Detailed Report on Memcrashed Exploits, DDoS Attacks & Solutions

Verified

Added on  2023/04/08

|11
|2470
|54
Report
AI Summary
This report provides an in-depth analysis of Memcrashed exploits, a type of Distributed Denial of Service (DDoS) attack that leverages vulnerable UDP Memcached servers to overwhelm victims with internet traffic. It discusses the principles and key processes of key-value databases, including examples of their use, and describes the mechanics of Memcrashed exploits, where attackers spoof requests and flood victims with amplified traffic. The report offers mitigation solutions such as binding Memcached, hardening configurations, disabling UDP support, and using Akamai for enhanced security. It also highlights the importance of high bandwidth and building redundancy through load balancing to prevent malicious activity. Furthermore, the report explores the future importance and effectiveness of Memcached implementations with MySQL, Oracle Coherence, and GigaSpaces XAP, concluding that protecting systems from Memcached attacks enhances overall robustness.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: MEMCRASHED EXPLOITS
MEMCRASHED EXPLOITS
Name of the Students
Name of the University
Author note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
MEMCRASHED EXPLOITS
Table of Contents
Introduction..........................................................................................................................2
Principles and key value database.......................................................................................2
Example of use................................................................................................................3
Memcrashed exploits description........................................................................................3
Solution to the memcrashed exploit....................................................................................5
Future Importance and effectiveness of memcrashed.........................................................7
Conclusion...........................................................................................................................7
References............................................................................................................................9
Document Page
2
MEMCRASHED EXPLOITS
Introduction
Memcached Distributed Denial of Service attack in which the attacker intend on
victimize the user with overloading of data. The attacker spoofs the request that is mad by the
user. This process is performed for the vulnerable UDP memached. After this process the
attacker floods the victim with the internet traffic that overwhelms the victim’s resources. This
report will discuss about the Principles and key processes of the database. Examples will also be
provided in the process. Descriptions of the memcrashed exploits will also be provided. This
report will also provide the mitigation solutions that are to be used in order to prosecute the
management of the Memcached related issues. Future importance of this technology will also be
stated in this report. This will help in better prosecution of the memcrashed project and this
report will help in gaining a basic ideology regarding the functioning of the system.
Principles and key value database
Key value database or a key value store is a data storage paradigm that is designed for
storing of the data. Retrieving of the data and managing of the data are also the major instances
of the key value database. Key value databases function with a different terminology as per the
relational database. A key value store is considered as a simple hash table. In this table the
process will be performed with the help of the primary keys (Chen et al 2017). The clients get a
value for a key, put the value for a key and delete a key from the data store. The main
characteristics of Key value database includes high performance and availability of the data
access can also be performed in a better manner. The keys and values that are used are complex
and compound objects that deals with the list of maps and the data structures. Consistency can be
expected only after the usage of the key value database. The main disadvantage of the system
Document Page
3
MEMCRASHED EXPLOITS
includes the cons of no complex query filter. Joining can be performed as per the code of the
project. There can be n foreign key constraints. Triggering is not possible in this processing. The
main advantages that will be present includes provisioning of efficient queries. The performance
that is achieved is predictable and hence the expectation of the output can be made and hence the
processing of the project ca be performed as per the management of the business (Puangsaijai
and Puntheeranurak 2017). The distribution process is easier and more efficient. This distribution
can be made as per the clustering process. Service orientation is disallowed and hence the
management of the foreign key constraints is performed in a better manner. Force joined are
performed in codes. Using of rational database the main advantage that will be enjoyed includes
DB+ cache forces into the key value system. Object relational mismatch is not found in usage of
the key value database.
Example of use
Regular day to day usage of key value databases includes usage of the Redis and Oracle
NoSQL Database. Redis is used to amplitude things. Storing of website sessions can be used for
implementation of the sticky sessions that will help in better prosecution of the storage of the
website session implementation. This system finds its usage in the Facebook. Their load balancer
will be helpful in keeping the user assigned to the same server.
Again on another hand Oracle NSQL, has a scalable key value database. This aspect
helps in better prosecution of the data storage and database can be used as per the key value pair.
It does not have any structured database schema (Cai, Qin and Li 2016). Handling of structured
and unstructured data in the database. Amazon Web Services allows to handle virtual servers
which can be expanded in horizontal basis on demand.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
MEMCRASHED EXPLOITS
Memcrashed exploits description
There has been a rise in the Distributed Denial of Services attacks. Blasting of sites as per
the management of the terabytes of traffic. Memcached is an open source terminology that
provides high end performance as per the object coaching system. This process is generally used
by social networking sites as per the processing of the system. In this case the main terminology
that will be proposed includes the fact that it takes into consideration the key value that will be
storing the junks of the arbitrary data. Memached has never been available in the public internet
platform and hence the main issue that is present in the system is that the prosecution of the
reflection attack vector.
During the time of receiving of data, memached gets requested. This leads to the fact that
it collects the request value from the memory as per the memory from the response set. An
uninterrupted stream of multiple UDP packets with a length of 1400 bytes will get enhanced. The
attacker inserts data in the memached server. A fixed of 1 MB per fixed value is stored. The
attacker can even input large values as the data that are large enough will be proposed as per the
want of the attacker. The section will ensure that the amount of data that the attacker will provide
as an input is completely dependent on the want of the attacker himself. This process will get
properly benefitted as per the configuration that will be made by the attacker. The attacker uses
UDP packet process and sends 1 MB of data for several times. This will lead to overloading the
user with data. This will affect the functioning of the user. As a potential victim the users must
close the port 11211 (Chou, Wong and Bhuyan 2016). Looking into the DDoS mitigation service
system. This will help the business organization in the long run. In case these issues are not
mitigated, suffering of massive DDOS problem will arise. During the last two years a number of
30,000 attacks are performed in a day. The attack is performed via the 11211 port. This is
Document Page
5
MEMCRASHED EXPLOITS
performed with the help of the spoofing of the IP address. The amplification of the attack has
been very high and the rate reaches to 51,200 times the size of the initial request.
Solution to the memcrashed exploit
Binding of memached
Binding of memached is considered to be one of the major risk mitigating process as
with the help of this process the entire prosecution will get performed as per the server
configuration. This section will help in proper updating of the risk that will be present. After
performing the protection system.
Hardening of memcached
In case the SANS platform is being used for the performance of the project, hardening of
memcache must be performed. This includes the fact that the initial step will begin with the
opening of the memcached.conf file. This process will be performed as per the specification of
the text editor. After performing this methodology, location of the m parameter will be made.
After locating of the m parameter, the main advantage that will be gained includes better
modulation of the data prosecution process. The maximum value must be changed to 1 GB. After
completion of this process, location of 1 parameter will be processed (Li, Fu and Li 2017). This
step is considered to be one of the most important step in the prosecution of the project. After
detection of the 1 parameter, changing of the value is required. In this section the main aspect
that will be taken into consideration includes changing of the value to the local host server or to
at least 127.0.0. This changing of the value will be beneficial in the projection of the terminology
of the memcached.conf. After changing the host exit from the text editor is expected. After
completion of the system restarting the memached will be beneficial.
Document Page
6
MEMCRASHED EXPLOITS
Disable UDP Support
Disabling the UDP support is essential in case of not using the same. In case of using the
UDP support the main prosecution that must be put into use includes setting of a strict packet
size. This includes the fact that the management of the project will get performed and the want of
the application developer who has been using the UDP. With the help of a proper and strict
packet size, chances of the system getting attacked decreases (Dao 2018). Closing of the port
11211 is also important in order to stay away from the attackers. In case the 11211 port is kept
open the main disadvantage that will be faced includes higher chances of getting attacked (Lu et
al 2017). Usage of the Akamai can be fund beneficial for the proclamation of the increase in
security aspect.
Buying bandwidth
Having a high range of bandwidth ensures that the management of the spikes that might
be present in the servers of the system. This will help in bettering of the malicious activity
prevention. Having a higher bandwidth than the attacker will ensure that attacking the entire
system will get difficult (Burke et al 2018).
Building of redundancy
Implementation of load balancing will be beneficial for the business processing unit as
per the requirement of the server (Lorido-Botran et al 2017). With the help of the processing of
the entire system the main advantage that will be enjoyed includes better prosecution of the data
distribution in between different database (Hafeez et al 2017). Ensuring that there are no loop
holes in the database, the prosecution process will be required. In case the data are being stored
in diverse manner as per the topographic and geographic manner, it will get difficult for the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
MEMCRASHED EXPLOITS
attackers to attack the data base and gain data from the data base. This will also ensure that the
attackers will no longer be able to attack the system.
Future Importance and effectiveness of memcrashed
The usage of Memcache are as follows: -
Usage of Memcache implementation of the MySQL will be beneficial. This supports the
functioning of the Memcached API. This version of 5.6 will be used for better benefit of
the computing system.
Implementation of the Oracle Coherence will help in directly support of the Memcached
API. The version that will be used for the prosecution of the entire system is 12.1.3
Proper usage of the GigaSpaces XAP will also benefitting in the
Conclusion
From the above report it can be concluded that a huge number of vendors will be
available on prosecuting the management of the appliance that is usually used for blocking the
entire system. This leads to the fact that that management of the project will be protected from
the memecache attacks. In case the systems are protected from the memecache attacks,
robustness of the entire system gets better. Usage of the CheckPoint, Cisco ca be helpful on
increasing the robustness of the computing system. Blocking of various abnormal traffics are one
of the most important aspect of the data protection. Memecache is a specific open source that
gets distributed as per the management of the system. Authentication issues are present in the
system. There is no authentication process present in the commencing of the computing system.
These are the major reasons that it suffers from various vulnerabilities that are present in the
computing system including the memcache. The key value database ensures that the
Document Page
8
MEMCRASHED EXPLOITS
management of the process gets performed as per the simple methodology of storing data.
Implementation of key value pairs is one of the main reason to store the data in data base as per
the data structure that is well established as a part of the key programming language. Key is also
referred as a hash in the computing system. The recommendation measures are stated in the
report. This is one of the main reason that the projection of the nature system is performed with
the help of the blocking of ports. This will help in keeping the computing system protected from
the Memcache attacks. In case the management of the database is performed as per the
management of the system the main advantage that will be gained includes the fact that the data
will stay protected and the privacy of the data will be maintained. In case if following the
security measures that are stated in this report, data protection can be maintained.
Document Page
9
MEMCRASHED EXPLOITS
References
Burke, I.D., Herbert, A. and Mooi, R., 2018, September. Using network flow data to analyse
distributed reflection denial of service (DRDoS) attacks, as observed on the South African
national research and education network (SANReN): a postmortem analysis of the memcached
attack on the SANReN. In Proceedings of the Annual Conference of the South African Institute
of Computer Scientists and Information Technologists (pp. 164-170). ACM.
Cai, T.T., Qin, X. and Li, Z.H., 2016, June. The Improvement of a Data Cached Strategy Based
on Eventual Consistency Theory. In 2016 International Conference on Information System and
Artificial Intelligence (ISAI) (pp. 203-207). IEEE.
Chen, X., Sha, E.H.M., Abdullah, A., Zhuge, Q., Wu, L., Yang, C. and Jiang, W., 2017, August.
UDORN: A design framework of persistent in-memory key-value database for NVM. In 2017
IEEE 6th Non-Volatile Memory Systems and Applications Symposium (NVMSA) (pp. 1-6). IEEE.
Chou, C.H., Wong, D. and Bhuyan, L.N., 2016, August. Dynsleep: Fine-grained power
management for a latency-critical data center application. In Proceedings of the 2016
International Symposium on Low Power Electronics and Design (pp. 212-217). ACM.
Dao, T.C., 2018, June. In-Memory Hadoop on Supercomputers Using Memcached-Like Nodes
for Data Storage Only. In 2018 IEEE 20th International Conference on High Performance
Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th
International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 820-827).
IEEE.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
MEMCRASHED EXPLOITS
Hafeez, U.U., Male, D., Naeni, S.K., Wajahat, M. and Gandhi, A., 2017. Realizing an Elastic
Memcached via Cached Data Migration. Restoration, 23(24), p.25.
Li, B., Fu, Y. and Li, Z., 2017, July. The research and improvement of distributee caching
system Memcached. In 2017 4th International Conference on Information, Cybernetics and
Computational Social Systems (ICCSS) (pp. 460-463). IEEE.
Lorido-Botran, T., Huerta, S., Tomás, L., Tordsson, J. and Sanz, B., 2017. An unsupervised
approach to online noisy-neighbor detection in cloud data centers. Expert Systems with
Applications, 89, pp.188-204.
Lu, X., Shankar, D. and Panda, D.K., 2017. Scalable and Distributed Key-Value Store-based
Data Management Using RDMA-Memcached. IEEE Data Eng. Bull., 40(1), pp.50-61.
Puangsaijai, W. and Puntheeranurak, S., 2017, March. A comparative study of relational
database and key-value database for big data applications. In 2017 International Electrical
Engineering Congress (iEECON) (pp. 1-4). IEEE.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]