DoS/DDoS, IP spoofing
1. DoS/DDoS (Denial of Service / Distributed Denial of Service):
These attacks overwhelm a system, server, or network with excessive requests, making it unavailable for legitimate users.
- DoS: In a Denial of Service attack, a single attacker uses one system to flood the target.
- DDoS: In Distributed Denial of Service attacks, multiple compromised devices (a botnet) flood the target.
- Techniques:
- HTTP Flood: Sends massive amounts of HTTP requests.
- Impact: Service downtime, resource exhaustion, financial loss.
-
Example:
- Scenario: A popular e-commerce website experiences a DDoS attack during its Black Friday sale. A botnet sends millions of HTTP requests to the server, causing it to crash and preventing customers from making purchases.
-
Mitigation Strategies:
- Traffic Filtering:
- Use firewalls, Intrusion Prevention Systems (IPS), or Web Application Firewalls (WAF) to filter malicious requests.
- Rate Limiting:
- Limit the number of requests a client can send within a certain timeframe.
- Blackhole Routing:
- Temporarily redirect malicious traffic to a "null route" to protect the primary server.
- Monitoring and Alerting:
- Use tools like Cloudflare, AWS Shield, or Akamai to monitor and block suspicious activities.
2. IP Spoofing:
- Definition: The attacker alters the source IP address in a packet to disguise their identity or impersonate another system.
- Purpose:
- Evade detection.
- Bypass firewalls or IP-based access control.
- Facilitate DDoS attacks (e.g., using fake IP addresses to flood a target).
- How It Works:
- Attacker crafts packets with a forged IP source address.
- The victim responds to the spoofed IP instead of the attacker.
- Common Uses:
- Smurf Attack: Amplifies traffic to overwhelm a target.
- Man-in-the-Middle Attacks: To intercept communication.
-
Example:
- Scenario: An attacker performs a Smurf Attack by sending echo requests to a network broadcast address, with the source IP address spoofed as the victim's IP. The network devices reply to the victim, overwhelming their resources.
-
Mitigation Strategies:
- Packet Filtering:
- Implement ingress/egress filtering on routers to drop packets with invalid source addresses .
- Authentication:
- Use cryptographic techniques like TLS/SSL to verify the source of communication.
- Network Access Control:
- Restrict access to systems based on known, trusted IP addresses.
- Deploy Anti-Spoofing Tools:
- Tools like Snort (IDS) or Cisco’s IP Spoofing Detection.
Summary Table:
Attack | Target | Purpose | Technique |
---|---|---|---|
DoS/DDoS | Server/Network | Make services unavailable | Overload with traffic/requests |
IP Spoofing | Network Communication | Disguise identity, bypass rules | Forge source IP addresses |