Page 215 - DCAP403_Operating System
P. 215

Operating System




                    Notes          network security threat is the infamous ping of death where an attacker sends ICMP packets to a
                                   system that exceeds the maximum capacity. Most of these attacks can be prevented by upgrading

                                   vulnerable software or fi ltering specific packet sequences.
                                   Resource attacks are the second category of network security threats. These types of attacks are
                                   intended to overwhelm critical system resources such as CPU and RAM. This is usually done by
                                   sending multiple IP packets or forged requests. An attacker can launch a more powerful attack
                                   by compromising numerous hosts and installing malicious software. The result of this kind of
                                   exploit is often referred to zombies or botnet. The attacker can then launch subsequent attacks from
                                   thousands of zombie machines to compromise a single victim. The malicious software normally
                                   contains code for sourcing numerous attacks and a standard communications infrastructure to
                                   enable remote control.

                                   Denial of Service Attack

                                   On a modern time-sharing computer, any user takes some time and disk space, which is then not
                                   available to other users. By “denying service to authorized users”, mean gobbling unreasonably
                                   large amounts of computer time or disk space, for example:
                                   1.   By sending large amounts of junk e-mail in one day, a so-called “mail bomb”, Email
                                       bombing refers to sending a large number of emails to the victim resulting in the victim’s
                                       email account (in case of an individual) or mail servers (in case of a company or an email
                                       service provider) crashing. In one case, a foreigner who had been residing in Shimla, India,
                                       for almost thirty years wanted to avail of a scheme introduced by the Shimla Housing
                                       Board to buy land at lower rates. When he made an application it was rejected on the
                                       grounds that the 169 schemes was available only for citizens of India. He decided to take
                                       his revenge. Consequently he sent thousands of mails to the Shimla Housing Board and
                                       repeatedly kept sending e-mails till their servers crashed.

                                   2.   By having the computer execute a malicious program that puts the processing unit into an
                                       infi nite loop.
                                   3.  By flooding an Internet server with bogus requests for webpages, thereby denying

                                       legitimate users an opportunity to download a page and also possibly crashing the server.
                                       This is called a Denial of Service (DoS) attack. This involves flooding a computer resource

                                       with more requests than it can handle. This causes the resource (e.g. a web server) to crash
                                       thereby denying authorized users the service offered by the resource. Another variation
                                       to a typical denial of service attack is known as a Distributed Denial of Service (DDoS)
                                       attack wherein the perpetrators are many and are geographically widespread. It is very
                                       difficult to control such attacks. The attack is initiated by sending excessive demands to the

                                       victim’s computer(s), exceeding the limit that the victim’s servers can support and making
                                       the servers crash. Denial-of-service attacks have had an impressive history having, in the
                                       past, brought down websites like Amazon, CNN, Yahoo and eBay.
                                   DoS (Denial-of-Service) attacks are probably the nastiest, and most difficult to address. These are

                                   the nastiest, because they’re very easy to launch, difficult (sometimes impossible) to track, and

                                   it isn’t easy to refuse the requests of the attacker, without also refusing legitimate requests for
                                   service.
                                   Such attacks were fairly common in late 1996 and early 1997, but are now becoming less
                                   popular.












          208                              LOVELY PROFESSIONAL UNIVERSITY
   210   211   212   213   214   215   216   217   218   219   220