types and DOS attack & basics of denial of service.pdf

jayaprasanna10 57 views 18 slides Jul 23, 2024
Slide 1
Slide 1 of 18
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18

About This Presentation

CF


Slide Content

DoSAttacks
Basics

OUTLINE
•What Is DoS and what is DoS Attack
•History
•Types of Attacks
•Main targets today
•How to Defend
•Prosecution
•Conclusion

WHAT IS “DOSATTACK”
Denial-Of-ServiceAttack=DOSAttackisamaliciousattemptbya
singlepersonoragroupofpeopletocausethevictim,siteor
nodetodenyservicetoitcustomers.
•DoS=whenasinglehostattacks
•DDoS=whenmultiplehostsattacksimultaneously

IDEA OF “DOSATTACKS”
•Purposeistoshutdownasite,notpenetrateit.
•Purposemaybevandalism,extortionorsocialaction
(includingterrorism)(Sportsbettingsitesoftenextorted)
•Modificationofinternaldata,changeofprograms(Includes
defacementofwebsites)

Denial of Service Attack
Typical Connection

HISTORY
Morris Worm (November 2, 1988)
•First DDoS attack to cripple large amounts of network
infrastructure
•Self-replicating, self-propagating.
•Exploited software commonality (monoculture)
1.Fingerd buffer overflow exploit
2.Sendmail root vulnerability
3.Weak passwords

HISTORY
Morris Worm effect
•Infectedsystemsbecame“catatonic”
•Tookroughlythreedaystocomeundercontrol
•Ultimatelyinfected10%ofInternetcomputers(6,000)and
cost$milliontocleanup.
•Morrisconvictedundercomputerfraudandabuseact,three
yearsprobation,fineof$10,000

TYPES OF DOSATTACKS

TYPES OF DOSATTACKS
•Penetration
•Eavesdropping
•Man-In-The-Middle
•Flooding

TYPES OF DOSATTACKS
Penetration
•Attackergetsinsideyourmachine
•Cantakeovermachineanddowhateverhewants
•Achievesentryviasoftwareflaw(s),stolenpasswords
orinsideraccess

TYPES OF DOSATTACKS
Eavesdropping
•Attacker gains access to same network
•Listens to traffic going in and out of your machine

TYPES OF DOSATTACKS
Man-in-the-Middle
•Attacker listens to output and controls output
•Can substitute messages in both directions

TYPES OF DOSATTACKS
Flooding
•Attackersendsanoverwhelmingnumberofmessagesatyour
machine;greatcongestion
•Thecongestionmayoccurinthepathbeforeyourmachine
•Messagesfromlegitimateusersarecrowdedout
•UsuallycalledaDenialofService(DoS)attack,becausethat’s
theeffect.
•Usuallyinvolvesalargenumberofmachines,hence
DistributedDenialofService(DDoS)attack

MAIN TARGETS

HOW TO DEFEND
•Firewalls-can effectively prevent users from launching simple
flooding type attacks from machines behind the firewall.
•Switches-Some switches provide automatic and/or system-
widerate limiting,traffic shaping,delayed bindingto detect
and remediate denial of service attacks
•Routers-If you add rules to take flow statistics out of the
router during the DoS attacks, they further slow down and
complicate the matter
•DDS based defense
•Clean pipes

•Nothing can be done to entirely prevent DOS
•Minimize the dangers
–Effective and Robust Design
–Bandwidth Limitations
–Keep Systems Patched
–Run the least amount of services
–Allow only necessary traffic
–Block IP addresses

CONCLUSION
•Roleofinternationalboundaries-consoleslocatedacross
internationalborders,law-enforcementproblem
•Inthepast,asthepresent,DDoShasbeenmoreanuisance
activityconductedbycybervandalsthananactivitywith
specificsocioeconomicaims
•Inthefuture,DDoSmaybeusedasadisruptiveforce,with
broaddestabilizationasitsaiminsteadofthetargetingof
specifictargets
•Destabilizationhasahigh(ROI)ReturnOnInvestmentwhen
comparedtotargetedattacks

THANK YOU
Tags