Computer and Network Security

Table of Contents

Lecture 4: DOS

IP fragmentation

When datagram encapsulated in lower-level protocols, it might need to be split into smaller portions. Specifically if datagram is bigger than data link layer maximum transmission unit (MTU) Fragmentation can be done at source host, or at intermediate step in delivery. If datagram has “do not fragment” flag set, RCMP error is sent back to origin Uses the fields: length (headers+data), fragflag (fragmented or not), offset (in multiples of 8)

Attack: The Ping of Death

SYN flooding

Nicknamed “Neptune” Attacker starts handshake with SYN-marked segment Victim replies with SYN-ACK Attacker stays silent The host can keep max number of TCP connections in half-open, after that can’t accept any more

Current solutions: filtering, increasing length of half-open queue, reduce SYN-received timeout, drop some connections, or use SYN cookies

SYN cookies:

Modern attacks

Low-volume attacks

Massive attacks

Stealthier method: attack sites that share same bottleneck link as victim, only tiny amount of data for a small amount of time from many bot machines. you congest all of the paths towards the target servers.

6e175d2b9d39621dc0b041b67bccf6f9.png

Scanning

We want to know available services at remote side. May want to fingerprint OS, app, etc.

UDP port scan:

TCP port scan:

TCP SYN scanning (“half-open” scanning)

TCP FIN scan

Idle scanning

FTP

Based on TCP, provides file transfer service, listens on port 21. Control stream used for commands, data stream for data transfer. Client tells server to connect to its local port using PORT command, server opens connection from port 20 to that port. Connection closed when transfer completes.

FTP Passive FTP
FTP Passive FTP

Problems: