Free Essay

Lot2 Task 1

In:

Submitted By eodninja
Words 678
Pages 3
Recently the university web-based registration system was the subject of a DDoS (Distributed Denial of Service) attack. This type of attack is characterized by flooding the target system(s) with more network traffic than it can process, thereby forcing the system offline or limiting its ability to respond to legitimate traffic to a negligible level. It is different from a DoS (Denial of Service), in that multiple computers (potentially thousands) are used to increase the amount of traffic sent to the victim. The result of the recent attack was the complete shutdown of the web registration server and the inability of any student to register for classes for approximately 24 hours. It was further determined that the attack originated from inside our internal network; no evidence has been found that an outside attack was able to penetrate our protective layers. To that end, we have compiled a report detailing proposed protective measures that may help prevent such attacks in the future. The investigation determined that he attacker was able to obtain an administrator level password using a password-sniffing application. These applications scan network traffic and pick out username and password combinations. It is believed that since this software was deployed on a large section of our computers, it was simply a matter of time before it detected a password used by our Information Systems staff. Once the password was obtained by the attacker, he/she was then able to log into any machine and install the software used to control the computers in the DDoS attack. It was further determined that the password was sniffed specifically from a remote login session by an IS staff member to a remote machine. Information Systems strongly suggests that we implement a new security policy that requires all remote connections to be made using an encrypted process. The encrypted transmissions will prevent sniffers from reading any information contained in the captured packets. The next security policy continues from the first; publically accessible computers need to have further control restrictions placed on them. We can ensure that remote connections are encrypted, to prevent packet sniffers from reading transmitted information, but that stills leaves computers vulnerable to locally installed malicious software. The access control policy, for the entire university, needs to be strengthened; no network accounts, other than administrators, will have the ability to install software on any computer. All new installation requests will need to be approved, then directly installed by IS staff. Third, network monitoring. A network monitoring package needs to be implemented across the network. This package can perform a number of needed administration functions, but its ability to look for known attack signatures in transmitted packets is what we will focus on presently. All network connected machines send packets of information across the network to other devices/machines. A network monitoring platform can be programed to identify the signatures of known DDoS programs, similar to how humans can be identified by having different fingerprints. Upon detection of a possible threat several different actions can happen. An alert can be sent to IS with information about what machine(s) are actively sending the information, it can also provide information on what signature triggered the alert. This alert will immediately allow IS to shut down connectivity to that machine(s) and to begin researching the attacking program. The monitoring program may also provide the means to automatically stop traffic in/out of that machines until IS can inspect the alert. Another possible configuration of monitoring software is to inventory installed software packages and report any changes to the administrators. Administrators can then identify who was logged into the machine at the time the software was changed/installed. These three security policy changes, if implemented before the attack, would have stopped the attack completely. It is unfortunate that the attack was successful, but it did illustrate several holes in our current security posture. We need to take the information learned from the attack and implement changes to prevent such attacks in the future. Not doing so leaves us vulnerable.

Similar Documents

Premium Essay

Lot2 Task 1

...LOT2 Task 1 Diagram Below is a diagram which illustrates how the attack overwhelmed the Web Server. Executive Summary The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets: The attacker was allowed to install software without having Administrator rights The software used sniffed out the Administrator password either via the wire or possibly keystroke logging. Each client computer was able to send a large amount of HTTP requests to the web server. The web server accepted and processed each request. To begin with, it needs to be made mandatory that users on a machine cannot install new software to a machine. Instead, each machine should be preloaded with the tools that would be needed for a typical student to perform their work. In addition, the use of a file monitoring program, such as Tripwire, can be used to detect and notify if any changes have occurred to files or entire folders that shouldn't experience any changes. Next, if the software installed did indeed discover the password over the wire and was...

Words: 719 - Pages: 3

Premium Essay

Lot2 Task 1

...Brandon Moore LOT2 Task 1 09/14/2011 Diagram Below is a diagram which illustrates how the attack overwhelmed the Web Server. Executive Summary The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets: The attacker was allowed to install software without having Administrator rights The software used sniffed out the Administrator password either via the wire or possibly keystroke logging. Each client computer was able to send a large amount of HTTP requests to the web server. The web server accepted and processed each request. To begin with, it needs to be made mandatory that users on a machine cannot install new software to a machine. Instead, each machine should be preloaded with the tools that would be needed for a typical student to perform their work. In addition, the use of a file monitoring program, such as Tripwire, can be used to detect and notify if any changes have occurred to files or entire folders that shouldn't experience any changes. Next, if the software installed did indeed discover the password over the wire and was able...

Words: 725 - Pages: 3

Premium Essay

Lot2

...Brandon Moore LOT2 Task 1 09/14/2011 Diagram Below is a diagram which illustrates how the attack overwhelmed the Web Server. Executive Summary The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets: ← The attacker was allowed to install software without having Administrator rights ← The software used sniffed out the Administrator password either via the wire or possibly keystroke logging. ← Each client computer was able to send a large amount of HTTP requests to the web server. ← The web server accepted and processed each request. To begin with, it needs to be made mandatory that users on a machine cannot install new software to a machine. Instead, each machine should be preloaded with the tools that would be needed for a typical student to perform their work. In addition, the use of a file monitoring program, such as Tripwire, can be used to detect and notify if any changes have occurred to files or entire folders that shouldn't experience any changes. Next, if the software installed did...

Words: 724 - Pages: 3