DOC PREVIEW
USC CSCI 530 - 3.1

This preview shows page 1-2-3-4 out of 13 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

How Come We Have DDoS?There Are Still No Strong Defenses Against DDoSWhy Is DDoS Hard to Solve?1. Simplicity Of Attack2. Preys On Internet’s StrengthsInternet Resource Utilization3. Availability Of Attack MachinesCan’t We Fix These Vulnerabilities?4. Attacks Resemble Normal Traffic5. Lack Of Enforcement ToolsWhat Is the Internet Lacking?6. Poor Cooperation In the Internet7. Effective Solutions Hard To DeployNatural consequence of the way Internet is organizedoBest effort service means routers don’t do much processing per packet and store no state – they will let anything throughoEnd to end paradigm means routers will enforce no security or authentication – they will let anything throughIt works real well when both parties play fairIt creates opportunity for DDoS when one party cheatsHow Come We Have DDoS?You can make yourself harder to attackBut you can’t make it impossibleAnd, if you haven’t made it hard enough, there’s not much you can do when you are attackedoThere are no patches to applyoThere is no switch to turnoThere might be no filtering rule to applyoGrin and bear itThere Are Still No Strong Defenses Against DDoS1. A simple form of attack2. Designed to prey on the Internet’s strengths3. Easy availability of attack machines4. Attack can look like normal traffic5. Lack of Internet enforcement tools6. Hard to get cooperation from others7. Effective solutions hard to deployWhy Is DDoS Hard to Solve?Basically, just send someone a lot of trafficMore complicated versions can add refinements, but that’s the crux of itNo need to find new vulnerabilitiesNo need to worry about timing, tracing, etc.Toolkits are readily available to allow the novice to perform DDoSEven distributed parts are very simple1. Simplicity Of AttackThe Internet was designed to deliver lots of traffic oFrom lots of places, to lots of placesDDoS attackers want to deliver lots of traffic from lots of places to one placeAny individual packet can look proper to the InternetWithout sophisticated analysis, even the entire flow can appear proper2. Preys On Internet’s StrengthsInternet was not designed to monitor resource utilizationoMost of it follows first come, first served modelMany network services work the same wayAnd many key underlying mechanisms do, tooThus, if a villain can get to the important resources first, he can often deny them to good usersInternet Resource UtilizationDDoS is feasible because attackers can enlist many machinesAttackers can enlist many machines because many machines are readily vulnerableNot hard to find 1,000 crackable machines on the InternetoParticularly if you don’t care which 1,000Botnets numbering hundreds of thousands of hosts have been discovered3. Availability Of Attack MachinesDDoS attacks don’t really harm the attacking machinesMany people don’t protect their machines even when the attacks can harm themWhy will they start protecting their machines just to help others?Altruism has not yet proven to be a compelling argument for for network securityCan’t We Fix These Vulnerabilities?A DDoS attack can consist of vast number of requests for a web server’s home pageNo need for attacker to use particular packets or packet contentsSo neat filtering/signature tools may not helpAttacker can be arbitrarily sophisticated at mirroring legitimate trafficoIn principleoNot often done because dumb attacks work so well4. Attacks Resemble Normal TrafficDDoS attackers have never been caught by tracing or observing attackOnly by old-fashioned detective workoReally, only when they’re dumb enough to boast about their successThe Internet offers no help in tracing a single attack stream, much less multiple onesEven if you trace them, a clever attacker leaves no clues of his identity on those machines5. Lack Of Enforcement ToolsNo validation of IP source addressNo enforcement of amount of resources usedNo method of tracking attack flowsoOr those controlling attack flowsNo method of assigning responsibility for bad packets or packet streamsNo mechanism or tools for determining who corrupted a machineWhat Is the Internet Lacking?It’s hard to get anyone to help you stop or trace or prevent an attackEven your ISP might not be too cooperativeAnyone upstream of your ISP is less likely to be cooperativeoISPs more likely to cooperate with each other, thoughEven if cooperation occurs, it occurs at human timescalesoThe attack might be over by the time you figure out who to call6. Poor Cooperation In the InternetThe easiest place to deploy defensive systems is near your own machine oDefenses there might not work well (firewall example)There are effective solutions under researchoBut they require deployment near attackers or in the Internet coreoOr, worse, in many placesA working solution is useless without deploymentoHard to get anything deployed if deploying site gets no direct advantage7. Effective Solutions Hard To


View Full Document

USC CSCI 530 - 3.1

Download 3.1
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view 3.1 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view 3.1 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?