Minggu, 15 September 2013

Xathrya Sabertooth

Xathrya Sabertooth


Taxonomy of DDoS Attacks and Defense Mechanisms

Posted: 14 Sep 2013 06:02 AM PDT

This article will serve as summary of DDoS attack & defense mechanism and divide the topic into several categories based on several things. The taxonomy is based on [1] and has support by other materials (if any).

This article won’t tell the subject in detail. Instead, it try to summarize what the essential of [1] is.

[ Attacks Mechanism ]

Classification By Degree of Automation

During the attack preparation, the attacker needs to locate prospective agent and infect them with the attack code.

  1. Manual Attacks
  2. Semi-Automatic Attacks
  3. Automatic Attacks

Classification By Communication Mechanism

The division to following category is based on semi-automatic attack. On semi-automatic attack, attacker need to connect his machine to slave in order to launch an attack.

  1. Direct Communication
  2. Indirect Communication

Classification By Scanning Strategy

Both automatic and semi-automatic recruit the agent machine by deploying automatic scanning and propagation techniques.

The scanning is method used by compromised agent (slave) and probe IP to attack.

  1. Attacks with Random Scanning
  2. Attacks with Hitlist Scanning
  3. Attacks with Topological Scanning
  4. Attacks with Permutation Scanning
  5. Attacks with Local Subnet Scanning

Classification By Propagation Mechanism

This mechanism describe how the attack code is sent to agent machine.

  1. Central Source Propagation
  2. Back-Chaining Propagation
  3. Autonomous Propagation

Classification By Exploitated Vulnerability

Based on the vulnerability that is targeted during an attack.

  1. Protocol Attacks
  2. Brute-Force Attacks
    1. Filterable Attacks
    2. Non-filterable Attacks

Classification By Attack Rates Dynamics

This depend on the dynamic of an attack.

  1. Continuous Rate Attacks
  2. Variable Rate Attacks
    1. Increasing Rate Attacks
    2. Fluctuating Rate Attacks

Classification By Impact

Depend on the impact of a DDoS attack cause on victim.

  1. Disruptive Attacks
  2. Degrading Attacks

[ Defense Mechanism ]

Classification By Activity Level

  1. Attack Prevention Mechanism
    1. Attack Prevention Mechanism
      1. System Security Mechanism
      2. Protocol Security Mechanism
    2. Denial of Service (DoS) Prevention Mechanism
      1. Resource Accounting Mechanism
      2. Resource Multiplication Mechanism
  2. Reactive Mechanism
    1. Attack Detection Strategy
      1. Mechanism with Pattern Attack Detection
      2. Mechanism with Anomaly Attack Detection
      3. Mechanism with Hybrid Attack Detection
      4. Mechanism with Third-Party Attack Detection
    2. Response Strategy
      1. Agent Identification Mechanisms
      2. Rate-Limiting Mechanisms
      3. Filtering Mechanisms
      4. Reconfiguration Mechanisms
    3. Cooperation Degree
      1. Autonomous Mechanisms
      2. Cooperative Mechanism
      3. Interdependent Mechanisms

Classification By Deployment Location

  1. Victim-Network Mechanism
  2. Intermediate-Network Mechanism
  3. Source-Network Mechanism

Reference

  1. Mirkovic, J., Martin, J., and Reiher P. A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. Computer Science Department, University of California, Los Angeles. [ link ]
  2. Mirkovic, J. Dietrich, S., Dittrich, D., Reihe, P. 2004. Internet Denial of Service: Attack and Defense Mechanism. Prentice Hall
  3. Tripwire, "Tripwire for Server", http://www.tripwire.com/products/servers
  4. McAfee,"Personal Firewall", http://www.mcafee.com/myapps/firewall/ov_firewall.asp
  5. McAfee,"VirusScan Online," http://www.mcafee.com/myapps/vso/default.asp
  6. S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.
  7. Cisco, "Strategies to protect against distributed denial of service attacks," http://www.cisco.com/warp/public/707/newsflash.html
  8. J. Shapiro and N. Hardy, "EROS: A principle-driven operating system from the ground up," IEEE Software, pp. 26-33, January/February 2002
  9. E.O'Brien,"NetBouncer : A practical client-legitimacy-based DDoS defense via ingress filtering,"http://www.nai.com/research/nailabs/development-solutions/netbouncer.asp
  10. J. Leiwo, P. Nikander, and T. Aura, "Towards network denial of service resistant protocols," In Proceedings of the 15th
    International Information Security Conference (IFIP/SEC 2000), August 2000.
  11. Cisco, "Strategies to protect against Distributed Denial of Service Attacks,"http://www.cisco.com/warp/public/707/newsflash.html
  12. T. Aura, P. Nikander, and J. Leiwo, "DOS-resistant authentication with client puzzles," In Proceedings of the 8th International Workshop on Security Protocols
  13. C. Schuba, I. Krsul, M. Kuhn, G. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a denial of service attack on TCP," In
    Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997.
  14. A. Juels and J. Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks," In Proceedings of the 1999 Networks and distributed system security symposium (NDSS'99), Mar 1999.
  15. Y. L. Zheng and J. Leiwo, "A method to implement a denial of service protection base," In Information Security and Privacy, volume 1270 of LNCS, pages 90–101, 1997.
  16. O. Spatscheck and L. Peterson, "Defending against denial-of service requests in Scout," In Proceedings of the 1999 USENIX/ACM Symposium on Operating System Design and Implementation, February 1999.
  17. A. Garg and A. L. Narasimha Reddy, "Mitigating denial of service attacks using QoS regulation," Texas A & M University Tech report, TAMU-ECE-2001-06
  18. F. Lau, S. H. Rubin, M. H. Smith, and Lj. Trajkovic, "Distributed denial of service attacks," In Proceedings of 2000 IEEE International Conference on Systems, Man, and Cybernetics, October 2000.

Turn Android Smartphone to IP Web Camera

Posted: 14 Sep 2013 05:00 AM PDT

Android Operating System is one of popular operating system for mobile device (smartphone, tablets, etc) beside Windows Phone, Apple iOS, etc.

This article will discuss about how to use our android smartphone as a IP Webcam (web camera). There are many reasons to do so, for example: you don’t have much budget to install complex CCTV system but need to have a simple one at home. You just need an android smartphone with camera (well, it would be rare if we see smartphone without camera) and connect it to the internet.

For a summary, this is what I use in this article:

  1. Sony XPeria U
  2. Windows 8 64-bit
  3. IP Webcam app (download from Google Play on your smartphone)

Remember that the list above is the one I have used.

Base Theory

In this method, we turn our smartphone into an IP Camera. Our phone will act as a camera and connect to internet. As any device connected to internet, it has some IP assigned. Using that IP, we can open and see the display given by phone remotely.

Summary, your phone will do a video streaming through net. WATCH OUT THE DATA TRAFFIC !!

Preparation

You phone and your PC should be at the same network, otherwise it won’t work. You can connect both device using same wifi router.

Make sure your network has IP address between 10.0.0.1 to 10.255.255.255 as the application will likely bound to that range IP address.

On Phone Side

Download IP Webcam on Google Play.

Make sure your phone ins connected to internet

There are lot of configuration available on IP Webcam. You can configure the video resolution, orientation, connection settings, etc. For simplicity, we use default configuration.

Start the Server once you have done configuring.

You will got your phone camera and a IP address at the bottom. Write down this IP address.

On PC Side

Make sure your computer is connected to internet.

Using IP address you got from your phone, open a web browser and enter following address:

http://IP:8080/videofeed

Where IP is the IP you got and 8080 is port opened at your phone.

Useful Note

Better resolution means better quality. However this also means bigger data transferred from your phone. If data traffic is expensive for you, you can always decrease the quality in configuration.

Android Application Development using Windows

Posted: 14 Sep 2013 03:52 AM PDT

There are also version of this article for Linux Ubuntu and Linux Slackware64.

Android Operating System is one of popular operating system for mobile device beside Windows mobile, Apple iOS, etc. This article main focus would be concentrated on installation of development tools, which is Eclipse IDE, Android SDK, and Android Developer Tool on Windows 8 64-bit.

Why Eclipse? Eclipse is an open source Integrated Development Environment and has full support for Android. It’s also quite simple.

In the time i write this article, I use Windows 8 64-bit.This article will focus on Windows  8, though you can use this method and apply it to other Windows version. You must also have active internet connection to do installation and fetching required packages.

You can skip some part if you are confident enough that you have done it before. Well, but nothing wrong by read a whole article, right? ;)

Now let’s we go!

Preparation

We need to install JAVA and Eclipse. But running Eclipse need JAVA so we will install JAVA first.

When using 64-bit machine, make sure you have JAVA and Eclipse for same architecture. It means, you cannot have Eclipse 64-bit and using JAVA 32-bit. It goes same for 32-bit Eclipse and 32-bit JAVA.

At this point, I assume you have install JAVA and Eclipse.

Installation

Android Developer Tool Plugin

Now let’s moving to installation of Androit Developer Tool (ADT). It is a special Eclipse plugin contains integrated android environment for building Android application using eclipse.

Start eclipse. Now navigate to:

Help - Install New Software - Add

enter the following information:

Name: ADT Plugin  Location: https://dl-ssl.google.com/android/eclipse/

Click on OK. Now select “Developer Tools” and/or “NDK Plugins”. Click Next to begin installation. Wait for installation to finish its work.

Install the SDK

Next we will install Android SDK. Downlad Android SDK starter pack from this link

Download the latest SDK. By the time I write this article, the latest version is 22.0.5. It is an installer with filename installer_r22.0.5-windows.exe.

Run the installer file and choose a path for installing SDK. In my case I will leave the SDK on C:\Program Files (x86)\Android\android-sdk

Install SDK Platforms

Now we need to install platforms and optional additional plugins or sample codes. Start SDK manager (If you just do install the Android SDK, you will be asked to start the SDK):

C:\Program Files (x86)\Android\android-sdk\SDK Manager.exe

Seleck SDK Platforms you want. I choose Android 2.3.3 API 10 as my smartphone Sony Xperia U use this one. When you have selected all packages you want, click Install Selected. You will be prompted to Accept License. Click Accept All and then Install.

Create Android Virtual Device

Now we have to join Eclipse IDE with Android SDK and create and Android Virtual Device (AVD). Android Virtual Device is an emulator to run your application on top of your computer.

In Eclipse, navigate to:

Window - Preferences - Android

Enter location of your Android SDK installation. In my case it is in C:\Program Files (x86)\Android\android-sdk. Press OK.

Now navigate to:

Window - Android Virtual Device Manager - New

Insert following information into:

AVD Name: AndroidVirtualDevice  Device: <your preferred device>  Target: <chose any desired Android version and API level available>

Click OK. The new Android Virtual Device will be created in the directory:

C:\Users\<your username>\.android\avd

Congratulations! Now you can develop android apps on Windows!

Tidak ada komentar:

Posting Komentar