SlideShare ist ein Scribd-Unternehmen logo
1 von 18
DoS Attacks
Basics
OUTLINE
• What Is DoS and what is DoS Attack
• History
• Types of Attacks
• Main targets today
• How to Defend
• Prosecution
• Conclusion
WHAT IS “DOS ATTACK”
Denial-Of-Service Attack = DOS Attack is a malicious attempt by a
single person or a group of people to cause the victim, site or
node to deny service to it customers.
• DoS = when a single host attacks
• DDoS = when multiple hosts attack simultaneously
IDEA OF “DOS ATTACKS”
• Purpose is to shut down a site, not penetrate it.
• Purpose may be vandalism, extortion or social action
(including terrorism) (Sports betting sites often extorted)
• Modification of internal data, change of programs (Includes
defacement of web sites)
Denial of Service Attack
Typical Connection
HISTORY
Morris Worm (November 2, 1988)
• First DDoS attack to cripple large amounts of network
infrastructure
• Self-replicating, self-propagating.
• Exploited software commonality (monoculture)
1. Fingerd buffer overflow exploit
2. Sendmail root vulnerability
3. Weak passwords
HISTORY
Morris Worm effect
• Infected systems became “catatonic”
• Took roughly three days to come under control
• Ultimately infected 10% of Internet computers (6,000) and
cost $ million to clean up.
• Morris convicted under computer fraud and abuse act, three
years probation, fine of $10,000
TYPES OF DOS ATTACKS
TYPES OF DOS ATTACKS
• Penetration
• Eavesdropping
• Man-In-The-Middle
• Flooding
TYPES OF DOS ATTACKS
Penetration
• Attacker gets inside your machine
• Can take over machine and do whatever he wants
• Achieves entry via software flaw(s), stolen passwords
or insider access
TYPES OF DOS ATTACKS
Eavesdropping
• Attacker gains access to same network
• Listens to traffic going in and out of your machine
TYPES OF DOS ATTACKS
Man-in-the-Middle
• Attacker listens to output and controls output
• Can substitute messages in both directions
TYPES OF DOS ATTACKS
Flooding
• Attacker sends an overwhelming number of messages at your
machine; great congestion
• The congestion may occur in the path before your machine
• Messages from legitimate users are crowded out
• Usually called a Denial of Service (DoS) attack, because that’s
the effect.
• Usually involves a large number of machines, hence
Distributed Denial of Service (DDoS) attack
MAIN TARGETS
HOW TO DEFEND
• Firewalls - can effectively prevent users from launching simple
flooding type attacks from machines behind the firewall.
• Switches - Some switches provide automatic and/or system-
wide rate limiting, traffic shaping, delayed binding to detect
and remediate denial of service attacks
• Routers - If you add rules to take flow statistics out of the
router during the DoS attacks, they further slow down and
complicate the matter
• DDS based defense
• Clean pipes
• Nothing can be done to entirely prevent DOS
• Minimize the dangers
– Effective and Robust Design
– Bandwidth Limitations
– Keep Systems Patched
– Run the least amount of services
– Allow only necessary traffic
– Block IP addresses
CONCLUSION
• Role of international boundaries - consoles located across
international borders, law-enforcement problem
• In the past, as the present, DDoS has been more a nuisance
activity conducted by cyber vandals than an activity with
specific socioeconomic aims
• In the future, DDoS may be used as a disruptive force, with
broad destabilization as its aim instead of the targeting of
specific targets
• Destabilization has a high (ROI) Return On Investment when
compared to targeted attacks
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 

Was ist angesagt? (20)

Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Malware
MalwareMalware
Malware
 
Network security
Network securityNetwork security
Network security
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cia security model
Cia security modelCia security model
Cia security model
 
Sql injection
Sql injectionSql injection
Sql injection
 
Security threats
Security threatsSecurity threats
Security threats
 

Andere mochten auch

An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
Rollingsherman
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Kaustubh Padwad
 
DDoS Attack illustration
DDoS Attack illustrationDDoS Attack illustration
DDoS Attack illustration
Marcelo Silva
 
Layer 7 ddos
Layer 7 ddosLayer 7 ddos
Layer 7 ddos
fangjiafu
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
Ajay Singh
 

Andere mochten auch (20)

DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
Denial Of Service Attack
Denial Of Service AttackDenial Of Service Attack
Denial Of Service Attack
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
 
DDoS Attack illustration
DDoS Attack illustrationDDoS Attack illustration
DDoS Attack illustration
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And Mitigation
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
 
Super Effective Denial of Service Attacks
Super Effective Denial of Service AttacksSuper Effective Denial of Service Attacks
Super Effective Denial of Service Attacks
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Layer 7 ddos
Layer 7 ddosLayer 7 ddos
Layer 7 ddos
 
Customer distributed denial of service (DDoS) experiences - Networkshop44
Customer distributed denial of service (DDoS) experiences - Networkshop44Customer distributed denial of service (DDoS) experiences - Networkshop44
Customer distributed denial of service (DDoS) experiences - Networkshop44
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Sniffing
SniffingSniffing
Sniffing
 

Ähnlich wie Basics of Denial of Service Attacks

Ähnlich wie Basics of Denial of Service Attacks (20)

Adarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.pptAdarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.ppt
 
Aleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS Attacks
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu NepalDDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
 
D dos attack
D dos attackD dos attack
D dos attack
 
denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive design
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
 
Ddos attacks
Ddos attacksDdos attacks
Ddos attacks
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1
 
Dos attack
Dos attackDos attack
Dos attack
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39
 
Addios!
Addios!Addios!
Addios!
 
Dos threats and countermeasures
Dos threats and countermeasuresDos threats and countermeasures
Dos threats and countermeasures
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Basics of Denial of Service Attacks

  • 2. OUTLINE • What Is DoS and what is DoS Attack • History • Types of Attacks • Main targets today • How to Defend • Prosecution • Conclusion
  • 3. WHAT IS “DOS ATTACK” Denial-Of-Service Attack = DOS Attack is a malicious attempt by a single person or a group of people to cause the victim, site or node to deny service to it customers. • DoS = when a single host attacks • DDoS = when multiple hosts attack simultaneously
  • 4. IDEA OF “DOS ATTACKS” • Purpose is to shut down a site, not penetrate it. • Purpose may be vandalism, extortion or social action (including terrorism) (Sports betting sites often extorted) • Modification of internal data, change of programs (Includes defacement of web sites)
  • 5. Denial of Service Attack Typical Connection
  • 6. HISTORY Morris Worm (November 2, 1988) • First DDoS attack to cripple large amounts of network infrastructure • Self-replicating, self-propagating. • Exploited software commonality (monoculture) 1. Fingerd buffer overflow exploit 2. Sendmail root vulnerability 3. Weak passwords
  • 7. HISTORY Morris Worm effect • Infected systems became “catatonic” • Took roughly three days to come under control • Ultimately infected 10% of Internet computers (6,000) and cost $ million to clean up. • Morris convicted under computer fraud and abuse act, three years probation, fine of $10,000
  • 8. TYPES OF DOS ATTACKS
  • 9. TYPES OF DOS ATTACKS • Penetration • Eavesdropping • Man-In-The-Middle • Flooding
  • 10. TYPES OF DOS ATTACKS Penetration • Attacker gets inside your machine • Can take over machine and do whatever he wants • Achieves entry via software flaw(s), stolen passwords or insider access
  • 11. TYPES OF DOS ATTACKS Eavesdropping • Attacker gains access to same network • Listens to traffic going in and out of your machine
  • 12. TYPES OF DOS ATTACKS Man-in-the-Middle • Attacker listens to output and controls output • Can substitute messages in both directions
  • 13. TYPES OF DOS ATTACKS Flooding • Attacker sends an overwhelming number of messages at your machine; great congestion • The congestion may occur in the path before your machine • Messages from legitimate users are crowded out • Usually called a Denial of Service (DoS) attack, because that’s the effect. • Usually involves a large number of machines, hence Distributed Denial of Service (DDoS) attack
  • 15. HOW TO DEFEND • Firewalls - can effectively prevent users from launching simple flooding type attacks from machines behind the firewall. • Switches - Some switches provide automatic and/or system- wide rate limiting, traffic shaping, delayed binding to detect and remediate denial of service attacks • Routers - If you add rules to take flow statistics out of the router during the DoS attacks, they further slow down and complicate the matter • DDS based defense • Clean pipes
  • 16. • Nothing can be done to entirely prevent DOS • Minimize the dangers – Effective and Robust Design – Bandwidth Limitations – Keep Systems Patched – Run the least amount of services – Allow only necessary traffic – Block IP addresses
  • 17. CONCLUSION • Role of international boundaries - consoles located across international borders, law-enforcement problem • In the past, as the present, DDoS has been more a nuisance activity conducted by cyber vandals than an activity with specific socioeconomic aims • In the future, DDoS may be used as a disruptive force, with broad destabilization as its aim instead of the targeting of specific targets • Destabilization has a high (ROI) Return On Investment when compared to targeted attacks