Page 77 - StudyBook.pdf
P. 77

General Security Concepts: Attacks • Chapter 2  61

                 accept any legitimate requests, so it becomes unavailable, thus achieving the pur-
                 pose of a DoS attack. For a graphical representation of a SYN attack, refer to
                 Figure 2.1. Some stateful firewalls protect against SYN attacks by resetting pending
                 connections after a specific timeout.Another protection is with the use of SYN
                 cookies, where a computer under attack responds with a special SYN/ACK packet
                 and does not wait for an ACK response. Only when the ACK packet in response to
                 the SYN/ACK packet returns, does the entry generate a queue entry from infor-
                 mation within the special SYN/ACK packet.

                 Figure 2.1 SYN Attack Diagram


                               Thousands of
                                SYN Packets


                                                                            Attacker
                                                                           Sending Only
                                                                           SYN Packets
                                                          Internet









                                     Victim
                                Awaiting SYN/ACK Reply



                 DDoS Attacks

                 Though some forms of DoS attacks can be amplified by multiple intermediaries,
                 the first step of a DoS exploit still originates from a single machine. However, DoS
                 attacks have evolved beyond single-tier (SYN flood) and two-tier (smurf) attacks.
                 DDoS attacks advance the DoS conundrum one more painful step forward.
                 Modern attack methodologies have now embraced the world of distributed multi-
                 tier computing. One of the significant differences in the methodology of a DDoS
                 attack is that it consists of two distinct phases. During the first phase, the perpe-
                 trator compromises computers scattered across the Internet and installs specialized
                 software on these hosts to aid in the attack. In the second phase, the compromised
                 hosts (referred to as zombies) are then instructed through intermediaries (called



                                                                              www.syngress.com
   72   73   74   75   76   77   78   79   80   81   82