Denial of Service - PPTM

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

Denial-of-Service

What is DoS Attack?


► Denial-of-Service is an Attack on a computer or a network that reduces,
restrict or prevents accessibility of system resource to its legitimate user.
► In a DoS attack attackers flood the victim system with non-legitimate service
request or traffic to overload its resources.
What is DDoS Attack?
► DDoS is a coordinated attack that involves a multitude of compromised
system(Botnets) attacking a single target, thereby denying service to users of
the targeted system.
What is a Botnets?
► A bot refers to a software application that runs automated tasks over the
internet. Attackers use bots to infect a large number of computers that form
a network, or botnet allowing them to launch DDoS attacks
► A botnet is a huge network of compromised system and can be used by an
attacker to launch denial-of-service attack.
Organized Cyber Crime
► Nowadays criminals tend to operate in groups. There are organized group of
cyber criminals who work in a hierarchical setup with a predefined revenue-
sharing model. They create and rent botnets and offer various services
against any target for a price.
DoS/DDoS attack techniques
Categories of DoS/DDoS attack
DDoS attack mainly aim to diminish bandwidth by exhausting network.
DoS/DDoS vectors are classified into 3 categories,
► Volumetric Attack
► Protocol Attack
► Application Layer attack.
Volumetric attack
These attack exhaust the bandwidth either within the target network or between
the target network and the rest of the internet to cause traffic blockage,
preventing access to legitimate users.
Two types of bandwidth depletion attacks:
► Flood attack- DDoS to victims system to exhaust bandwidth
► Amplification attack- zombies transfer messages to broadcast IP which results
in bandwidth consumption.
Techniques used
• UDP flood
• ICMP flood
• Smurf attack
• Ping of death attack
Application layer attack
The attacker takes advantage of the programming errors in the application to
cause the denial of service attack. It is achieved by sending numerous application
requests to the target to exhaust the target’s resources so it will not be able to
service any valid clients. A programming error in the case of buffer overflow
attack- if the memory allocated to a variable is smaller than the requested, then
it may lead to memory leakage or crashing the entire application.
Attack Techniques
► HTTP GET/POST attck
► Slowloris attack
► UDP application layer flood attack
Protocol attack
Attackers can also prevent access to a target by consuming types of resources
other than bandwidth, such as connection state tables. These attacks consume
the connection state tables present in the network infrastructure devices such as
load balancer, firewall and application servers. Consequently no new connection
will be allowed because device will be waiting for existing connection to close or
expire.
Attacking techniques:
► SYN flood attack
► Fragmentation attack
► ACK flood attack
Attacking techniques
UDP Flood attack
ICMP Flood attack
Ping of Death attack
Smurf attack
SYN Flood attack
Fragmentation Attack
HTTP GET/POST Attack
Slowloris Attack
Tools used
DoS/DDoS countermeasures
Counter Measures:
► Use up-to-date anti-virus and IDS tools.
► Perform network analysis to find out the possibility of DOS attack.
► Shut down unnecessary services in the target network.
► Find and neutralize handlers. Protect secondary victims.
► Perform proper activity profiling and ingress/egress filtering to filter out
unwanted traffic.
► Enforce in-depth packet Analysis.
► Use Defense-in–depth approach.
► Add additional load balancers to absorb traffic and set up a throttle logic to
control traffic.
► Correct program errors.
► Use Strong encryption mechanisms.

You might also like