SlideShare ist ein Scribd-Unternehmen logo
1 von 8
DDOS Attacks !
A Major threat facing organisations today.
Domestic & General
Vince Pillay
The techniques used in the past by many
mitigation providers are no longer able to
cope!
• Impossible to stop the attack simply by blocking a
single IP address
• Difficult to distinguish legitimate user traffic from
attack traffic
• The cost of an attack can be considerable
• Website offline potentially for days
• Many organisations do not know they are under a
DoS/DDoS attack when it begins
Practically anyone with an Internet
connection can launch their own attack.
Attackers can rent botnets or purchase
relatively cheap tools to launch their
attack.
Your ISP will most likely offer DDoS
mitigation but if your traffic grows too
large and starts affecting their other
customers, or if the attack is too
complicated, they may just turn you off.
• Ping of Death
• Mailbomb
• Smurf Attack
• Teardrop
The list of DDoS attack victims includes some pretty major
names
Do you feel confident that what you have in
place can successfully mitigate an attack?

Weitere ähnliche Inhalte

Mehr von Global Business Events

Mehr von Global Business Events (20)

Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security Anxiety
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined Everything
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
 
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
 
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYODIan Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
 
Daniel Benton, Managing Director at Accenture - High performers in IT
Daniel Benton, Managing Director at Accenture - High performers in ITDaniel Benton, Managing Director at Accenture - High performers in IT
Daniel Benton, Managing Director at Accenture - High performers in IT
 
David Cooper, British Gas at CIO - Transformation through innovation
David Cooper, British Gas at CIO - Transformation through innovationDavid Cooper, British Gas at CIO - Transformation through innovation
David Cooper, British Gas at CIO - Transformation through innovation
 
David Bottomley, Formerly Head of IT Delivery at Specsavers - Customer First ...
David Bottomley, Formerly Head of IT Delivery at Specsavers - Customer First ...David Bottomley, Formerly Head of IT Delivery at Specsavers - Customer First ...
David Bottomley, Formerly Head of IT Delivery at Specsavers - Customer First ...
 
Kevin O'Connor, EVP, Chief Information Officer at Carlson Wagonlit Travel - S...
Kevin O'Connor, EVP, Chief Information Officer at Carlson Wagonlit Travel - S...Kevin O'Connor, EVP, Chief Information Officer at Carlson Wagonlit Travel - S...
Kevin O'Connor, EVP, Chief Information Officer at Carlson Wagonlit Travel - S...
 
Jon Hall, Chair of Elite Committee at Chartered Institute of IT - Value from IT
Jon Hall, Chair of Elite Committee at Chartered Institute of IT - Value from ITJon Hall, Chair of Elite Committee at Chartered Institute of IT - Value from IT
Jon Hall, Chair of Elite Committee at Chartered Institute of IT - Value from IT
 

Kürzlich hochgeladen

Kürzlich hochgeladen (10)

Deciding The Topic of our Magazine.pptx.
Deciding The Topic of our Magazine.pptx.Deciding The Topic of our Magazine.pptx.
Deciding The Topic of our Magazine.pptx.
 
DAY 0 8 A Revelation 05-19-2024 PPT.pptx
DAY 0 8 A Revelation 05-19-2024 PPT.pptxDAY 0 8 A Revelation 05-19-2024 PPT.pptx
DAY 0 8 A Revelation 05-19-2024 PPT.pptx
 
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdfACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
 
Understanding Poverty: A Community Questionnaire
Understanding Poverty: A Community QuestionnaireUnderstanding Poverty: A Community Questionnaire
Understanding Poverty: A Community Questionnaire
 
Databricks Machine Learning Associate Exam Dumps 2024.pdf
Databricks Machine Learning Associate Exam Dumps 2024.pdfDatabricks Machine Learning Associate Exam Dumps 2024.pdf
Databricks Machine Learning Associate Exam Dumps 2024.pdf
 
Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdfMicrosoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
 
ServiceNow CIS-Discovery Exam Dumps 2024
ServiceNow CIS-Discovery Exam Dumps 2024ServiceNow CIS-Discovery Exam Dumps 2024
ServiceNow CIS-Discovery Exam Dumps 2024
 
The Influence and Evolution of Mogul Press in Contemporary Public Relations.docx
The Influence and Evolution of Mogul Press in Contemporary Public Relations.docxThe Influence and Evolution of Mogul Press in Contemporary Public Relations.docx
The Influence and Evolution of Mogul Press in Contemporary Public Relations.docx
 
Breathing in New Life_ Part 3 05 22 2024.pptx
Breathing in New Life_ Part 3 05 22 2024.pptxBreathing in New Life_ Part 3 05 22 2024.pptx
Breathing in New Life_ Part 3 05 22 2024.pptx
 
2024-05-15-Surat Meetup-Hyperautomation.pptx
2024-05-15-Surat Meetup-Hyperautomation.pptx2024-05-15-Surat Meetup-Hyperautomation.pptx
2024-05-15-Surat Meetup-Hyperautomation.pptx
 

Vince Pillay, CISO at Domestic and General - DDOS Attacks! – A major threat facing organisations today

  • 1. DDOS Attacks ! A Major threat facing organisations today. Domestic & General Vince Pillay
  • 2. The techniques used in the past by many mitigation providers are no longer able to cope!
  • 3. • Impossible to stop the attack simply by blocking a single IP address • Difficult to distinguish legitimate user traffic from attack traffic • The cost of an attack can be considerable • Website offline potentially for days • Many organisations do not know they are under a DoS/DDoS attack when it begins
  • 4. Practically anyone with an Internet connection can launch their own attack. Attackers can rent botnets or purchase relatively cheap tools to launch their attack.
  • 5. Your ISP will most likely offer DDoS mitigation but if your traffic grows too large and starts affecting their other customers, or if the attack is too complicated, they may just turn you off.
  • 6. • Ping of Death • Mailbomb • Smurf Attack • Teardrop
  • 7. The list of DDoS attack victims includes some pretty major names
  • 8. Do you feel confident that what you have in place can successfully mitigate an attack?

Hinweis der Redaktion

  1. focused on two distinct approaches: thwart the attacks at the provider level or stop them at the customer level. focused on two distinct approaches: thwart the attacks at the provider level or stop them at the customer level. Both approaches have failed to achieve uniform success on a consistent basis, and both are quite costly.
  2. Ping of Death - bots create huge electronic packets and sends them on to victimsMailbomb - bots send a massive amount of e-mail, crashing e-mail serversSmurf Attack - bots send Internet Control Message Protocol (ICMP) messages to reflectors, see above illustrationTeardrop - bots send pieces of an illegitimate packet; the victim system tries to recombine the pieces into a packet and crashes as a result
  3. . Microsoft suffered an attack from a DDoS called MyDoom. Crackers have targeted other major Internet players like Amazon, CNN, Yahoo and eBay.
  4. Assurance