Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 23
Denial-of-Service
What is DoS Attack?
► Denial-of-Service is an Attack on a computer or a network that reduces, restrict or prevents accessibility of system resource to its legitimate user. ► In a DoS attack attackers flood the victim system with non-legitimate service request or traffic to overload its resources. What is DDoS Attack? ► DDoS is a coordinated attack that involves a multitude of compromised system(Botnets) attacking a single target, thereby denying service to users of the targeted system. What is a Botnets? ► A bot refers to a software application that runs automated tasks over the internet. Attackers use bots to infect a large number of computers that form a network, or botnet allowing them to launch DDoS attacks ► A botnet is a huge network of compromised system and can be used by an attacker to launch denial-of-service attack. Organized Cyber Crime ► Nowadays criminals tend to operate in groups. There are organized group of cyber criminals who work in a hierarchical setup with a predefined revenue- sharing model. They create and rent botnets and offer various services against any target for a price. DoS/DDoS attack techniques Categories of DoS/DDoS attack DDoS attack mainly aim to diminish bandwidth by exhausting network. DoS/DDoS vectors are classified into 3 categories, ► Volumetric Attack ► Protocol Attack ► Application Layer attack. Volumetric attack These attack exhaust the bandwidth either within the target network or between the target network and the rest of the internet to cause traffic blockage, preventing access to legitimate users. Two types of bandwidth depletion attacks: ► Flood attack- DDoS to victims system to exhaust bandwidth ► Amplification attack- zombies transfer messages to broadcast IP which results in bandwidth consumption. Techniques used • UDP flood • ICMP flood • Smurf attack • Ping of death attack Application layer attack The attacker takes advantage of the programming errors in the application to cause the denial of service attack. It is achieved by sending numerous application requests to the target to exhaust the target’s resources so it will not be able to service any valid clients. A programming error in the case of buffer overflow attack- if the memory allocated to a variable is smaller than the requested, then it may lead to memory leakage or crashing the entire application. Attack Techniques ► HTTP GET/POST attck ► Slowloris attack ► UDP application layer flood attack Protocol attack Attackers can also prevent access to a target by consuming types of resources other than bandwidth, such as connection state tables. These attacks consume the connection state tables present in the network infrastructure devices such as load balancer, firewall and application servers. Consequently no new connection will be allowed because device will be waiting for existing connection to close or expire. Attacking techniques: ► SYN flood attack ► Fragmentation attack ► ACK flood attack Attacking techniques UDP Flood attack ICMP Flood attack Ping of Death attack Smurf attack SYN Flood attack Fragmentation Attack HTTP GET/POST Attack Slowloris Attack Tools used DoS/DDoS countermeasures Counter Measures: ► Use up-to-date anti-virus and IDS tools. ► Perform network analysis to find out the possibility of DOS attack. ► Shut down unnecessary services in the target network. ► Find and neutralize handlers. Protect secondary victims. ► Perform proper activity profiling and ingress/egress filtering to filter out unwanted traffic. ► Enforce in-depth packet Analysis. ► Use Defense-in–depth approach. ► Add additional load balancers to absorb traffic and set up a throttle logic to control traffic. ► Correct program errors. ► Use Strong encryption mechanisms.