DOS
ATTACKS
BY – ADARSH SHUKLA
Adarsh-PPT-FCF-12-thm.ppt
OUTLINE
• “DoS Attacks” – What Is
• History
• Types of Attacks
• Main targets today
• How to Defend
• Conclusion
WHAT IS “DOS ATTACK”
Denial-Of-Service Attack = DOS Attack is a
malicious attempt by a single person or a group
of people to cause the victim, site or node to
deny service to it customers.
• DoS = when a single host attacks
• DDoS = when multiple hosts attack
simultaneously
DENIAL OF SERVICE ATTACKS
DENIAL-OF-SERVICE (DOS) ATTACK IS AN ATTEMPT BY
ATTACKER TO PREVENT LEGITIMATE USERS FROM USING
RESOURCES
DENIAL-OF-SERVICE DENIES A VICTIM (HOST, ROUTER, OR ENTIRE
NETWORK) FROM PROVIDING OR RECEIVING NORMAL SERVICES
ATTACK SIZE IN GBITS-PER-
SECOND
IDEA OF “DOS ATTACKS”
• Purpose is to shut down a site, not penetrate it.
• Purpose may be vandalism, extortion or social action
(including terrorism) (Sports betting sites often
extorted)
• Modification of internal data, change of programs
(Includes defacement of web sites)
HISTORY
Morris Worm (November 2, 1988)
• First DDoS attack to cripple large amounts of network
infrastructure
• Self-replicating, self-propagating.
• Exploited software commonality (monoculture)
1. Fingerd buffer overflow exploit
2. Sendmail root vulnerability
3. Weak passwords
HISTORY
Morris Worm effect
• Infected systems became “catatonic”
• Took roughly three days to come under control
• Ultimately infected 10% of Internet computers
(6,000) and cost $ million to clean up.
• Morris convicted under computer fraud and
abuse act, three years probation, fine of $10,000
HISTORY
SQL Slammer (January, 25 2003)
• Exploited common software (Microsoft SQL Server) as well as
hardware (Intel x86), spread rapidly in a distinct monoculture.
• Non-destructive. Modified no data on infected system
• Extremely simple in construction (376 bytes)
• Devastating:
1. 120,000 computers infected at peak (1/26/2003)
2. Exhausted network bandwidth
3. Crashed network infrastructure (multicast state creation)
4. Shut down communication (fire-fighting) capability
HISTORY
SQL Slammer effect
• Extremely Virulent
• Caused economic damage outside of IT infrastructure
(multiple ATM outages)
• Original perpetrators have never been identified or
brought to justice
TYPES OF DOS ATTACKS
Adarsh-PPT-FCF-12-thm.ppt
TYPES OF DOS ATTACKS
• Penetration
• Eavesdropping
• Man-In-The-Middle
• Flooding
TYPES OF DOS ATTACKS
Penetration
• Attacker gets inside your machine
• Can take over machine and do whatever
he wants
• Achieves entry via software flaw(s), stolen
passwords or insider access
TYPES OF DOS ATTACKS
Eavesdropping
• Attacker gains access to same network
• Listens to traffic going in and out of your
machine
TYPES OF DOS ATTACKS
Man-in-the-Middle
• Attacker listens to output and controls output
• Can substitute messages in both directions
TYPES OF DOS ATTACKS
Flooding
• Attacker sends an overwhelming number of messages
at your machine; great congestion
• The congestion may occur in the path before your
machine
• Messages from legitimate users are crowded out
• Usually called a Denial of Service (DoS) attack,
because that’s the effect.
• Usually involves a large number of machines, hence
Distributed Denial of Service (DDoS) attack
MAIN TARGETS
HOW TO DEFEND
• Firewalls - can effectively prevent users from launching simple
flooding type attacks from machines behind the firewall.
• Switches - Some switches provide automatic and/or system-
wide rate limiting, traffic shaping, delayed binding to detect and
remediate denial of service attacks
• Routers - If you add rules to take flow statistics out of the router
during the DoS attacks, they further slow down and complicate
the matter
• DDS based defense
• Clean pipes
CONCLUSION
• Role of international boundaries - consoles located across
international borders, law-enforcement problem
• In the past, as the present, DDoS has been more a
nuisance activity conducted by cyber vandals than an
activity with specific socioeconomic aims
• In the future, DDoS may be used as a disruptive force,
with broad destabilization as its aim instead of the
targeting of specific targets
• Destabilization has a high (ROI) Return On Investment
when compared to targeted attacks
QUESTIONS?
People are talking about the Internet as though
it is going to change the world. It's not going to
change
the world. It's not going to change the way we
think,
and it's not going to change the way we feel.
Adarsh Shukla

More Related Content

PPT
Denail of Service
PPTX
Denial of service
PPT
Port scanning
PPTX
Intrusion detection system
PPTX
DDoS - Distributed Denial of Service
PPTX
Destributed denial of service attack ppt
PDF
Analysing Ransomware
Denail of Service
Denial of service
Port scanning
Intrusion detection system
DDoS - Distributed Denial of Service
Destributed denial of service attack ppt
Analysing Ransomware

What's hot (20)

PPTX
Threat hunting and achieving security maturity
PPT
Intrusion Detection System
PDF
Virtual honeypot
PPT
Ransomware - The Growing Threat
PDF
Tools kali
PPTX
Intrusion detection system
PPTX
PPT
Virus and Malicious Code Chapter 5
PDF
Ossec - Host Based Saldırı Tespit Sistemi
PPTX
HONEYPOTS: Definition, working, advantages, disadvantages
PDF
Introduction IDS
PDF
VULNERABILITY ( CYBER SECURITY )
PDF
Nessus Software
PPTX
Windows firewall
PPTX
Introduction to IDS & IPS - Part 1
PPTX
Web application attacks
PPTX
Network scanning
PPTX
Computer Security risks Shelly
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Threat hunting and achieving security maturity
Intrusion Detection System
Virtual honeypot
Ransomware - The Growing Threat
Tools kali
Intrusion detection system
Virus and Malicious Code Chapter 5
Ossec - Host Based Saldırı Tespit Sistemi
HONEYPOTS: Definition, working, advantages, disadvantages
Introduction IDS
VULNERABILITY ( CYBER SECURITY )
Nessus Software
Windows firewall
Introduction to IDS & IPS - Part 1
Web application attacks
Network scanning
Computer Security risks Shelly
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Ad

Similar to Adarsh-PPT-FCF-12-thm.ppt (20)

PDF
types and DOS attack & basics of denial of service.pdf
PPTX
Basics of Denial of Service Attacks
PPTX
basicsofdenialofservice-160223110554.pptx
PPT
DDOS Attack
PPT
Aleksei zaitchenkov slides about DOS Attacks
PPTX
Denial of service attack
PPT
D dos attack
PPTX
Security risks
PPTX
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
PDF
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
PDF
denialofservice.pdfdos attacck basic details with interactive design
PPTX
Dos attack
PPTX
DDOS ATTACK Presentation .PPT file.pptx
PPTX
PPTX
Cyber security & ethical hacking 10
DOCX
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
PDF
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
PPTX
Denial of service attack
PDF
CYBER SECURITY PRESENTATION BY G VAISHNAVI.pdf
PDF
cloud computing final year project
types and DOS attack & basics of denial of service.pdf
Basics of Denial of Service Attacks
basicsofdenialofservice-160223110554.pptx
DDOS Attack
Aleksei zaitchenkov slides about DOS Attacks
Denial of service attack
D dos attack
Security risks
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
denialofservice.pdfdos attacck basic details with interactive design
Dos attack
DDOS ATTACK Presentation .PPT file.pptx
Cyber security & ethical hacking 10
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
Denial of service attack
CYBER SECURITY PRESENTATION BY G VAISHNAVI.pdf
cloud computing final year project
Ad

Recently uploaded (20)

PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Complications of Minimal Access-Surgery.pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
My India Quiz Book_20210205121199924.pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
History, Philosophy and sociology of education (1).pptx
Introduction to pro and eukaryotes and differences.pptx
Computer Architecture Input Output Memory.pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Complications of Minimal Access-Surgery.pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Share_Module_2_Power_conflict_and_negotiation.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Virtual and Augmented Reality in Current Scenario
My India Quiz Book_20210205121199924.pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx

Adarsh-PPT-FCF-12-thm.ppt

  • 3. OUTLINE • “DoS Attacks” – What Is • History • Types of Attacks • Main targets today • How to Defend • Conclusion
  • 4. WHAT IS “DOS ATTACK” Denial-Of-Service Attack = DOS Attack is a malicious attempt by a single person or a group of people to cause the victim, site or node to deny service to it customers. • DoS = when a single host attacks • DDoS = when multiple hosts attack simultaneously
  • 5. DENIAL OF SERVICE ATTACKS DENIAL-OF-SERVICE (DOS) ATTACK IS AN ATTEMPT BY ATTACKER TO PREVENT LEGITIMATE USERS FROM USING RESOURCES DENIAL-OF-SERVICE DENIES A VICTIM (HOST, ROUTER, OR ENTIRE NETWORK) FROM PROVIDING OR RECEIVING NORMAL SERVICES
  • 6. ATTACK SIZE IN GBITS-PER- SECOND
  • 7. IDEA OF “DOS ATTACKS” • Purpose is to shut down a site, not penetrate it. • Purpose may be vandalism, extortion or social action (including terrorism) (Sports betting sites often extorted) • Modification of internal data, change of programs (Includes defacement of web sites)
  • 8. HISTORY Morris Worm (November 2, 1988) • First DDoS attack to cripple large amounts of network infrastructure • Self-replicating, self-propagating. • Exploited software commonality (monoculture) 1. Fingerd buffer overflow exploit 2. Sendmail root vulnerability 3. Weak passwords
  • 9. HISTORY Morris Worm effect • Infected systems became “catatonic” • Took roughly three days to come under control • Ultimately infected 10% of Internet computers (6,000) and cost $ million to clean up. • Morris convicted under computer fraud and abuse act, three years probation, fine of $10,000
  • 10. HISTORY SQL Slammer (January, 25 2003) • Exploited common software (Microsoft SQL Server) as well as hardware (Intel x86), spread rapidly in a distinct monoculture. • Non-destructive. Modified no data on infected system • Extremely simple in construction (376 bytes) • Devastating: 1. 120,000 computers infected at peak (1/26/2003) 2. Exhausted network bandwidth 3. Crashed network infrastructure (multicast state creation) 4. Shut down communication (fire-fighting) capability
  • 11. HISTORY SQL Slammer effect • Extremely Virulent • Caused economic damage outside of IT infrastructure (multiple ATM outages) • Original perpetrators have never been identified or brought to justice
  • 12. TYPES OF DOS ATTACKS
  • 14. TYPES OF DOS ATTACKS • Penetration • Eavesdropping • Man-In-The-Middle • Flooding
  • 15. TYPES OF DOS ATTACKS Penetration • Attacker gets inside your machine • Can take over machine and do whatever he wants • Achieves entry via software flaw(s), stolen passwords or insider access
  • 16. TYPES OF DOS ATTACKS Eavesdropping • Attacker gains access to same network • Listens to traffic going in and out of your machine
  • 17. TYPES OF DOS ATTACKS Man-in-the-Middle • Attacker listens to output and controls output • Can substitute messages in both directions
  • 18. TYPES OF DOS ATTACKS Flooding • Attacker sends an overwhelming number of messages at your machine; great congestion • The congestion may occur in the path before your machine • Messages from legitimate users are crowded out • Usually called a Denial of Service (DoS) attack, because that’s the effect. • Usually involves a large number of machines, hence Distributed Denial of Service (DDoS) attack
  • 20. HOW TO DEFEND • Firewalls - can effectively prevent users from launching simple flooding type attacks from machines behind the firewall. • Switches - Some switches provide automatic and/or system- wide rate limiting, traffic shaping, delayed binding to detect and remediate denial of service attacks • Routers - If you add rules to take flow statistics out of the router during the DoS attacks, they further slow down and complicate the matter • DDS based defense • Clean pipes
  • 21. CONCLUSION • Role of international boundaries - consoles located across international borders, law-enforcement problem • In the past, as the present, DDoS has been more a nuisance activity conducted by cyber vandals than an activity with specific socioeconomic aims • In the future, DDoS may be used as a disruptive force, with broad destabilization as its aim instead of the targeting of specific targets • Destabilization has a high (ROI) Return On Investment when compared to targeted attacks
  • 22. QUESTIONS? People are talking about the Internet as though it is going to change the world. It's not going to change the world. It's not going to change the way we think, and it's not going to change the way we feel. Adarsh Shukla