SlideShare ist ein Scribd-Unternehmen logo
1 von 22
DoS & DDoS
Attacks
OUTLINE
• “DoS Attacks” – What Is
• History
• Types
• Main targets
• How to Defend
3
• A DoS attack: preventing legal users, authorized access to a
system resource . The attacker uses specialized software to send
a flood of data packets to the target Device .
• DDoS ( distributed DoS attacks)
the attacker gains illegal administrative access to as many computers on the
Internet as possible and uses the multiple computers to send a flood of data
packets to the target Device
DoS = when a single host attacks
DDoS = when multiple hosts attack simultaneously
WHAT IS “DOS ATTACK”
Effect
• Too expensive
• Hard to prove who used the computer
Aim OF “DOS ATTACKS”

Purpose is to shut down a site, not penetrate it. may be
vandalism(including terrorism)
• Modification of internal data, change of programs

overloading the victim's resources
HISTORY
Morris Worm (November 2, 1988)
• First DDoS attack to cripple large amounts of network
infrastructure
• Self-replicating, self-propagating.
• Exploited software commonality (monoculture)
HISTORY
Morris Worm effect
• Infected systems became “catatonic “
• Took roughly three days to come under control
• Ultimately infected 10% of Internet computers (6,000) and
cost $ millions to clean up.
• Morris convicted under computer fraud and abuse act, three
years probation, fine of $10,000, he is now prof. At MIT
ESTONIAN CYBERWAR, 2007
• Weeks of cyber attacks followed, targeting government and banks,
ministries, newspapers and broadcasters Web sites of Estonia.
•
• 128 unique DDoS attacks
• Used hundreds or thousands of "zombie" computers and pelted Estonian
Web sites with thousands of requests a second
ESTONIAN CYBERWAR, 2007
• The attack heavily affected infrastructures of
all network:
– Routers damaged.
– Routing tables changed.
– DNS servers overloaded.
– Email servers mainframes failure, and etc.
In Feb 2000, series of massive DoS attacks incapacitated several high-
visibility Internet e-commerce sites, including Yahoo, Ebay and E*trade
In Jan 2001, Microsoft’s name sever infrastructure was disabled
>>98% of users could not get to any Microsoft’s servers
In Oct 2002, all Domain Name System servers were attacked
Attack lasted only an hour
9 of the 13 servers were seriously affected
In Aug 2009, the attack on Twitter and Facebook
HISTORY
Why should we care?
Internet is now a critical resource whose disruption has financial
implications, or even dire consequences on human safety
 Cybercrime and cyberwarfare might use of DoS or DDoS as a potential
weapon to disrupt or degrade critical infrastructure
 DDoS attacks are a major threat to the stability of the Internet
Pa
ge
The DoS Attack Surface
 Any part of your network or
services that is vulnerable to
an attack
– Network Interfaces
– Infrastructure
– Firewall/IPS
– Servers
– Protocols
– Applications
– Databases
 Attackers will find the
weakness
Distributed Denial-of-service
Attacker uses multiple PCs for DoS by:
Utilizing vulnerabilities to gain access to these systems
Installing malicious backdoor programs , thereby making zombies
Creating botnets: large collection of zombies under the control of
attacker
Generally, a control hierarchy is used to create botnets
Handlers: The initial layer of zombies that are directly controlled by the
attacker
Agent systems: Subordinate zombies that are controlled by handlers
Attacker sends a single command to handler, which then automatically
forwards it to all agents under its control
Example: Tribe Flood Network (TFN), TFN2K
15
How They Work ?
Victim
Daemon
Daemon
Daemon
Daemon
Daemon
Master
Real Attacker
16
How They Talk ?
Trinoo tool: attacker uses TCP; masters and daemons
use UDP; password authentication.
TFN ”Tribe Flood Network" tool: attacker uses shell to
invoke master; masters and daemons use ICMP
ECHOREPLY.
Stacheldraht tool: attacker uses encrypted TCP
connection to master; masters and daemons use TCP
and ICMP ECHO REPLY; rcp used for auto-update.
Approaches to DOS ATTACKS
Flooding attack
Work by sending a vast number of messages whose processing consumes
some key resource at the target
The strength lies in the volume, rather than the content
Implications :
 Make the traffic look legitimate
 Flow of traffic is large enough to consume victim’s resources
 Send with high packet rate
Pa
ge
Flooding DDoS
Internet designed for minimal-processing and best-effort forwarding
any packet
 Make shrewd use of flaws in the Internet design and systems
Vulnerability attack
 Vulnerability : a bug in implementation or a bug in a default configuration
of a service
 Malicious messages (exploits) : unexpected input that utilize the
vulnerability are sent
 Consequences :
 The system slows down or crashes or freezes or reboots
 Target application goes into infinite loop
 Consumes a vast amount of memory
 Ex : Ping of death, teardrop attacks, etc.
Approaches to DOS ATTACKS
HOW TO DEFEND
• Firewalls - can effectively prevent users from launching simple
flooding type attacks from machines behind the firewall.
• Switches - Some switches provide automatic and/or system-
wide rate limiting, traffic shaping, delayed binding to detect
and remediate denial of service attacks
• Routers - If you add rules to take flow statistics out of the
router during the DoS attacks, they further slow down and
complicate the matter
• DDS based defense
• Clean pipes
Distributed Denial of Service Attacks could be Detected
by Monitoring the Source IP.
Airmon-ng start wlan0
Airodump-ng wlan0mon >> get mac Add. And target
channel
Iwconfig wlan0mon channel # >> edit your channel to
the target channel
Aireplay -0 500 -a MAC ADD. wlan0mon
-0> send deauthentication messages
500 > # of packets to send
-a > option [mac address the the interface ]
HOW TO DO THAT
Thanks for your attention!

Weitere ähnliche Inhalte

Was ist angesagt?

DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceEr. Shiva K. Shrestha
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionAPNIC
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident HandlingMarcelo Silva
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
 Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/... Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/...
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...Suhail Khan
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacksRollingsherman
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application SecurityRob Ragan
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Amit Tyagi
 
Web application attacks
Web application attacksWeb application attacks
Web application attackshruth
 

Was ist angesagt? (20)

DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
 
Dos attack
Dos attackDos attack
Dos attack
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
 Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/... Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/...
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Dos attack
Dos attackDos attack
Dos attack
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 

Ähnlich wie DDOS Attack

Aleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksDipesh Karade
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiProfessor Lili Saghafi
 
denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designperfetbyedshareen
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptxmalikmuzammil2326
 
CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39Bilal Ahmed
 
Adarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.pptAdarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.pptFridha2
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddoskalyan kumar
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceVi Tính Hoàng Nam
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!PriyadharshiniHemaku
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the ArtBiagio Botticelli
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 

Ähnlich wie DDOS Attack (20)

Aleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS Attacks
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive design
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39
 
A041201010
A041201010A041201010
A041201010
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Adarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.pptAdarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.ppt
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the Art
 
DDOS ATTACKS
DDOS ATTACKSDDOS ATTACKS
DDOS ATTACKS
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 

Mehr von Ahmed Salama

Seven Ways To Be a Healthy Programmer!.pdf
Seven Ways To Be a Healthy Programmer!.pdfSeven Ways To Be a Healthy Programmer!.pdf
Seven Ways To Be a Healthy Programmer!.pdfAhmed Salama
 
10 Code Anti-Patterns to Avoid in Software Development.pdf
10 Code Anti-Patterns to Avoid in Software Development.pdf10 Code Anti-Patterns to Avoid in Software Development.pdf
10 Code Anti-Patterns to Avoid in Software Development.pdfAhmed Salama
 
Introduction to web development
Introduction to web developmentIntroduction to web development
Introduction to web developmentAhmed Salama
 
Introduction to Django
Introduction to DjangoIntroduction to Django
Introduction to DjangoAhmed Salama
 
Introduction to python
Introduction to pythonIntroduction to python
Introduction to pythonAhmed Salama
 
Quick Start to marketing.
Quick Start to marketing.Quick Start to marketing.
Quick Start to marketing.Ahmed Salama
 
Distributed database
Distributed databaseDistributed database
Distributed databaseAhmed Salama
 
Introduction to Computer Science Department
Introduction to Computer Science DepartmentIntroduction to Computer Science Department
Introduction to Computer Science DepartmentAhmed Salama
 

Mehr von Ahmed Salama (9)

Seven Ways To Be a Healthy Programmer!.pdf
Seven Ways To Be a Healthy Programmer!.pdfSeven Ways To Be a Healthy Programmer!.pdf
Seven Ways To Be a Healthy Programmer!.pdf
 
10 Code Anti-Patterns to Avoid in Software Development.pdf
10 Code Anti-Patterns to Avoid in Software Development.pdf10 Code Anti-Patterns to Avoid in Software Development.pdf
10 Code Anti-Patterns to Avoid in Software Development.pdf
 
Introduction to web development
Introduction to web developmentIntroduction to web development
Introduction to web development
 
Introduction to Django
Introduction to DjangoIntroduction to Django
Introduction to Django
 
Introduction to python
Introduction to pythonIntroduction to python
Introduction to python
 
Quick Start to marketing.
Quick Start to marketing.Quick Start to marketing.
Quick Start to marketing.
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Konard zuse
Konard zuseKonard zuse
Konard zuse
 
Introduction to Computer Science Department
Introduction to Computer Science DepartmentIntroduction to Computer Science Department
Introduction to Computer Science Department
 

Kürzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

DDOS Attack

  • 2. OUTLINE • “DoS Attacks” – What Is • History • Types • Main targets • How to Defend
  • 3. 3 • A DoS attack: preventing legal users, authorized access to a system resource . The attacker uses specialized software to send a flood of data packets to the target Device . • DDoS ( distributed DoS attacks) the attacker gains illegal administrative access to as many computers on the Internet as possible and uses the multiple computers to send a flood of data packets to the target Device DoS = when a single host attacks DDoS = when multiple hosts attack simultaneously WHAT IS “DOS ATTACK”
  • 4.
  • 5. Effect • Too expensive • Hard to prove who used the computer
  • 6. Aim OF “DOS ATTACKS”  Purpose is to shut down a site, not penetrate it. may be vandalism(including terrorism) • Modification of internal data, change of programs  overloading the victim's resources
  • 7. HISTORY Morris Worm (November 2, 1988) • First DDoS attack to cripple large amounts of network infrastructure • Self-replicating, self-propagating. • Exploited software commonality (monoculture)
  • 8. HISTORY Morris Worm effect • Infected systems became “catatonic “ • Took roughly three days to come under control • Ultimately infected 10% of Internet computers (6,000) and cost $ millions to clean up. • Morris convicted under computer fraud and abuse act, three years probation, fine of $10,000, he is now prof. At MIT
  • 9. ESTONIAN CYBERWAR, 2007 • Weeks of cyber attacks followed, targeting government and banks, ministries, newspapers and broadcasters Web sites of Estonia. • • 128 unique DDoS attacks • Used hundreds or thousands of "zombie" computers and pelted Estonian Web sites with thousands of requests a second
  • 10. ESTONIAN CYBERWAR, 2007 • The attack heavily affected infrastructures of all network: – Routers damaged. – Routing tables changed. – DNS servers overloaded. – Email servers mainframes failure, and etc.
  • 11. In Feb 2000, series of massive DoS attacks incapacitated several high- visibility Internet e-commerce sites, including Yahoo, Ebay and E*trade In Jan 2001, Microsoft’s name sever infrastructure was disabled >>98% of users could not get to any Microsoft’s servers In Oct 2002, all Domain Name System servers were attacked Attack lasted only an hour 9 of the 13 servers were seriously affected In Aug 2009, the attack on Twitter and Facebook HISTORY
  • 12. Why should we care? Internet is now a critical resource whose disruption has financial implications, or even dire consequences on human safety  Cybercrime and cyberwarfare might use of DoS or DDoS as a potential weapon to disrupt or degrade critical infrastructure  DDoS attacks are a major threat to the stability of the Internet
  • 13. Pa ge The DoS Attack Surface  Any part of your network or services that is vulnerable to an attack – Network Interfaces – Infrastructure – Firewall/IPS – Servers – Protocols – Applications – Databases  Attackers will find the weakness
  • 14. Distributed Denial-of-service Attacker uses multiple PCs for DoS by: Utilizing vulnerabilities to gain access to these systems Installing malicious backdoor programs , thereby making zombies Creating botnets: large collection of zombies under the control of attacker Generally, a control hierarchy is used to create botnets Handlers: The initial layer of zombies that are directly controlled by the attacker Agent systems: Subordinate zombies that are controlled by handlers Attacker sends a single command to handler, which then automatically forwards it to all agents under its control Example: Tribe Flood Network (TFN), TFN2K
  • 15. 15 How They Work ? Victim Daemon Daemon Daemon Daemon Daemon Master Real Attacker
  • 16. 16 How They Talk ? Trinoo tool: attacker uses TCP; masters and daemons use UDP; password authentication. TFN ”Tribe Flood Network" tool: attacker uses shell to invoke master; masters and daemons use ICMP ECHOREPLY. Stacheldraht tool: attacker uses encrypted TCP connection to master; masters and daemons use TCP and ICMP ECHO REPLY; rcp used for auto-update.
  • 17. Approaches to DOS ATTACKS Flooding attack Work by sending a vast number of messages whose processing consumes some key resource at the target The strength lies in the volume, rather than the content Implications :  Make the traffic look legitimate  Flow of traffic is large enough to consume victim’s resources  Send with high packet rate
  • 19. Internet designed for minimal-processing and best-effort forwarding any packet  Make shrewd use of flaws in the Internet design and systems Vulnerability attack  Vulnerability : a bug in implementation or a bug in a default configuration of a service  Malicious messages (exploits) : unexpected input that utilize the vulnerability are sent  Consequences :  The system slows down or crashes or freezes or reboots  Target application goes into infinite loop  Consumes a vast amount of memory  Ex : Ping of death, teardrop attacks, etc. Approaches to DOS ATTACKS
  • 20. HOW TO DEFEND • Firewalls - can effectively prevent users from launching simple flooding type attacks from machines behind the firewall. • Switches - Some switches provide automatic and/or system- wide rate limiting, traffic shaping, delayed binding to detect and remediate denial of service attacks • Routers - If you add rules to take flow statistics out of the router during the DoS attacks, they further slow down and complicate the matter • DDS based defense • Clean pipes Distributed Denial of Service Attacks could be Detected by Monitoring the Source IP.
  • 21. Airmon-ng start wlan0 Airodump-ng wlan0mon >> get mac Add. And target channel Iwconfig wlan0mon channel # >> edit your channel to the target channel Aireplay -0 500 -a MAC ADD. wlan0mon -0> send deauthentication messages 500 > # of packets to send -a > option [mac address the the interface ] HOW TO DO THAT
  • 22. Thanks for your attention!