs when a host becomes so overwhelmed by SYN segments initiating incomplete connection requests that it can no longer process legitimate connection requests. •Two hosts establish a TCP connection with a triple exchange of packets known as a three-way handshake: A sends a SYN segment to B; B responds with a SYN/ACK segment; and A responds with an ACK segment. •A SYN flood attack inundates a site with SYN segments containing forged (spoofed) IP source addresses with nonexistent or unreachable addresses. B responds with SYN/ACK segments to these addresses and then waits for responding ACK segments. Because the SYN/ACK segments are sent to nonexistent or unreachable IP addresses, they never elicit responses and eventually time out. •By flooding a host with incomplete TCP connections, the attacker eventually fills the memory buffer of the victim. Once this buffer is full, the host can no longer process new TCP connection requests. The flood might even damage the victim’s operating system. Either way, the attack disables the victim and its normal operations. 41 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network DoS Attack Defences 42 COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network DoS Attack Defences 43 SYN Flood Protection: •Impose a limit on the number of SYN segments permitted to pass through the firewall per second. We can base the attack threshold on the destination address and port, the destination address only, or the source address only. When the number of SYN segments per second exceeds one of these thresholds, the security device starts proxying incoming SYN segments, replying with SYN/ACK segments and storing the incomplete connection requests in a connection queue. The incomplete connection requests remain in the queue until the connection is completed or the request times out. COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network DoS Attack Defences 44 SYN Flood Protection: •The proxied connection queue has completely filled up, and the security device is rejecting new incoming SYN segments. This action shields hosts on the protected network from the bombardment of incomplete three-way handshakes. •The security device starts receiving new SYN packets when the proxy queue drops below the maximum limit. COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network DoS Attack Defences 45 SYN Cookie: •SYN Cookie is a stateless SYN proxy mechanism you can use in conjunction with the defenses against a SYN flood attack. •When SYN Cookie is enabled on the security device and becomes the TCP-negotiating proxy for the destination server, it replies to each incoming SYN segment with a SYN/ACK containing an encrypted cookie as its Initial Sequence Number (ISN). •The cookie is a MD5 hash of the original source address and port number, destination address and port number, and ISN from the original SYN packet. After sending the cookie, the device drops the original SYN packet and deletes the calculated cookie from memory. If there is no response to the packet containing the cookie, the attack is noted as an active SYN attack and is effectively stopped. •If the initiating host responds with a TCP packet containing the cookie +1 in the TCP ACK field, the device extracts the cookie, subtracts 1 from the value, and recomputes the cookie to validate that it is a legitimate ACK. •If it is legitimate, the device starts the TCP proxy process by setting up a session and sending a SYN to the server containing the source information from the original SYN. •When the device receives a SYN/ACK from the server, it sends ACKs to the sever and to the initiation host. At this point the connection is established and the host and server are able to communicate directly. COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network DoS Attack Defences 46 SYN Cookie: •Figure shows how a connection is established between an initiating host and a server when SYN Cookie is active on the security device. COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network DoS Attack Defences 47 ICMP Flooding Protection: •An ICMP flood typically occurs when ICMP echo requests overload its victim with so many requests that it expends all its resources responding until it can no longer process valid network traffic. •Set a threshold that once exceeded invokes the ICMP flood attack protection feature. (The default threshold value is 1000 packets per second.) If the threshold is exceeded, the security device ignores further ICMP echo requests for the remainder of that second plus the next second as well. COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network DoS Attack Defences 48 UDP Flooding Protection: •UDP flooding occurs when an attacker sends IP packets containing UDP datagram's with the purpose of slowing down the victim to the point that it can no longer handle valid connections. •After enabling the UDP flood protection feature, you can set a threshold that, once exceeded, invokes the UDP flood attack protection feature. (The default threshold value is 1000 packets per second.) If the number of UDP datagram's from one or more sources to a single destination exceeds this threshold, the security device ignores further UDP datagram's to that destination or the remainder of that second plus the next second as well. COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL Network DoS Attack Defences 49 LAND Attack Protection: •Combining a SYN attack with IP spoofing, a land attack occurs when an attacker sends spoofed SYN packets containing the IP address of the victim as both the destination and source IP address. The receiving system responds by sending the SYN-ACK packet to itself, creating an empty connection that lasts until the idle timeout value is reached. Flooding a system with such empty connections can overwhelm the system, causing a denial of service. •When you enable the SCREEN option to block land attacks, the security device combines elements of the SYN flood defense and IP spoofing protection to detect and block any attempts of this nature. COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL OS-Specific DoS Attack Defences 50 •If an attacker not only identifies the IP address and responsive port numbers of an active host but also its operating system (OS), instead of resorting to brute-force attacks, he or she can launch more elegant attacks that can produce one- or two-packet “kills.” •The attacks presented in this section can cripple a system with minimum effort. Ping of Death: •The maximum allowable IP packet size is 65,535 bytes, including the packet header, which is typically 20 bytes long. An ICMP echo request is an IP packet with a pseudo header, which is 8 bytes long. Therefore, the maximum allowable size of the data area of an ICMP echo request is 65,507 bytes (65,535 - 20 - 8 = 65,507). •However, many ping implementations allow the user to specify a packet size larger than 65,507 bytes. •A grossly oversized ICMP packet can trigger a range of adverse system reactions such as denial of service (DoS), crashing, freezing, and rebooting. When you enable the Ping of Death SCREEN option, the security device detects and rejects such oversized and irregular packet sizes even when the attacker hides the total packet size by purposefully fragmenting it. COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL OS-Specific DoS Attack Defences 51 Teardrop Attack: •Teardrop attacks exploit the reassembly of fragmented IP packets. In the IP header, one of the fields is the fragment offset field, which indicates the starting position, or offset, of the data contained in a fragmented packet relative to the data of the original unfragmented packet. •When the sum of the offset and size of one fragmented packet differ from that of the next fragmented packet, the packets overlap, and the server attempting to reassemble the packet can crash, especially if it is running an older operating system that has this vulnerability. •After you enable the Teardrop Attack SCREEN option, whenever the device detects this discrepancy in a fragmented packet, it drops it. COPYRIGHT © 2008 SAMSUNG SDS Co., Ltd. ALL RIGHTS RESERVED | CONFIDENTIAL OS-Specific DoS Attack Defences 52 WinNuke: •Win Nuke is a DoS attack targeting any computer on the Internet running Windows. The attacker sends a TCP segment—usually to NetBIOS port 139 with the urgent (URG) flag set—to a host with an established connection. This introduces a NetBIOS fragment overlap, which causes many machines running Windows to crash. After rebooting the attacked machine, the following message appears, indicating that an attack has occurred: An exception OE has occurred at 0028:[address] in VxD
--------------------------------------------------------------------- To unsubscribe, e-mail: java-user-unsubscr...@lucene.apache.org For additional commands, e-mail: java-user-h...@lucene.apache.org