SlideShare a Scribd company logo
1 of 6
Five dastardly Distributed Denial
          of Service attacks
While all Internet attacks obviously require a
level of sophistication, in the world of
cyberwarfare the Distributed Denial of
Service (DDoS) attack is one of the most
simple: ping a target with more requests than
it can handle so real users can’t get through.

It can also be effective, which is why DDoS
has become a common form of cyberattack,
now often employed by countries as
cyberware gains state-sponsorship.

Let’s look at some of the more high-profile
DDoS attacks in cyberhistory.                    Image courtesy of rajcreationzs/ FreeDigitalPhotos.net




                By Jeff Jedras
Robert Tappan Morris
While he didn’t set out to do harm, Robert
Tappan Morris may have given birth to the
modern computer virus when he unwittingly
released the first computer worm on the world in
1988 while a student at Cornell University.

His stated goal was to gauge the size of the
Internet, but its self-replicating nature caused it
to disrupt target machines, causing millions of
dollars in damages. He inspired the creation of
the U.S. Computer Emergency Response Team
(CERT), and was the first person charged under
the Computer Fraud and Abuse Act.

While not strictly a DDoS attack, it was an early
precursor. He’s now a professor at MIT.
Iran a target and a combatant
                                                 Iran has been a hotbed of DDoS
                                                 attacks. Or at least suspected ones.
                                                 In late 2011, Bank of America Corp.,
                                                 JPMorgan Chase & Co and Citigroup
                                                 were among a group of U.S.
                                                 companies to have their web sites
                                                 disrupted by attacks – all four are
                                                 involved in enforcing U.S. economic
                                                 sanctions against Iran.
U.S. government officials pointed to Iran, but Iranian officials denied any
involvement.

Iran has also been a target. During the Iranian student uprising in 2009, protest
groups targeted the web site of Iranian president Mahmoud Ahmadinejad,
causing the government to temporarily shut down the Internet.
Who’s bad?
Not all DDoS attacks are
malicious. When Michael Jackson
passed away in 2009, there was a
massive explosion in Internet
searches for information on the
late pop singer. The volume was
so high that search giant Google’s servers became overloaded, and with
millions of searches being conducted, Google thought it was the target of a
DDoS attack.

The symptoms were all there – a massive number of requests pinging Google’s
servers. People searching for Michael Jackson were for a time forced to enter a
captcha to prove their humanity. Eventually, Google put two and two together
and took its DDoS countermeasures offline, declaring a false alarm.
Montreal’s MafiaBoy
 While MafiaBay may be Canada’s entry to the DDoS
 hall of fame, his exploits were certainly global in
 nature.

 In 2000, Montreal teenager Michael Calce
 launched a DDoS attack against large commercial
 sites such as Yahoo, FIFA, Amazon, Dell, E*Trade
 and CNN. The costs of the attack were estimated at
 $7.5 million, and after a joint FBI/RCMP
 investigation, Calce was identified and plead guilty
 to most of the charges he faced.

 He later wrote a book about his experience that
 called for greater Internet security, claiming serious
 vulnerabilities still exist.
Going nuclear: Root nameservers
It would be extremely difficult to pull off, but the
nuclear DDoS attack option would target the 13
Domain Name System root nameserver clusters that
are, essentially, the backbone of the Internet.

 A sustained attack that took enough of them offline
could essentially shut down the entire Internet.

However, the system is built with so much
redundancy that the scale required to launch such
an attack would be massive. Some have tried – a
2002 attempt targeted all 13 servers and only lasted
an hour, while another in 2007 caused performance
issues for four servers that was compensated for by
the others – but no serious attempts have been
                                                       Image courtesy of twobee/ FreeDigitalPhotos.net
made.

More Related Content

Viewers also liked

IBM SoftLayer intro
IBM SoftLayer introIBM SoftLayer intro
IBM SoftLayer intro
Qmo Lin
 
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享
ChinaNetCloud
 
Ddos presentation
Ddos presentationDdos presentation
Ddos presentation
Shiela Lm
 

Viewers also liked (10)

Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyberAttack detection and prevention in the cyber
Attack detection and prevention in the cyber
 
TCP connection management in SDN
TCP connection management in SDNTCP connection management in SDN
TCP connection management in SDN
 
IBM SoftLayer intro
IBM SoftLayer introIBM SoftLayer intro
IBM SoftLayer intro
 
Les professeurs de Télécom ParisTech / Faculty booklet
Les professeurs de Télécom ParisTech / Faculty bookletLes professeurs de Télécom ParisTech / Faculty booklet
Les professeurs de Télécom ParisTech / Faculty booklet
 
DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasures
 
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享
 
Dos ddos
Dos ddosDos ddos
Dos ddos
 
Ddos presentation
Ddos presentationDdos presentation
Ddos presentation
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 

More from JeffJedras

Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
JeffJedras
 

More from JeffJedras (20)

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fall
 
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google Glass
 
The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading list
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoid
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travels
 
Five embarrassing mobile device thefts
Five embarrassing mobile device theftsFive embarrassing mobile device thefts
Five embarrassing mobile device thefts
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environments
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phones
 
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road trip
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PC
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxes
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designs
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
 
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twist
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product names
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Five Dastardly Distributed Denial of Service Attacks

  • 1. Five dastardly Distributed Denial of Service attacks While all Internet attacks obviously require a level of sophistication, in the world of cyberwarfare the Distributed Denial of Service (DDoS) attack is one of the most simple: ping a target with more requests than it can handle so real users can’t get through. It can also be effective, which is why DDoS has become a common form of cyberattack, now often employed by countries as cyberware gains state-sponsorship. Let’s look at some of the more high-profile DDoS attacks in cyberhistory. Image courtesy of rajcreationzs/ FreeDigitalPhotos.net By Jeff Jedras
  • 2. Robert Tappan Morris While he didn’t set out to do harm, Robert Tappan Morris may have given birth to the modern computer virus when he unwittingly released the first computer worm on the world in 1988 while a student at Cornell University. His stated goal was to gauge the size of the Internet, but its self-replicating nature caused it to disrupt target machines, causing millions of dollars in damages. He inspired the creation of the U.S. Computer Emergency Response Team (CERT), and was the first person charged under the Computer Fraud and Abuse Act. While not strictly a DDoS attack, it was an early precursor. He’s now a professor at MIT.
  • 3. Iran a target and a combatant Iran has been a hotbed of DDoS attacks. Or at least suspected ones. In late 2011, Bank of America Corp., JPMorgan Chase & Co and Citigroup were among a group of U.S. companies to have their web sites disrupted by attacks – all four are involved in enforcing U.S. economic sanctions against Iran. U.S. government officials pointed to Iran, but Iranian officials denied any involvement. Iran has also been a target. During the Iranian student uprising in 2009, protest groups targeted the web site of Iranian president Mahmoud Ahmadinejad, causing the government to temporarily shut down the Internet.
  • 4. Who’s bad? Not all DDoS attacks are malicious. When Michael Jackson passed away in 2009, there was a massive explosion in Internet searches for information on the late pop singer. The volume was so high that search giant Google’s servers became overloaded, and with millions of searches being conducted, Google thought it was the target of a DDoS attack. The symptoms were all there – a massive number of requests pinging Google’s servers. People searching for Michael Jackson were for a time forced to enter a captcha to prove their humanity. Eventually, Google put two and two together and took its DDoS countermeasures offline, declaring a false alarm.
  • 5. Montreal’s MafiaBoy While MafiaBay may be Canada’s entry to the DDoS hall of fame, his exploits were certainly global in nature. In 2000, Montreal teenager Michael Calce launched a DDoS attack against large commercial sites such as Yahoo, FIFA, Amazon, Dell, E*Trade and CNN. The costs of the attack were estimated at $7.5 million, and after a joint FBI/RCMP investigation, Calce was identified and plead guilty to most of the charges he faced. He later wrote a book about his experience that called for greater Internet security, claiming serious vulnerabilities still exist.
  • 6. Going nuclear: Root nameservers It would be extremely difficult to pull off, but the nuclear DDoS attack option would target the 13 Domain Name System root nameserver clusters that are, essentially, the backbone of the Internet. A sustained attack that took enough of them offline could essentially shut down the entire Internet. However, the system is built with so much redundancy that the scale required to launch such an attack would be massive. Some have tried – a 2002 attempt targeted all 13 servers and only lasted an hour, while another in 2007 caused performance issues for four servers that was compensated for by the others – but no serious attempts have been Image courtesy of twobee/ FreeDigitalPhotos.net made.