Ddos
Ddos
Ddos
(Distributed Denial of
Service)
What is DDoS ?
The scale of DDoS attacks has continued to rise over recent years, even
reaching over 400Gbit/s.
DDoS OVERVIEW
A DDoS attack deploys multiple machines to attain this goal. There are many ways to
perpetrate a denial-of-service attack.
One frequently exercised approach is for the attacker to send a stream of packets to
a victim; this stream consumes some key resource, thus rendering it unavailable to
the victim's legitimate clients.
Another common approach is for the attacker to send a few malformed packets that
confuse an application or a protocol on the victim machine and force it to freeze or
reboot. (IP spoofing)
1.
2.
3.
4.
5.
6.
Control is distributed
Sometimes the motives are personal reasons where a signicant number of DDoS
attacks are perpetrated against home computers, presumably for purposes of
revenge.
Other times it is prestige where successful attacks on popular Web servers are
done to gain the respect of the hacker community.
However, it is not unlikely that some DDoS attacks are performed for material gain
(damaging competitors resources) or for political reasons (a country at war could
perpetrate attacks against its enemys critical resources, potentially enlisting a
signicant portion of the entire countrys computing power for this action).
In some cases, the true victim of the attack might not be the actual target of the
attack packets, but others who rely on the targets correct operation.
Types Of Attacks
1. Volumetric Attacks (connectionless):
Also known as floods,
the goal of this type of
attack is to cause congestion
and send so much traffic that
it overwhelms the bandwidth of the
site. Attacks are typically executed
using botnets, an army of computers
infected with malicious software
and controlled as a group by the
hacker.
2.Reflected attack
A reflected attack is where an attacker creates forged packets that will be
sent out to as many computers as possible. When these computers receive
the packets they will reply, but the reply will be a spoofed address that
actually routes to the target. All of the computers will attempt to
communicate at once and this will cause the site to be bogged down with
requests until the server resources are exhausted.
3.UDP Flood
One common DDoS attack method is referred to as a UDP
flood. Random ports on the target machine are flooded
with packets that cause it to listen for applications on that
those ports and report back with a ICMP packet.
5. Ping of Death
A ping of death ("POD") attack involves the attacker sending multiple malformed or
malicious pings to a computer. The maximum packet length of an IP packet (including
header) is 65,535 bytes. However, the Data Link Layer usually poses limits to the maximum
frame size - for example 1500 bytes over an Ethernet network. In this case, a large IP
packet is split across multiple IP packets (known as fragments), and the recipient host
reassembles the IP fragments into the complete packet.
In a Ping of Death scenario, following malicious manipulation of fragment content, the
recipient ends up with an IP packet which is larger than 65,535 bytes when reassembled.
This can overflow memory buffers allocated for the packet, causing denial of service for
legitimate packets.
The purpose of this attack is to slow server response times. A DDoS attack
seeks to take a website or server offline. That is not the case in a
degradation of service attack. The goal here is to slow response time to a
level that essentially makes the website unusable for most people. Zombie
computers are leveraged to flood a target machine with malicious traffic
that will cause performance and page-loading issues. These types of
attacks can be difficult to detect because the goal is not to take the
website offline, but to degrade performance. They are often confused
with simply an increase in website traffic.
6. Slowloris
Slowloris is a highly-targeted attack, enabling one web server to take down another
server, without affecting other services or ports on the target network. Slowloris
does this by holding as many connections to the target web server open for as long
as possible. It accomplishes this by creating connections to the target server, but
sending only a partial request. Slowloris constantly sends more HTTP headers, but
never completes a request. The targeted server keeps each of these false
connections open. This eventually overflows the maximum concurrent connection
pool, and leads to denial of additional connections from legitimate clients.
7. HTTP Flood
In HTTP flood DDoS attack the attacker exploits seemingly-legitimate HTTP GET or
POST requests to attack a web server or application. HTTP floods do not use
malformed packets, spoofing or reflection techniques, and require less bandwidth
than other attacks to bring down the targeted site or server. The attack is most
effective when it forces the server or application to allocate the maximum
resources possible in response to each single request.
Common targets
TARGETS OF DDOS
Banking institutions,
Public sector
Attack Targets->
DDoS attacks are designed to target any aspect of a business and its
resources, and can easily:
In 2014, Boston Children's Hospital became the first health care organization
to be targeted by DDoS attacks from a hacktivist group. Because the hospital
uses the same Internet Service Provider (ISP) as seven other area health care
institutions, the organized DDoS attacks had the potential to bring down
multiple pieces of Boston's critical health care infrastructure.
Pre-Strike Doxing :On March 20, 2014, leaders at Boston Children's Hospital
received word of a threatening Twitter message attributed to Anonymous. The
message related to a high-profile child-custody case in which a 15-year-old
girl with a complex diagnosis was taken into custody by Massachusetts
protective services. The message threatened retaliation if the hospital did not
take disciplinary action against certain clinicians and return the child to her
parents. Attackers even posted personal informationhome addresses, email
addresses, and phone numbersof some of the people involved. (This activity
is known as "doxing.")
The Boston Children's Hospital team invoked Radware's Emergency Response Team
to perform DDoS attack mitigation, and used Radware's scrubbing center to handle
the massive rate of DDoS attacks. Because Boston Children's Hospital shares an ISP
with other hospitals, seven other health care institutions also faced potential
impacts to their network and operations.
Peer to peer
Peer-to-Peer servers present an opportunity for attackers. What happens is
instead of using a botnet to siphon traffic towards the target, a peer-topeer server is exploited to route traffic to the target website. When done
successfully, people using the file-sharing hub are instead sent to the
target website until the website is overwhelmed and sent offline.