فا

‫ DDoS Quick Guide - Part 2

IRCAR201404212
Date:17/04/2014

The core concepts of cyber security are availability, integrity, and confidentiality. Denial of Service (DoS) attacks impact the availability of information resources. The DoS is successful if it renders information resources unavailable. Success and impact differ in that impact is relative to the victim. In this section, we look at attack possibilities by OSI layer.

Attack Possibilities by OSI Layer

OSILayer

ProtocolData Unit(PDU)

LayerDescription

Protocols

ExamplesofDenialofService TechniquesatEachLevel

PotentialImpactofDoS Attack

MitigationOptionsforAttackType

Application

Layer(7)

Data

Messageandpacketcreation begins.DBaccessisonthis level.End-userprotocolssuchas FTP,SMTP,Telnet,andRAS workatthislayer

UsestheProtocolsFTP, HTTP,POP3,&SMTP anditsdeviceisthe Gateway

PDFGETrequests,HTTPGET, HTTPPOST,= websiteforms (login,uploadingphoto/video, submittingfeedback)

Reachresourcelimitsof servicesResource starvation

Applicationmonitoringisthepracticeof monitoringsoftwareapplicationsusinga dedicatedsetofalgorithms,technologies,and approachestodetectzerodayandapplication layer(Layer7attacks).Onceidentifiedthese attackscanbestoppedandtracedbacktoa specificsourcemoreeasilythanothertypesof DDoSattacks

Presentation

Layer(6)

Data

Translatesthedataformat from senderto receiver

Usesthe Protocols Compression& Encryption

MalformedSSLRequests-- InspectingSSL encryption packetsisresourceintensive. AttackersuseSSLtotunnel HTTPattackstotargettheserver

Theaffectedsystems couldstopacceptingSSL connectionsor automaticallyrestart

Tomitigate,consideroptionslikeoffloadingthe SSLfromtheorigininfrastructureand inspectingtheapplicationtrafficforsignsof attackstrafficorviolationsofpolicyatan applicationsdeliveryplatform(ADP).Agood ADPwillalsoensurethatyourtrafficisthenre- encryptedandforwardedbacktotheorigin infrastructurewithunencryptedcontentonly everresidinginprotectedmemoryonasecure bastionhost

Session(5)

Data

Governsestablishment, termination,andsyncofsession withintheOSoverthenetwork (ex:whenyoulogoffandon)


نظرات

بدون نظر
شما برای نظر دادن باید وارد شوید

نوشته

 
تاریخ ایجاد: 18 مرداد 1393

دسته‌ها

امتیاز

امتیاز شما
تعداد امتیازها: 0