AS_traceback

AS_traceback - Authenticated Autonomous Systems Traceback...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
10/28/2004 Louisiana State University Autonomous based Traceback - 1 Authenticated Autonomous Authenticated Autonomous Systems Traceback Systems Traceback Louisiana State University, Baton Rouge, LA 70803 Louisiana State University, Baton Rouge, LA 70803 These slides are available at http://www.csc.lsu.edu/~durresi/CSC4601/traceback.htm
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10/28/2004 Louisiana State University Autonomous based Traceback - 2 Overview Overview Distributed Denial of Service (DDoS) Proposed solutions  Autonomous System (AS) based solution Conclusions
Background image of page 2
10/28/2004 Louisiana State University Autonomous based Traceback - 3 Security Security People can justifiably rely on computer-based systems to perform critical  functions o national scale infrastructures: water, power, communication,  transportation, . .. o localized systems: cars, homes, workplaces, . .. People can justifiably rely on systems processing sensitive information  about them to conform to public policy o health, banking, libraries, e-commerce, government records, … Without fear of sudden disruption by cyber attacks
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10/28/2004 Louisiana State University Autonomous based Traceback - 4 Denial Of Service Denial Of Service The goal of a denial of service attack is to deny legitimate  users access to a particular resource.   An incident is considered an attack if a malicious user  intentionally disrupts service to a computer or network  resource. Resource exhaustion
Background image of page 4
10/28/2004 Louisiana State University Autonomous based Traceback - 5 Resource Exhaustion Resource Exhaustion Disk Space CPU Cycles Memory Network Bandwidth Application Resources o TCP Stack o Web Connections
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10/28/2004 Louisiana State University Autonomous based Traceback - 6 What’s the Harm? What’s the Harm? Financial loss can be difficult to estimate o Lost business o Bad publicity and damaged reputation 2002 CSI/FBI Survey o 40% of reported attacks are DOS o Average cost per attack is >$1 million Distributed DOS attacks (February 2000) o Amazon, CNN, E-Trade, eBay, etc… o Estimated losses were “several millions to billions of dollars” DOS can also be used to cover-up “real” attacks Nations critical infrastructure is also at risk
Background image of page 6
10/28/2004 Louisiana State University Autonomous based Traceback - 7 Denial of Service Attacks Denial of Service Attacks Most involve either resource exhaustion or corruption of the  operating system runtime environment. UDP bombing tcp SYN flooding ping of death smurf attack
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Louisiana State University Autonomous based Traceback - 8 Distributed Denial of Service Attacks Distributed Denial of Service Attacks (DDOS) (DDOS) Attacker logs into Master and signals  slaves to launch an attack on  a specific  target address (victim). Slaves then respond by initiating TCP, 
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/17/2012 for the course CSC 1254 taught by Professor Blanks,l during the Fall '08 term at LSU.

Page1 / 55

AS_traceback - Authenticated Autonomous Systems Traceback...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online