types and DOS attack & basics of denial of service.pdf
jayaprasanna10
57 views
18 slides
Jul 23, 2024
Slide 1 of 18
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
About This Presentation
CF
Size: 381.55 KB
Language: en
Added: Jul 23, 2024
Slides: 18 pages
Slide Content
DoSAttacks
Basics
OUTLINE
•What Is DoS and what is DoS Attack
•History
•Types of Attacks
•Main targets today
•How to Defend
•Prosecution
•Conclusion
WHAT IS “DOSATTACK”
Denial-Of-ServiceAttack=DOSAttackisamaliciousattemptbya
singlepersonoragroupofpeopletocausethevictim,siteor
nodetodenyservicetoitcustomers.
•DoS=whenasinglehostattacks
•DDoS=whenmultiplehostsattacksimultaneously
IDEA OF “DOSATTACKS”
•Purposeistoshutdownasite,notpenetrateit.
•Purposemaybevandalism,extortionorsocialaction
(includingterrorism)(Sportsbettingsitesoftenextorted)
•Modificationofinternaldata,changeofprograms(Includes
defacementofwebsites)
Denial of Service Attack
Typical Connection
HISTORY
Morris Worm (November 2, 1988)
•First DDoS attack to cripple large amounts of network
infrastructure
•Self-replicating, self-propagating.
•Exploited software commonality (monoculture)
1.Fingerd buffer overflow exploit
2.Sendmail root vulnerability
3.Weak passwords
HISTORY
Morris Worm effect
•Infectedsystemsbecame“catatonic”
•Tookroughlythreedaystocomeundercontrol
•Ultimatelyinfected10%ofInternetcomputers(6,000)and
cost$milliontocleanup.
•Morrisconvictedundercomputerfraudandabuseact,three
yearsprobation,fineof$10,000
TYPES OF DOSATTACKS
TYPES OF DOSATTACKS
•Penetration
•Eavesdropping
•Man-In-The-Middle
•Flooding
TYPES OF DOSATTACKS
Penetration
•Attackergetsinsideyourmachine
•Cantakeovermachineanddowhateverhewants
•Achievesentryviasoftwareflaw(s),stolenpasswords
orinsideraccess
TYPES OF DOSATTACKS
Eavesdropping
•Attacker gains access to same network
•Listens to traffic going in and out of your machine
TYPES OF DOSATTACKS
Man-in-the-Middle
•Attacker listens to output and controls output
•Can substitute messages in both directions
HOW TO DEFEND
•Firewalls-can effectively prevent users from launching simple
flooding type attacks from machines behind the firewall.
•Switches-Some switches provide automatic and/or system-
widerate limiting,traffic shaping,delayed bindingto detect
and remediate denial of service attacks
•Routers-If you add rules to take flow statistics out of the
router during the DoS attacks, they further slow down and
complicate the matter
•DDS based defense
•Clean pipes
•Nothing can be done to entirely prevent DOS
•Minimize the dangers
–Effective and Robust Design
–Bandwidth Limitations
–Keep Systems Patched
–Run the least amount of services
–Allow only necessary traffic
–Block IP addresses