3
Most read
4
Most read
13
Most read
DOS ATTACK
PRESENTED BY,
SURAJ SHARMA
CONTENTS
 What is DoS?
 Recent attack on web.
 Method of attack.
 Performing DoS attacks.
 How do we know an attack is happening?
 What to do if we are experiencing an attack?
 How do we avoid being part of the problem?
 Conclusion
DENIAL OF SERVICE (DOS)
Its an attack to make a machine
or network resource unavailable
to its intended users .
METHOD OF ATTACK
 ICMP flood
 Teardrop attacks
 Permanent denial-of-service attacks
 Reflected / spoofed attack
 Low-rate Denial-of-service attacks
 Peer-to-peer attacks
SOME BEST DOS ATTACK METHOD
 ICMP flood:
 Sends packets to all computer hosts rather than a specific machine.
 Teardrop attacks:
 Fragmented over-size pay-loads to be send to the target machine.
 Permanent denial-of-service attacks:
 It may cause replacement of hardware also.
PERFORMING DOS ATTACK
• A wide range of programs are used to launch DoS attacks. Some of those
are…………..
 Jolt
 Bubonic
 Targa
 Blast
 Panther
 Crazy Pinger
SOME BEST DOS ATTACK TOOLS
o JOLT:
⁻ Find exploit vulnerability in windows networking code.
⁻ Consumes 100% CPU times by sending heavy CPU consuming package.
o LATIERRA:
⁻ It sends TCP packets to more than one port number.
o NEMSEY:
⁻ Generates random packets with random port number and flood victim with it.
HOW DO WE KNOW AN ATTACK IS HAPPENING?
• Unusually slow network performance (opening files or accessing websites)
• Unavailability of a particular website
• Inability to access any website
• Dramatic increase in the amount of spam you receive in your account
A COMMON MESSAGE AFTER DOS
WHAT TO DO IF WE ARE EXPERIENCING AN ATTACK?
 Contact your network administrators.
 In case of home computer, consider contacting your internet service provider (ISP).
 Immediately get disconnected from internet.
HOW DO WE AVOID BEING PART OF THE PROBLEM?
• Install and maintain anti-virus.
• Install a firewall.
• Configure the firewall to restrict incoming and outgoing traffic.
• Follow good security practices for distributing your email address.
• Applying email filters may help you to manage unwanted traffic.
CONCLUSION
 Susceptibility to attacks could be alleviated with better internet.
 Don’t leave all the decision making to the machines.
 Provide ‘intelligent’ support along the path.
 Create “Hardened” networks.
Dos attack

More Related Content

PPTX
Types of cyber attacks
PPTX
What is Ransomware
PPTX
PPTX
Denial of Service Attack
PDF
Cyber Security
PDF
1. introduction to cyber security
PPTX
PDF
Malware and security
Types of cyber attacks
What is Ransomware
Denial of Service Attack
Cyber Security
1. introduction to cyber security
Malware and security

What's hot (20)

PPTX
Intrusion detection system
PDF
End-User Security Awareness
PPTX
DDoS - Distributed Denial of Service
PDF
Data & Privacy: Striking the Right Balance - Jonny Leroy
PPTX
Cyberstalking
PPTX
Cybersecurity Awareness Training
PDF
Computer Security
PDF
Ethical hacking and social engineering
PPTX
Basics of Denial of Service Attacks
PPT
Port scanning
PPTX
cyber crime & cyber law
PPTX
Cyber crime
PPT
intrusion detection system (IDS)
PDF
Cyber Security Awareness
PPTX
Introduction to Information Security
PPTX
Cyber crime
PPTX
Social engineering-Attack of the Human Behavior
PPTX
Different types of attacks in internet
PPS
introduction to malwares,virus,trojan horse
PPT
Lecture 03 intellectual property
Intrusion detection system
End-User Security Awareness
DDoS - Distributed Denial of Service
Data & Privacy: Striking the Right Balance - Jonny Leroy
Cyberstalking
Cybersecurity Awareness Training
Computer Security
Ethical hacking and social engineering
Basics of Denial of Service Attacks
Port scanning
cyber crime & cyber law
Cyber crime
intrusion detection system (IDS)
Cyber Security Awareness
Introduction to Information Security
Cyber crime
Social engineering-Attack of the Human Behavior
Different types of attacks in internet
introduction to malwares,virus,trojan horse
Lecture 03 intellectual property
Ad

Similar to Dos attack (20)

PPTX
DoS or DDoS attack
PDF
denialofservice.pdfdos attacck basic details with interactive design
PPTX
Denial of service
PPTX
Denial of service attack
PPTX
Security risks
PPT
Adarsh-PPT-FCF-12-thm.ppt
PDF
cloud computing final year project
PPT
D dos attack
PDF
types and DOS attack & basics of denial of service.pdf
PDF
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
PPTX
DoS/DDoS
PPTX
basicsofdenialofservice-160223110554.pptx
PPTX
Cyber security & ethical hacking 10
DOCX
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
PPTX
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
PPT
DDOS Attack
PPTX
DDOS ATTACK Presentation .PPT file.pptx
PDF
Aw36294299
PDF
File000144
PPTX
Assingement on dos ddos
DoS or DDoS attack
denialofservice.pdfdos attacck basic details with interactive design
Denial of service
Denial of service attack
Security risks
Adarsh-PPT-FCF-12-thm.ppt
cloud computing final year project
D dos attack
types and DOS attack & basics of denial of service.pdf
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
DoS/DDoS
basicsofdenialofservice-160223110554.pptx
Cyber security & ethical hacking 10
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
DDOS Attack
DDOS ATTACK Presentation .PPT file.pptx
Aw36294299
File000144
Assingement on dos ddos
Ad

Recently uploaded (20)

PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PDF
Website Design Services for Small Businesses.pdf
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PDF
Microsoft Office 365 Crack Download Free
PPTX
Trending Python Topics for Data Visualization in 2025
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
DNT Brochure 2025 – ISV Solutions @ D365
PDF
Cost to Outsource Software Development in 2025
PPTX
"Secure File Sharing Solutions on AWS".pptx
PPTX
CNN LeNet5 Architecture: Neural Networks
PPTX
GSA Content Generator Crack (2025 Latest)
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Time Tracking Features That Teams and Organizations Actually Need
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PDF
Autodesk AutoCAD Crack Free Download 2025
How Tridens DevSecOps Ensures Compliance, Security, and Agility
Website Design Services for Small Businesses.pdf
Monitoring Stack: Grafana, Loki & Promtail
CCleaner 6.39.11548 Crack 2025 License Key
Microsoft Office 365 Crack Download Free
Trending Python Topics for Data Visualization in 2025
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
DNT Brochure 2025 – ISV Solutions @ D365
Cost to Outsource Software Development in 2025
"Secure File Sharing Solutions on AWS".pptx
CNN LeNet5 Architecture: Neural Networks
GSA Content Generator Crack (2025 Latest)
Computer Software and OS of computer science of grade 11.pptx
Time Tracking Features That Teams and Organizations Actually Need
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Weekly report ppt - harsh dattuprasad patel.pptx
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
Autodesk AutoCAD Crack Free Download 2025

Dos attack

  • 2. CONTENTS  What is DoS?  Recent attack on web.  Method of attack.  Performing DoS attacks.  How do we know an attack is happening?  What to do if we are experiencing an attack?  How do we avoid being part of the problem?  Conclusion
  • 3. DENIAL OF SERVICE (DOS) Its an attack to make a machine or network resource unavailable to its intended users .
  • 4. METHOD OF ATTACK  ICMP flood  Teardrop attacks  Permanent denial-of-service attacks  Reflected / spoofed attack  Low-rate Denial-of-service attacks  Peer-to-peer attacks
  • 5. SOME BEST DOS ATTACK METHOD  ICMP flood:  Sends packets to all computer hosts rather than a specific machine.  Teardrop attacks:  Fragmented over-size pay-loads to be send to the target machine.  Permanent denial-of-service attacks:  It may cause replacement of hardware also.
  • 6. PERFORMING DOS ATTACK • A wide range of programs are used to launch DoS attacks. Some of those are…………..  Jolt  Bubonic  Targa  Blast  Panther  Crazy Pinger
  • 7. SOME BEST DOS ATTACK TOOLS o JOLT: ⁻ Find exploit vulnerability in windows networking code. ⁻ Consumes 100% CPU times by sending heavy CPU consuming package. o LATIERRA: ⁻ It sends TCP packets to more than one port number. o NEMSEY: ⁻ Generates random packets with random port number and flood victim with it.
  • 8. HOW DO WE KNOW AN ATTACK IS HAPPENING? • Unusually slow network performance (opening files or accessing websites) • Unavailability of a particular website • Inability to access any website • Dramatic increase in the amount of spam you receive in your account
  • 9. A COMMON MESSAGE AFTER DOS
  • 10. WHAT TO DO IF WE ARE EXPERIENCING AN ATTACK?  Contact your network administrators.  In case of home computer, consider contacting your internet service provider (ISP).  Immediately get disconnected from internet.
  • 11. HOW DO WE AVOID BEING PART OF THE PROBLEM? • Install and maintain anti-virus. • Install a firewall. • Configure the firewall to restrict incoming and outgoing traffic. • Follow good security practices for distributing your email address. • Applying email filters may help you to manage unwanted traffic.
  • 12. CONCLUSION  Susceptibility to attacks could be alleviated with better internet.  Don’t leave all the decision making to the machines.  Provide ‘intelligent’ support along the path.  Create “Hardened” networks.