DDOS Attack - Gurzu Nepal

GurzuInc
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
3 TYPES
1. Application-Layer Attacks
2. Protocol Attacks
3. Volumetric Attacks
APPLICATION-LAYER ATTACKS
• Targets and disrupts a specific app, not an entire
network.
• A hacker generates a high number of HTTP requests
that exhaust the target server's ability to respond.
• Challenging to prevent as it is difficult to distinguish
between legitimate and malicious HTTP requests.
PROTOCOL ATTACKS
• Also known as network-layer attacks.
• Exploit weaknesses in the protocols or procedures that
govern internet communications.
• Use spoofing to create an infinite loop of requests
until the system crashes.
VOLUMETRIC ATTACKS
• Consumes a target's available bandwidth with false
data requests and creates network congestion.
• Most common type of this attack is the DNS
amplification attack.
• All volumetric attacks rely on botnets.
• Volumetric attacks are the most common type of
DDoS.
USUAL DDOS SYMPTOMS
• Large amounts of traffic coming from clients with same or similar characteristics. E.g. device type,
browser type/version, IP or IP range, and location etc.
• An exponential, unexpected rise in traffic at a single endpoint/server.
• A server starts repeatedly crashing for no reason.
• Your website is taking too long to respond to requests.
RESPONDING TO A DDOS ATTACK
•Blackhole filtering:Go through incoming traffic and determine a limitation criterion. Use the criterion to
route malicious traffic into a blackhole, essentially dropping it.
•Casting:Distribute the traffic across multiple servers, increasing your capacity, and decreasing the chances
of individual servers getting overwhelmed.
•IP Blocking: If you are noticing unexpectedly high traffic from the same range of IP addresses, block them.
PREVENTING DDOS ATTACKS
•Real-time packet analysis: Analyze packets based on different rules, as they enter your system, discarding
the potentially malicious ones.
•DDoS defense system (DDS): A DDS can detect legitimate-looking content with malicious intent. It
protects against both protocol and volumetric attacks, without requiring any human intervention.
•Web application firewall:Web application firewalls (WAF) are a great tool to mitigate application layer
DDoS attacks. They give you a way to filter incoming requests, based on different rules, which can also be
added on-the-fly, in response to an attack.
•Rate limiting:Limit the number of requests a server can entertain over a certain time period.
Thank
you
1 de 17

Recomendados

Session for InfoSecGirls - New age threat management vol 1 por
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1InfoSec Girls
155 vistas16 diapositivas
Denial of service por
Denial of serviceDenial of service
Denial of servicegarishma bhatia
1.8K vistas25 diapositivas
Types of attack por
Types of attackTypes of attack
Types of attackRajuPrasad33
43 vistas13 diapositivas
DDoS Mitigation Techniques for Your Enterprise IT Network por
DDoS Mitigation Techniques for Your Enterprise IT NetworkDDoS Mitigation Techniques for Your Enterprise IT Network
DDoS Mitigation Techniques for Your Enterprise IT NetworkHaltdos
116 vistas1 diapositiva
DDOS ATTACKS por
DDOS ATTACKSDDOS ATTACKS
DDOS ATTACKSShaurya Gogia
1.2K vistas23 diapositivas
DoS/DDoS por
DoS/DDoSDoS/DDoS
DoS/DDoSVihari Piratla
1.2K vistas24 diapositivas

Más contenido relacionado

Similar a DDOS Attack - Gurzu Nepal

Ddos- distributed denial of service por
Ddos- distributed denial of service Ddos- distributed denial of service
Ddos- distributed denial of service laxmi chandolia
214 vistas24 diapositivas
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm por
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET Journal
29 vistas5 diapositivas
Information Security Systems por
Information Security SystemsInformation Security Systems
Information Security SystemsEyad Mhanna
273 vistas16 diapositivas
Denial of service por
Denial of serviceDenial of service
Denial of serviceSaritaTripathy4
95 vistas7 diapositivas
A10 issa d do s 5-2014 por
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014Raleigh ISSA
1.8K vistas32 diapositivas
security in IOT.pptx por
security in IOT.pptxsecurity in IOT.pptx
security in IOT.pptxTulasi72
3 vistas104 diapositivas

Similar a DDOS Attack - Gurzu Nepal(20)

Ddos- distributed denial of service por laxmi chandolia
Ddos- distributed denial of service Ddos- distributed denial of service
Ddos- distributed denial of service
laxmi chandolia214 vistas
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm por IRJET Journal
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET Journal29 vistas
Information Security Systems por Eyad Mhanna
Information Security SystemsInformation Security Systems
Information Security Systems
Eyad Mhanna273 vistas
A10 issa d do s 5-2014 por Raleigh ISSA
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
Raleigh ISSA1.8K vistas
security in IOT.pptx por Tulasi72
security in IOT.pptxsecurity in IOT.pptx
security in IOT.pptx
Tulasi723 vistas
Basics of Denial of Service Attacks por Hansa Nidushan
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
Hansa Nidushan17.4K vistas
DoS Attack - Incident Handling por Marcelo Silva
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
Marcelo Silva4.9K vistas
Aleksei zaitchenkov slides about DOS Attacks por Dipesh Karade
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS Attacks
Dipesh Karade146 vistas
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB... por IJNSA Journal
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
IJNSA Journal11 vistas
Whitepaper on DDoS Mitigation por Gaurav Bhatia
Whitepaper on DDoS MitigationWhitepaper on DDoS Mitigation
Whitepaper on DDoS Mitigation
Gaurav Bhatia1.2K vistas
Denial of Service Attacks (DoS/DDoS) por Gaurav Sharma
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma2.2K vistas
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali por Marta Pacyga
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
Marta Pacyga1.1K vistas
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali por PROIDEA
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PROIDEA115 vistas
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi por Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Adarsh-PPT-FCF-12-thm.ppt por Fridha2
Adarsh-PPT-FCF-12-thm.pptAdarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.ppt
Fridha28 vistas

Más de GurzuInc

Power of documentation | Aarati Shah | Gurzu.pdf por
Power of documentation | Aarati Shah | Gurzu.pdfPower of documentation | Aarati Shah | Gurzu.pdf
Power of documentation | Aarati Shah | Gurzu.pdfGurzuInc
2 vistas8 diapositivas
The Art of Refactoring | Asmit Ghimire | Gurzu.pdf por
The Art of Refactoring | Asmit Ghimire | Gurzu.pdfThe Art of Refactoring | Asmit Ghimire | Gurzu.pdf
The Art of Refactoring | Asmit Ghimire | Gurzu.pdfGurzuInc
5 vistas14 diapositivas
I'm Programmer _ Ganesh Kunwar _ Gurzu.pdf por
I'm Programmer _ Ganesh Kunwar _ Gurzu.pdfI'm Programmer _ Ganesh Kunwar _ Gurzu.pdf
I'm Programmer _ Ganesh Kunwar _ Gurzu.pdfGurzuInc
3 vistas7 diapositivas
Obtaining Your Tax Clearance Certificate_ A Quick Guide | Deepak Rai | Gurzu.pdf por
Obtaining Your Tax Clearance Certificate_ A Quick Guide | Deepak Rai | Gurzu.pdfObtaining Your Tax Clearance Certificate_ A Quick Guide | Deepak Rai | Gurzu.pdf
Obtaining Your Tax Clearance Certificate_ A Quick Guide | Deepak Rai | Gurzu.pdfGurzuInc
15 vistas13 diapositivas
Problem Solving Skill - Bishal Sapkota - Gurzu por
Problem Solving Skill - Bishal Sapkota - GurzuProblem Solving Skill - Bishal Sapkota - Gurzu
Problem Solving Skill - Bishal Sapkota - GurzuGurzuInc
16 vistas27 diapositivas
My experience with Mobile Testing - Asmita Poudel - Gurzu por
My experience with Mobile Testing - Asmita Poudel - GurzuMy experience with Mobile Testing - Asmita Poudel - Gurzu
My experience with Mobile Testing - Asmita Poudel - GurzuGurzuInc
5 vistas14 diapositivas

Más de GurzuInc(17)

Power of documentation | Aarati Shah | Gurzu.pdf por GurzuInc
Power of documentation | Aarati Shah | Gurzu.pdfPower of documentation | Aarati Shah | Gurzu.pdf
Power of documentation | Aarati Shah | Gurzu.pdf
GurzuInc2 vistas
The Art of Refactoring | Asmit Ghimire | Gurzu.pdf por GurzuInc
The Art of Refactoring | Asmit Ghimire | Gurzu.pdfThe Art of Refactoring | Asmit Ghimire | Gurzu.pdf
The Art of Refactoring | Asmit Ghimire | Gurzu.pdf
GurzuInc5 vistas
I'm Programmer _ Ganesh Kunwar _ Gurzu.pdf por GurzuInc
I'm Programmer _ Ganesh Kunwar _ Gurzu.pdfI'm Programmer _ Ganesh Kunwar _ Gurzu.pdf
I'm Programmer _ Ganesh Kunwar _ Gurzu.pdf
GurzuInc3 vistas
Obtaining Your Tax Clearance Certificate_ A Quick Guide | Deepak Rai | Gurzu.pdf por GurzuInc
Obtaining Your Tax Clearance Certificate_ A Quick Guide | Deepak Rai | Gurzu.pdfObtaining Your Tax Clearance Certificate_ A Quick Guide | Deepak Rai | Gurzu.pdf
Obtaining Your Tax Clearance Certificate_ A Quick Guide | Deepak Rai | Gurzu.pdf
GurzuInc15 vistas
Problem Solving Skill - Bishal Sapkota - Gurzu por GurzuInc
Problem Solving Skill - Bishal Sapkota - GurzuProblem Solving Skill - Bishal Sapkota - Gurzu
Problem Solving Skill - Bishal Sapkota - Gurzu
GurzuInc16 vistas
My experience with Mobile Testing - Asmita Poudel - Gurzu por GurzuInc
My experience with Mobile Testing - Asmita Poudel - GurzuMy experience with Mobile Testing - Asmita Poudel - Gurzu
My experience with Mobile Testing - Asmita Poudel - Gurzu
GurzuInc5 vistas
Upgrading Services _ Ashraya Tuldhar _ Knowledge ketchup.pptx por GurzuInc
Upgrading Services _ Ashraya Tuldhar _ Knowledge ketchup.pptxUpgrading Services _ Ashraya Tuldhar _ Knowledge ketchup.pptx
Upgrading Services _ Ashraya Tuldhar _ Knowledge ketchup.pptx
GurzuInc2 vistas
The real definition of done (1).pptx.pdf por GurzuInc
The real definition of done (1).pptx.pdfThe real definition of done (1).pptx.pdf
The real definition of done (1).pptx.pdf
GurzuInc6 vistas
Fantastic Blogs and How to Write Them | Alaka Acharya.pptx por GurzuInc
Fantastic Blogs and How to Write Them | Alaka Acharya.pptxFantastic Blogs and How to Write Them | Alaka Acharya.pptx
Fantastic Blogs and How to Write Them | Alaka Acharya.pptx
GurzuInc11 vistas
The power of saying no | Abinash Bhattarai | Gurzu.pdf por GurzuInc
The power of saying no | Abinash Bhattarai | Gurzu.pdfThe power of saying no | Abinash Bhattarai | Gurzu.pdf
The power of saying no | Abinash Bhattarai | Gurzu.pdf
GurzuInc41 vistas
Hotwire and Turbo - Knowledge Ketchup - Prajit Bhandari.pdf por GurzuInc
Hotwire and Turbo - Knowledge Ketchup - Prajit Bhandari.pdfHotwire and Turbo - Knowledge Ketchup - Prajit Bhandari.pdf
Hotwire and Turbo - Knowledge Ketchup - Prajit Bhandari.pdf
GurzuInc47 vistas
Automation Testing - G1 conference Ch13.pptx por GurzuInc
Automation Testing - G1 conference Ch13.pptxAutomation Testing - G1 conference Ch13.pptx
Automation Testing - G1 conference Ch13.pptx
GurzuInc17 vistas
CSS 101 - G1 conference Gurzu.pptx por GurzuInc
CSS 101 - G1 conference Gurzu.pptxCSS 101 - G1 conference Gurzu.pptx
CSS 101 - G1 conference Gurzu.pptx
GurzuInc10 vistas
Discussion Regarding benefits on taxes on income from employment.pptx por GurzuInc
Discussion Regarding benefits on taxes on income from employment.pptxDiscussion Regarding benefits on taxes on income from employment.pptx
Discussion Regarding benefits on taxes on income from employment.pptx
GurzuInc7 vistas
How not to Model Data - G1 conference.pptx por GurzuInc
How not to Model Data - G1 conference.pptxHow not to Model Data - G1 conference.pptx
How not to Model Data - G1 conference.pptx
GurzuInc9 vistas
API Testing.pptx por GurzuInc
API Testing.pptxAPI Testing.pptx
API Testing.pptx
GurzuInc26 vistas
Building CI_CD for Mobile Development.pptx por GurzuInc
Building CI_CD for Mobile Development.pptxBuilding CI_CD for Mobile Development.pptx
Building CI_CD for Mobile Development.pptx
GurzuInc9 vistas

Último

Business Analyst Series 2023 - Week 4 Session 7 por
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7DianaGray10
126 vistas31 diapositivas
The Role of Patterns in the Era of Large Language Models por
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language ModelsYunyao Li
80 vistas65 diapositivas
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
385 vistas86 diapositivas
20231123_Camunda Meetup Vienna.pdf por
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
50 vistas73 diapositivas
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
50 vistas35 diapositivas
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... por
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...ShapeBlue
88 vistas13 diapositivas

Último(20)

Business Analyst Series 2023 - Week 4 Session 7 por DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 vistas
The Role of Patterns in the Era of Large Language Models por Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li80 vistas
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software385 vistas
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... por ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue88 vistas
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue94 vistas
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash153 vistas
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... por ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue120 vistas
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc160 vistas
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... por ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue101 vistas
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson156 vistas
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue88 vistas
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue por ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue176 vistas
"Surviving highload with Node.js", Andrii Shumada por Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays53 vistas
The Power of Heat Decarbonisation Plans in the Built Environment por IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE69 vistas
DRBD Deep Dive - Philipp Reisner - LINBIT por ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 vistas
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue por ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue93 vistas
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue210 vistas

DDOS Attack - Gurzu Nepal

  • 10. 3 TYPES 1. Application-Layer Attacks 2. Protocol Attacks 3. Volumetric Attacks
  • 11. APPLICATION-LAYER ATTACKS • Targets and disrupts a specific app, not an entire network. • A hacker generates a high number of HTTP requests that exhaust the target server's ability to respond. • Challenging to prevent as it is difficult to distinguish between legitimate and malicious HTTP requests.
  • 12. PROTOCOL ATTACKS • Also known as network-layer attacks. • Exploit weaknesses in the protocols or procedures that govern internet communications. • Use spoofing to create an infinite loop of requests until the system crashes.
  • 13. VOLUMETRIC ATTACKS • Consumes a target's available bandwidth with false data requests and creates network congestion. • Most common type of this attack is the DNS amplification attack. • All volumetric attacks rely on botnets. • Volumetric attacks are the most common type of DDoS.
  • 14. USUAL DDOS SYMPTOMS • Large amounts of traffic coming from clients with same or similar characteristics. E.g. device type, browser type/version, IP or IP range, and location etc. • An exponential, unexpected rise in traffic at a single endpoint/server. • A server starts repeatedly crashing for no reason. • Your website is taking too long to respond to requests.
  • 15. RESPONDING TO A DDOS ATTACK •Blackhole filtering:Go through incoming traffic and determine a limitation criterion. Use the criterion to route malicious traffic into a blackhole, essentially dropping it. •Casting:Distribute the traffic across multiple servers, increasing your capacity, and decreasing the chances of individual servers getting overwhelmed. •IP Blocking: If you are noticing unexpectedly high traffic from the same range of IP addresses, block them.
  • 16. PREVENTING DDOS ATTACKS •Real-time packet analysis: Analyze packets based on different rules, as they enter your system, discarding the potentially malicious ones. •DDoS defense system (DDS): A DDS can detect legitimate-looking content with malicious intent. It protects against both protocol and volumetric attacks, without requiring any human intervention. •Web application firewall:Web application firewalls (WAF) are a great tool to mitigate application layer DDoS attacks. They give you a way to filter incoming requests, based on different rules, which can also be added on-the-fly, in response to an attack. •Rate limiting:Limit the number of requests a server can entertain over a certain time period.