Preview

NTP DDoS Kenny William Aditya 1601249236

Better Essays
Open Document
Open Document
1480 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NTP DDoS Kenny William Aditya 1601249236
NTP-based DDoS Attack
DDoS Definition
DDoS attack (Distributed Denial-of-Service) is an action carried out with purpose of interrupting a server or internet resource to respond to its users. In DDoS attack, there are more than two persons or bots which attack the victim, by flooding the server with forged request, causing the server unable to respond to the actual request. In NTP-based DDoS attack, the attack is done with the help of open NTP server.
What?
NTP (Network Time Protocol) is used for time synchronization between computer and other devices connected to the internet. NTP mostly used simple UDP, instead of the more secured TCP. UDP is a connection-less protocol, that does not need handshaking, and verification to establish transmission (Techwriters Future, 2009). This made NTP vulnerable to be abused by hacker for DDoS attack. Since most computer currently use NTP for synchronizing time, NTP is accepted by most computer.
When, Who, Where?
NTP-based DDoS attack has grown from 2013, and publicly spread out in January 2014 by CloudFlare, a website security company (Graham-Cumming, 2014). According to them, they have succeeded on mitigating a 400 Gbps NTP-based DDoS attack against one of their customer’s website (Prince, 2014). This indicate NTP-based DDoS attack can be very powerful since most powerful DDoS attack previously recorded is around 300 Gbps (Constantin, 2013). The source of attack came from multiple network with unsecured NTP servers, which abused by the attacker. Most of the network that contribute on the attack came from China, followed by Europe and Asia (CloudFlare, 2014).
How and Why?
NTP-based DDoS attack use amplification technique, same like DNS-based DDoS attack. The attacker sent a request to open NTP server with forged source IP address. This technique called, spoofing IP address. The forged IP address is actually belongs to the victim that targeted by the attacker, which leads to the NTP server send respond to the victim. To make



References: CloudFlare. (2014, February). Retrieved from https://docs.google.com/spreadsheet/ccc?key=0AhuvvqAkGlindHFtS0pJa0lYZGNlLXNONWtlY01qanc&usp=sharing#gid=0 Constantin, L. (2013, March). Retrieved from InfoWorld: http://www.infoworld.com/article/2613446/internet/ddos-attack-against-spamhaus-was-reportedly-the-largest-in-history.html Graham-Cumming, J. (2014, January). Retrieved from CloudFlare: http://blog.cloudflare.com/understanding-and-mitigating-ntp-based-ddos-attacks/ Postel, J. (2002, May). Retrieved from ietf: http://tools.ietf.org/html/rfc347 Prince, M. (2014, February 13). Retrieved from CloudFlare: http://blog.cloudflare.com/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack/ S.Taher, B. A. (2013, December). Retrieved from Internet Storm Center: https://isc.sans.edu/diary/NTP+reflection+attack/17300 Stenn, H. (2014, November). Retrieved from NTP: http://support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplification_Attack_using Techwriters Future. (2009). UDP. Retrieved from IPV6: http://ipv6.com/articles/general/User-Datagram-Protocol.htm US-CERT. (2014, January). Retrieved from US-CERT: https://www.us-cert.gov/ncas/alerts/TA14-017A

You May Also Find These Documents Helpful

  • Good Essays

    Experiencing problems with the web site is the most prominent signs that a database, attack that can occur. The attack on a computer hosts are often zombie computers with broadband connections to the internet threat have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and direct the attack, often through a botnet/dosnet. Launching a DoS attack can have a negative impact on the business of an organization. The result of the attacker can lead to a loss of reputation along with economic losses. A successful DoS (Denial of Service) attack can disable computers and subsequently, an entire network. An attack launched by a moderately configured system can crash PCs that are of high value. The following steps should be followed when conducting a DoS penetration test: 1) Test heavy loads on the sever; 2) Check for systems and devices vulnerable…

    • 392 Words
    • 2 Pages
    Good Essays
  • Better Essays

    This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The complete protection of the campus infrastructure from a (D)DoS is futile however, there are measures that can be put into place which will significantly reduce the risk of an outage due to a (D)DoS. Standardizing policies and procedures, segmenting the network into functional areas, active monitoring, and a defense in depth approach will reduce the duration and severity of any future (D)DoS attack.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Manages information-consistency capacities, i.e., gives a dependable byte stream between two nodes on a system. TCP and UDP exert at this particular level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets:…

    • 719 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Best Essays

    References: Gilbert, H. (1995). Introdcution to TCP/IP. Retrieved April 6, 2008, from Yale.edu Web site: http://www.yale.edu/pclt/COMM/TCPIP.HTM…

    • 2834 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    It 240 Appendix F

    • 260 Words
    • 2 Pages

    Transmission Control Protocol / Internet Protocol (TCP/IP) TCP is the protocol used in networking that provides a connection-oriented, reliable way for applications to communicate large amount of data at one time over a network. IP is a connectionless protocol responsible for addressing network devices, and routing packets between…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Best Essays

    6. Tankard, C. (2011, August). Advanced persistent threats and how to monitor and deter them. Network Security, 2011(8), 1619. doi:10.1016/S1353-4858(11)70086-…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Best Essays

    Velasco, V. (2000, November 21). Introduction to IP spoofing. SANS (SysAdmin, Audit, Network, Security) Institute. Retreieved from ttp://www.sans.org/reading_room/whitepapers/threats/introduction-ip-spoofing_959…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    iPremier, a Seattle based company, was founded in 1996 by two students from Swathmore College. iPremier had become one of a few success web-based commerce, selling luxury, rare, and vintage goods over the Internet. Most of iPremier’s goods sell between fifty and a few hundred dollars, and the customer buys the products online with his or her credit card. iPremier’s competitive advantage is their flexible return policies which allows the customer to thoroughly check out the product and make a decision to keep the product or return it. The majority of iPremier customers are high end, and credit limits are not a problem.…

    • 1542 Words
    • 7 Pages
    Good Essays

Related Topics