Kablosuz Ağlar için bir DoS Saldırısı Tasarımı

Özet: Kablosuz ağların gelişimi ve kullanımlarının artışı ile bu ağların güvenliğinin sağlaması hususu ön plana çıkmıştır. Kablolu ağlarda bu güne dek kullanılagelmiş olan çeşitli saldırı tipleri, aynı şekilde kablosuz ağlarda da kullanılır olmuştur. En sık görülen saldırı tiplerinden biri, DoS (Denial of Service – Hizmet Reddi) şeklinde sınıflandırılmış olan saldırı çeşididir.  Kablosuz Ağ donanımı imal eden belli başlı şirketler, bu DoS saldırılarına karşı güvenlik politikaları geliştirmiş ve bunları önlemeye çabalamıştır. Ancak, bu kablosuz cihazların kullanıldığı kimi sahalarda birtakım güvenlik zafiyetleri gözlemlenmiştir. Bu çalışmada ilk olarak DoS saldırı teknikleri sınıflandırılmıştır. Ardından, kamuya açık alanlardaki kablosuz ağların DoS saldırılarına karşı zafiyetlerini test etmek için Vbasic programlama dili kullanılarak bir program yazılmıştır. Gerçekleştirilen saldırı tipleri, TCP (Transmission Control Protocol) Taşma saldırısı, UDP (User Datagram Protocol) Taşma saldırısı ve Ping Taşma saldırısı olmuştur. Neticede, gerçekleştirilen saldırılar başarılı olmuştur. 

With the development of wireless networks and the increase in their usage, the security of wireless networks has taken the centre stage. Various attack techniques that were previously used in wired networks have started to be used also in wireless networks. One of the major attacks is the one that is generalized as DoS (Denial of Service). Several wireless device producing companies have developed security policies against DoS attacks and tried to prevent them. However, in some of the fields that these devices are used, some security vulnerabilities have been observed. DoS attack techniques have been classified initially in this study. Afterwards, a program has been developed in Vbasic programming language in order to test the vulnerabilities of wireless networks in public places against DoS attacks. The attack types that were realized are TCP (Transmission Control Protocol) Flood, UDP (User Datagram Protocol) Flood and Ping Flood. Consequently, the attacks have been successful.

___

  • [1]. M. Bernaschi, F. Ferreri, L.Valcamonici, “Access points vulnerabilities to DoS Attacks in 802.11 networks”, Springer Science-Business Media, LLC 2006, 2006.
  • [2]. M. McDowell, “Understanding Denial of Servers Attacks”, United States Computer Emergency Readiness Team (USCERT), 2009.
  • [3]. Denial of Service, http://www.texascollaborative.org/SmithModule01/sec1_con.php, 10.06 2009.
  • [4]. C. Dougligeris, A. Mitrokotsa, “DDos attacks and defense mechanisms: classification and state-of-the-art”, Computer Networks, 643-666, 2004.
  • [5]. E. Bulus, “Designing attacks for SMTP servers”, International Journal of Computer Systems Science and Engineering 26-1, 43- 48, 2011.
  • [6]. Dwl-2100 AP High Speed 2.4Ghz (802.11g) Wireless 108Mbps AccessPoint,http://www.dlink.com/products/?pid=292,02.04.2009 . [7]. M.S. Stephen, B.L. Ruby, “Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures” Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004 International Workshop on Security in Parallel and Distributed Systems,543-550, 2004.
  • [8]. V. Karan, H. Hasbullah, A.Kumar, "An efficient defense method against UDP spoofed flooding traffic of denial of service (DoS) attacks in VANET." Advance Computing Conference (IACC), 2013 IEEE 3rd International. IEEE, 2013.
  • [9]. P. Payal, T. Gaurav, C. Rashmi,“Spoofing Media Access Control (MAC) and its Counter Measures”, Published in International Journal of Advanced Engineering & Application, 2010.
  • [10]. K. R. David, “Remote Denial of Service Attacks and Countermeasures,” Princeton University Department of Electrical Engineering Technical Report CEL2001-002, 2001.
  • [11]. Netmaster wireless gateway modem, http://www.netmaster.com.tr/urunler/cbw-560, 19.04.2010.
  • [12]. Microsoft Güvenlik Merkezi, “Botnet nedir”, http://www.microsoft.com/tr-tr/security/resources/botnetwhatis.aspx,11.11.2012. [13]. S. Kumar, “Ping attack-How pad is it ?”, Computers&Security, 332-337,2006.
  • [14]. F.Y. Lee, S. Shieh, “Defending against spoofed DDoS attacks with path fingerprint”, Computers&Security 24, 571-586, 2005.
  • [15]. Winsock.exe, SAMPLE: “Winsock.exe Getting Host Address Using Windows Sockets Article”, ID:154512, http://support.microsoft.com, Microsoft, 01.03.2004.
  • [16]. Port Numbers, http://www.iana.org/assignments/port-numbers, last updated 29.04.2011.
  • [17]. P. Lisa, “A list of wirelesses network attacks”, SearchSecurity.com, 2009.
  • [18]. Macshift.exe, “ Change your MAC address” , http://devices.natetrue.com/macshift /, 10.08.2004.
  • [19]. R. Abramov, A. Herzberg. "TCP Ack storm DoS attacks." Computers & Security (2012), Volume 33, 12–27, 2013.
  • [20]. G. Carl, R.R. Brooks, S. Rai, “Wavelet based Denial of service detection”, Computers &Security 25, 600-615, 2006.
  • [21]. S. Han, E. Chang, T. Dillon, “Pairing-based public-key encryption schemes with backward-and-forward security”, International Journal of Computer Systems Science and Engineering, Volume 23, Issue: 1, 303-308,2008.
  • [22]. P.K. Hussain, T. Dillon, E. Chang, F. Hussain, “Transactional risk-based decision making system in e-business interactions”, International Journal of Computer Systems Science and Engineering, Volume 25, Issue: 1, 15-28,2010.
  • [23]. U.K. Tupakula, V. Varadharajan, “A Hybrid Model against TCP SYN and Reflection DDos attacks”, International Journal of Computer Systems Science and Engineering, Volume 23, Issue: 3, 153-166,2008.