19.07.2013 Views

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

How Can I Use <strong>QoS</strong> Tools to Mitigate DoS/Worm Attacks?<br />

1-28<br />

<strong>Enterprise</strong> <strong>QoS</strong> <strong>Solution</strong> <strong>Reference</strong> <strong>Network</strong> <strong>Design</strong> <strong>Guide</strong><br />

Chapter 1 Quality of Service <strong>Design</strong> Overview<br />

Worms have existed in one form or another since the beginning of the Internet, and have steadily<br />

increased in complexity and scope of damage, as shown in Figure 1-9.<br />

Figure 1-9 Business Security Threat Evolution<br />

Global<br />

Impact<br />

Regional<br />

<strong>Network</strong>s<br />

Multiple<br />

<strong>Network</strong>s<br />

Individual<br />

<strong>Network</strong>s<br />

Individual<br />

Computer<br />

1st Gen<br />

Boot Viruses<br />

There has been an exponential increase since 2001 in not only the frequency of DoS/worm attacks, but<br />

also in their relative sophistication. For example, more than 994 new Win32 viruses and worms were<br />

documented in the first half of 2003, more than double the 445 documented in the first half of 2002.<br />

Some of these more recent worms are shown in Figure 1-10.<br />

Figure 1-10 Recent Internet Worms<br />

2nd Gen<br />

Macro Viruses,<br />

Trojans, Email,<br />

Single Server<br />

DoS, Limited<br />

Targeted<br />

Hacking<br />

There are two main classes of DoS attacks:<br />

3rd Gen<br />

Multi-Server,<br />

DoS, DDoS,<br />

Blended Threat<br />

(Worm+ Virus+<br />

Trojan), Turbo<br />

Worms,<br />

Widespread<br />

System<br />

Hacking<br />

Next Gen<br />

Infrastructure<br />

Hacking, Flash<br />

Threats,<br />

Massive Worm<br />

Driven DDoS<br />

Negative<br />

payload<br />

Viruses,<br />

Worms and<br />

Trojans<br />

1980’s 1990’s Today Future<br />

sadmind/IIS Code Red NIMDA<br />

May<br />

2001<br />

May<br />

2001<br />

Sept<br />

2001<br />

Sophistication of Threats<br />

Apache/<br />

mod_ssl<br />

July<br />

2002<br />

MS-SQL<br />

Slammer<br />

W32/Blaster<br />

W32/Sobig<br />

W32/MyDoom<br />

W32/Bagel<br />

Spoofing attacks—The attacker pretends to provide a legitimate service, but provides false<br />

information to the requester (if any).<br />

Slamming/flooding attacks—The attacker exponentially generates and propagates traffic until<br />

service resources (servers and/or network infrastructure) are overwhelmed.<br />

Spoofing attacks are best addressed by authentication and encryption technologies. Slamming/flooding<br />

attacks, on the other hand, can be effectively mitigated through <strong>QoS</strong> technologies.<br />

Jan<br />

2003<br />

Aug<br />

2003<br />

Jan<br />

2004<br />

119478<br />

April 29<br />

2004<br />

Sasser<br />

Version 3.3<br />

119479

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!