Page 379 - StudyBook.pdf
P. 379

Infrastructure Security: Devices and Media • Chapter 6  363


                   Denial of Service Attacks
               Damage & Defense…  such as a firewall with packets to the point that it can no longer accept
                   All firewalls are vulnerable to Denial of Service (DoS) attacks. These
                   attacks attempt to render a network inaccessible by flooding a device

                   valid packets. This works by overloading the processor of the firewall by
                   forcing it to attempt to process a number of packets far past its limita-
                   tions. By performing a DoS attack directly against a firewall, an attacker
                   can get the firewall to overload its buffers and start letting all traffic
                   through without filtering it. This is one method used to access internal
                   networks protected by firewalls. If a technician is alerted to an attack of
                   this type, they can block the specific IP address that the attack is coming
                   from at their router.
                        An alternative attack that is more difficult to defend against is the
                   Distributed Denial of Service (DDoS) attack. This attack is worse, because
                   it can come from a large number of computers at the same time. This is
                   accomplished either by the attacker having a large distributed network
                   of systems all over the world (unlikely) or by infecting normal users’ com-
                   puters with a Trojan horse application, which allows the attacker to force
                   the systems to attack specific targets without the end user’s knowledge.
                   These end-user computers are systems that have been attacked in the
                   past and infected with a Trojan horse by the attacker. By doing this, the
                   attacker is able to set up a large number of systems (called zombies) to
                   perform a DoS attack at the same time. This type of attack constitutes a
                   DDoS attack. Performing an attack in this manner is more effective due
                   to the number of packets being sent. In addition, it introduces another
                   layer of systems between the attacker and the target, making the
                   attacker more difficult to trace.


                    A port is a connection point into a device. Ports can be physical, such as serial
                 ports or parallel ports, or they can be logical. Logical ports are ports used by net-
                 working protocols to define a network connection point to a device. Using
                 Transmission Control Protocol/Internet Protocol (TCP/IP), both TCP and User
                 Datagram Protocol (UDP) logical ports are used as connection points to a network
                 device. Since a network device can have thousands of connections active at any
                 given time, these ports are used to differentiate between the connections to the
                 device.
                    A port is described as well known for a particular service when it is normal
                 and common to find that particular software running at that particular port
                 number. For example,Web servers run on port 80 by default, and File Transfer
                 Protocol (FTP) file transfers use ports 20 and 21 on the server when it is in active



                                                                              www.syngress.com
   374   375   376   377   378   379   380   381   382   383   384