SlideShare ist ein Scribd-Unternehmen logo
1 von 18
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
DESTRIBUTED DENIAL OF
SERVICE ATTACK
CONTENTS
 Introduction of dos
 Introduction of ddos
 Components & architecture
 Classification
 Flood attacks
 Amplifications attacks
 Prototype exploit attacks
 Malformed packet attacks
 DDOS defense problems & classification
 Intrusion prevention
 Intrusion detection
 Intrusion tolerance
 Intrusion response
 Conclusion
 References
INTRODUCTION OF DOS
 A denial-of-service attack (DoS attack) is an attempt
to make a computer resource unavailable to its intended
users.
 Although the means to carry out, motives for, and
targets of a DoS attack may vary, it generally consists of
the concerted efforts of a person, or multiple people to
prevent an Internet site or service from functioning
efficiently or at all, temporarily or indefinitely.
INTRODUCTION OF DDOS
 A distributed denial-of-service (DDoS) attack is one in
which a multitude of compromised systems attack a
single target, thereby causing denial of service for users
of the targeted system.
 The flood of incoming messages to the target system
essentially forces it to shut down, thereby denying
service to the system to legitimate users.
COMPONENTS & ARCHITECTURE
CLASSIFICATION OF DDOS
Classification can be divided in the following categories :-
 Flood attack
 Amplification attack
 TCP SYN attack
 Malformed packet attack
FLOOD ATTACK
In a flood attack, the zombies send large volumes of IP
traffic to a victim system in order to congest the victim
systems band width.
Some of the well-known flood attacks are
 UDP flood attacks
 ICMP flood attacks
UDP ATTACK
 A UDP Flood attack is possible when a large number of
UDP packets is sent to a victim system.
 In a DDoS UDP Flood attack, the UDP packets are sent
to either random or specified ports on the victim system.
 When the victim system receives a UDP packet, it will
determine what application is waiting on the destination
port.
ICMP FLOOD ATTACK
ICMP Flood attacks exploit the Internet Control
Message Protocol (ICMP), which enables users to send
an echo packet to a remote host to check whether it’s
alive.
AMPLIFICATION ATTACK
In amplification attacks the attacker or the agents
exploit the broadcast IP address feature found on most
routers to amplify and reflect the attack and send
messages to a broadcast IP address.
Some well known amplification attacks, are
 Smurf attacks
 Fraggle attacks
SMURF ATTACK
 Smurf attacks send ICMP echo request traffic with a
spoofed source address of the target victim to a number
of IP broadcast addresses.
 Most hosts on an IP network will accept ICMP echo
requests and reply to the source address, in this case,
the target victim.
FRAGGLE ATTACK
 The Fraggle attacks are a similar attack to the Smurf
except that they use UDP echo packets instead of ICMP
echoes.
 Fraggle attacks generate even more bad traffic and can
create even more damaging effects than just a Smurf
attack.
PROTOTYPE EXPLOIT ATTACKS
 Protocol exploit attacks exploit a specific feature or
implementation bug of some protocol installed at the
victim in order to consume excess amounts of its
resources.
 A representative example of protocol exploit attacks is
TCP SYN attacks.
MALFORMED PACKET ATTACK
 Malformed packet attacks rely on incorrectly formed IP
packets that are sent from agents to the victim in order
to crash the victim system.
 The malformed packet attacks can be divided in two
types of attacks: IP address attack and IP packet options
attack.
 In an IP address `attack, the packet contains the same
source and destination IP addresses.
DDOS DEFENSE PROBLEM &
CLASSIFICATION
DDoS attacks are a hard problem to solve. Thus we
have the following four categories :-
 Intrusion Prevention,
 Intrusion Detection,
 Intrusion Tolerance and Mitigation
 intrusion response
CONCLUSION
 DDos attack tools are readily available and any internet host is
targetable as either a zombie or the ultimate DDos focus.
 These attacks can be costly and frustrating and are difficult, if
not impossible to eradicate.
 The best defence is to hinder attackers through vigilant system
administration.
REFERENCE
 www.google.com
 www.wikipedia.com
 www.oeclib.in
Thanks

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Dos attack
Dos attackDos attack
Dos attack
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
 
Ipspoofing
IpspoofingIpspoofing
Ipspoofing
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
System hacking
System hackingSystem hacking
System hacking
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Sql injection
Sql injectionSql injection
Sql injection
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 

Ähnlich wie Destributed denial of service attack ppt

cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year projectAmeya Vashishth
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptxdawitTerefe5
 
TOO;S USED IN DOS AND DDOS ATTACK12.pptx
TOO;S USED IN DOS AND DDOS ATTACK12.pptxTOO;S USED IN DOS AND DDOS ATTACK12.pptx
TOO;S USED IN DOS AND DDOS ATTACK12.pptxnidhidgowda185
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS IJITCA Journal
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attackHTS Hosting
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threatSensePost
 
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationAn Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationTechApprise
 

Ähnlich wie Destributed denial of service attack ppt (20)

L1803046876
L1803046876L1803046876
L1803046876
 
DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 
A041201010
A041201010A041201010
A041201010
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptx
 
TOO;S USED IN DOS AND DDOS ATTACK12.pptx
TOO;S USED IN DOS AND DDOS ATTACK12.pptxTOO;S USED IN DOS AND DDOS ATTACK12.pptx
TOO;S USED IN DOS AND DDOS ATTACK12.pptx
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threat
 
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationAn Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
DDoS.ppt
DDoS.pptDDoS.ppt
DDoS.ppt
 
D do s
D do sD do s
D do s
 

Mehr von OECLIB Odisha Electronics Control Library

Mehr von OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Kürzlich hochgeladen

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 

Kürzlich hochgeladen (20)

Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

Destributed denial of service attack ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On DESTRIBUTED DENIAL OF SERVICE ATTACK
  • 2. CONTENTS  Introduction of dos  Introduction of ddos  Components & architecture  Classification  Flood attacks  Amplifications attacks  Prototype exploit attacks  Malformed packet attacks  DDOS defense problems & classification  Intrusion prevention  Intrusion detection  Intrusion tolerance  Intrusion response  Conclusion  References
  • 3. INTRODUCTION OF DOS  A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users.  Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.
  • 4. INTRODUCTION OF DDOS  A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.  The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.
  • 6. CLASSIFICATION OF DDOS Classification can be divided in the following categories :-  Flood attack  Amplification attack  TCP SYN attack  Malformed packet attack
  • 7. FLOOD ATTACK In a flood attack, the zombies send large volumes of IP traffic to a victim system in order to congest the victim systems band width. Some of the well-known flood attacks are  UDP flood attacks  ICMP flood attacks
  • 8. UDP ATTACK  A UDP Flood attack is possible when a large number of UDP packets is sent to a victim system.  In a DDoS UDP Flood attack, the UDP packets are sent to either random or specified ports on the victim system.  When the victim system receives a UDP packet, it will determine what application is waiting on the destination port.
  • 9. ICMP FLOOD ATTACK ICMP Flood attacks exploit the Internet Control Message Protocol (ICMP), which enables users to send an echo packet to a remote host to check whether it’s alive.
  • 10. AMPLIFICATION ATTACK In amplification attacks the attacker or the agents exploit the broadcast IP address feature found on most routers to amplify and reflect the attack and send messages to a broadcast IP address. Some well known amplification attacks, are  Smurf attacks  Fraggle attacks
  • 11. SMURF ATTACK  Smurf attacks send ICMP echo request traffic with a spoofed source address of the target victim to a number of IP broadcast addresses.  Most hosts on an IP network will accept ICMP echo requests and reply to the source address, in this case, the target victim.
  • 12. FRAGGLE ATTACK  The Fraggle attacks are a similar attack to the Smurf except that they use UDP echo packets instead of ICMP echoes.  Fraggle attacks generate even more bad traffic and can create even more damaging effects than just a Smurf attack.
  • 13. PROTOTYPE EXPLOIT ATTACKS  Protocol exploit attacks exploit a specific feature or implementation bug of some protocol installed at the victim in order to consume excess amounts of its resources.  A representative example of protocol exploit attacks is TCP SYN attacks.
  • 14. MALFORMED PACKET ATTACK  Malformed packet attacks rely on incorrectly formed IP packets that are sent from agents to the victim in order to crash the victim system.  The malformed packet attacks can be divided in two types of attacks: IP address attack and IP packet options attack.  In an IP address `attack, the packet contains the same source and destination IP addresses.
  • 15. DDOS DEFENSE PROBLEM & CLASSIFICATION DDoS attacks are a hard problem to solve. Thus we have the following four categories :-  Intrusion Prevention,  Intrusion Detection,  Intrusion Tolerance and Mitigation  intrusion response
  • 16. CONCLUSION  DDos attack tools are readily available and any internet host is targetable as either a zombie or the ultimate DDos focus.  These attacks can be costly and frustrating and are difficult, if not impossible to eradicate.  The best defence is to hinder attackers through vigilant system administration.