SlideShare una empresa de Scribd logo
1 de 18
DoS Attacks
Basics
OUTLINE
• What Is DoS and what is DoS Attack
• History
• Types of Attacks
• Main targets today
• How to Defend
• Prosecution
• Conclusion
WHAT IS “DOS ATTACK”
Denial-Of-Service Attack = DOS Attack is a malicious attempt by a
single person or a group of people to cause the victim, site or
node to deny service to it customers.
• DoS = when a single host attacks
• DDoS = when multiple hosts attack simultaneously
IDEA OF “DOS ATTACKS”
• Purpose is to shut down a site, not penetrate it.
• Purpose may be vandalism, extortion or social action
(including terrorism) (Sports betting sites often extorted)
• Modification of internal data, change of programs (Includes
defacement of web sites)
Denial of Service Attack
Typical Connection
HISTORY
Morris Worm (November 2, 1988)
• First DDoS attack to cripple large amounts of network
infrastructure
• Self-replicating, self-propagating.
• Exploited software commonality (monoculture)
1. Fingerd buffer overflow exploit
2. Sendmail root vulnerability
3. Weak passwords
HISTORY
Morris Worm effect
• Infected systems became “catatonic”
• Took roughly three days to come under control
• Ultimately infected 10% of Internet computers (6,000) and
cost $ million to clean up.
• Morris convicted under computer fraud and abuse act, three
years probation, fine of $10,000
TYPES OF DOS ATTACKS
TYPES OF DOS ATTACKS
• Penetration
• Eavesdropping
• Man-In-The-Middle
• Flooding
TYPES OF DOS ATTACKS
Penetration
• Attacker gets inside your machine
• Can take over machine and do whatever he wants
• Achieves entry via software flaw(s), stolen passwords
or insider access
TYPES OF DOS ATTACKS
Eavesdropping
• Attacker gains access to same network
• Listens to traffic going in and out of your machine
TYPES OF DOS ATTACKS
Man-in-the-Middle
• Attacker listens to output and controls output
• Can substitute messages in both directions
TYPES OF DOS ATTACKS
Flooding
• Attacker sends an overwhelming number of messages at your
machine; great congestion
• The congestion may occur in the path before your machine
• Messages from legitimate users are crowded out
• Usually called a Denial of Service (DoS) attack, because that’s
the effect.
• Usually involves a large number of machines, hence
Distributed Denial of Service (DDoS) attack
MAIN TARGETS
HOW TO DEFEND
• Firewalls - can effectively prevent users from launching simple
flooding type attacks from machines behind the firewall.
• Switches - Some switches provide automatic and/or system-
wide rate limiting, traffic shaping, delayed binding to detect
and remediate denial of service attacks
• Routers - If you add rules to take flow statistics out of the
router during the DoS attacks, they further slow down and
complicate the matter
• DDS based defense
• Clean pipes
• Nothing can be done to entirely prevent DOS
• Minimize the dangers
– Effective and Robust Design
– Bandwidth Limitations
– Keep Systems Patched
– Run the least amount of services
– Allow only necessary traffic
– Block IP addresses
CONCLUSION
• Role of international boundaries - consoles located across
international borders, law-enforcement problem
• In the past, as the present, DDoS has been more a nuisance
activity conducted by cyber vandals than an activity with
specific socioeconomic aims
• In the future, DDoS may be used as a disruptive force, with
broad destabilization as its aim instead of the targeting of
specific targets
• Destabilization has a high (ROI) Return On Investment when
compared to targeted attacks
THANK YOU

Más contenido relacionado

La actualidad más candente

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Gaurav Sharma
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceEr. Shiva K. Shrestha
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service AttackDhrumil Panchal
 
System hacking
System hackingSystem hacking
System hackingCAS
 
Password Cracking
Password CrackingPassword Cracking
Password CrackingSagar Verma
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackAhmed Ghazey
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applicationsNiyas Nazar
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacksRollingsherman
 

La actualidad más candente (20)

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
System hacking
System hackingSystem hacking
System hacking
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Web security
Web securityWeb security
Web security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Mobile security
Mobile securityMobile security
Mobile security
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 

Destacado

Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service AttacksBrent Muir
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceAvirot Mitamura
 
DDoS Attack illustration
DDoS Attack illustrationDDoS Attack illustration
DDoS Attack illustrationMarcelo Silva
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationPavel Odintsov
 
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...garypierson
 
Super Effective Denial of Service Attacks
Super Effective Denial of Service AttacksSuper Effective Denial of Service Attacks
Super Effective Denial of Service AttacksJan Seidl
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
Layer 7 ddos
Layer 7 ddosLayer 7 ddos
Layer 7 ddosfangjiafu
 
Customer distributed denial of service (DDoS) experiences - Networkshop44
Customer distributed denial of service (DDoS) experiences - Networkshop44Customer distributed denial of service (DDoS) experiences - Networkshop44
Customer distributed denial of service (DDoS) experiences - Networkshop44Jisc
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
Defense mechanisms
Defense mechanismsDefense mechanisms
Defense mechanismsDrSabnis
 

Destacado (20)

DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
Denial Of Service Attack
Denial Of Service AttackDenial Of Service Attack
Denial Of Service Attack
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
 
DDoS Attack illustration
DDoS Attack illustrationDDoS Attack illustration
DDoS Attack illustration
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And Mitigation
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
 
Super Effective Denial of Service Attacks
Super Effective Denial of Service AttacksSuper Effective Denial of Service Attacks
Super Effective Denial of Service Attacks
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Layer 7 ddos
Layer 7 ddosLayer 7 ddos
Layer 7 ddos
 
Customer distributed denial of service (DDoS) experiences - Networkshop44
Customer distributed denial of service (DDoS) experiences - Networkshop44Customer distributed denial of service (DDoS) experiences - Networkshop44
Customer distributed denial of service (DDoS) experiences - Networkshop44
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Sniffing
SniffingSniffing
Sniffing
 
Defense mechanisms
Defense mechanismsDefense mechanisms
Defense mechanisms
 
114331707
114331707114331707
114331707
 

Similar a Basics of Denial of Service Attacks

Adarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.pptAdarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.pptFridha2
 
Aleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksDipesh Karade
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiProfessor Lili Saghafi
 
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu NepalDDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu NepalGurzuInc
 
denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designperfetbyedshareen
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident HandlingMarcelo Silva
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!PriyadharshiniHemaku
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1InfoSec Girls
 
CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39Bilal Ahmed
 
Using the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdfUsing the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdffms12345
 

Similar a Basics of Denial of Service Attacks (20)

Adarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.pptAdarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.ppt
 
Aleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS Attacks
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu NepalDDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
 
D dos attack
D dos attackD dos attack
D dos attack
 
denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive design
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1
 
Dos attack
Dos attackDos attack
Dos attack
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39
 
Addios!
Addios!Addios!
Addios!
 
Dos threats and countermeasures
Dos threats and countermeasuresDos threats and countermeasures
Dos threats and countermeasures
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
Using the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdfUsing the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdf
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Basics of Denial of Service Attacks

  • 2. OUTLINE • What Is DoS and what is DoS Attack • History • Types of Attacks • Main targets today • How to Defend • Prosecution • Conclusion
  • 3. WHAT IS “DOS ATTACK” Denial-Of-Service Attack = DOS Attack is a malicious attempt by a single person or a group of people to cause the victim, site or node to deny service to it customers. • DoS = when a single host attacks • DDoS = when multiple hosts attack simultaneously
  • 4. IDEA OF “DOS ATTACKS” • Purpose is to shut down a site, not penetrate it. • Purpose may be vandalism, extortion or social action (including terrorism) (Sports betting sites often extorted) • Modification of internal data, change of programs (Includes defacement of web sites)
  • 5. Denial of Service Attack Typical Connection
  • 6. HISTORY Morris Worm (November 2, 1988) • First DDoS attack to cripple large amounts of network infrastructure • Self-replicating, self-propagating. • Exploited software commonality (monoculture) 1. Fingerd buffer overflow exploit 2. Sendmail root vulnerability 3. Weak passwords
  • 7. HISTORY Morris Worm effect • Infected systems became “catatonic” • Took roughly three days to come under control • Ultimately infected 10% of Internet computers (6,000) and cost $ million to clean up. • Morris convicted under computer fraud and abuse act, three years probation, fine of $10,000
  • 8. TYPES OF DOS ATTACKS
  • 9. TYPES OF DOS ATTACKS • Penetration • Eavesdropping • Man-In-The-Middle • Flooding
  • 10. TYPES OF DOS ATTACKS Penetration • Attacker gets inside your machine • Can take over machine and do whatever he wants • Achieves entry via software flaw(s), stolen passwords or insider access
  • 11. TYPES OF DOS ATTACKS Eavesdropping • Attacker gains access to same network • Listens to traffic going in and out of your machine
  • 12. TYPES OF DOS ATTACKS Man-in-the-Middle • Attacker listens to output and controls output • Can substitute messages in both directions
  • 13. TYPES OF DOS ATTACKS Flooding • Attacker sends an overwhelming number of messages at your machine; great congestion • The congestion may occur in the path before your machine • Messages from legitimate users are crowded out • Usually called a Denial of Service (DoS) attack, because that’s the effect. • Usually involves a large number of machines, hence Distributed Denial of Service (DDoS) attack
  • 15. HOW TO DEFEND • Firewalls - can effectively prevent users from launching simple flooding type attacks from machines behind the firewall. • Switches - Some switches provide automatic and/or system- wide rate limiting, traffic shaping, delayed binding to detect and remediate denial of service attacks • Routers - If you add rules to take flow statistics out of the router during the DoS attacks, they further slow down and complicate the matter • DDS based defense • Clean pipes
  • 16. • Nothing can be done to entirely prevent DOS • Minimize the dangers – Effective and Robust Design – Bandwidth Limitations – Keep Systems Patched – Run the least amount of services – Allow only necessary traffic – Block IP addresses
  • 17. CONCLUSION • Role of international boundaries - consoles located across international borders, law-enforcement problem • In the past, as the present, DDoS has been more a nuisance activity conducted by cyber vandals than an activity with specific socioeconomic aims • In the future, DDoS may be used as a disruptive force, with broad destabilization as its aim instead of the targeting of specific targets • Destabilization has a high (ROI) Return On Investment when compared to targeted attacks