SlideShare a Scribd company logo
8
Most read
10
Most read
11
Most read
DoS or DDoS Attack
A red eye to Web Services
Presented by...
Tamal Biswas
Kousik Layek
Tridib Biswas
Module Index
• What is DoS?
• What is DDoS?
• Recent attack on web.
• Methods of attack.
• Performing DoS attacks.
• How do we know an attack is happening?
• What to do if we are experiencing an attack?
• How do we avoid being part of the problem?
• Conclusion.
Denial of Services(DoS)
Its an attack to
make a machine or
network resource
unavailable to its
intended users.
Denial of Services(DoS)
Back
Its an attack to
make a machine or
network resource
unavailable to its
intended users.
Distributed Denial-of-Service attack
Its an attack to make a
machine or network
resource unavailable to its
intended users
by using others computer.
Network
Back
A big-bang of DDoS attack
The internet
around the
whole world was
slowed down on
27th march.
Because that
day DDoS attack
took place with
near about 300
Gbps.
Back
Method of attack
• ICMP flood
• Teardrop attacks
• Permanent denial-of-service attacks
• Reflected / Spoofed attack
• Low-rate Denial-of-Service attacks
• Peer-to-peer attacks
Some best DoS attack method
• ICMP flood:
– Sends packets to all computer hosts rather than a
specific machine.
• Teardrop attacks:
– Fragmented over-sized pay-loads to be send to
the target machine.
• Permanent denial-of-service attacks:
– It may cause replacement of hardware also.
Back
Performing DoS or DDoS Attack
• A wide range of programs are used to launch
DoS-attacks. Some of those are...
Jolt
Bubonic
Targa
Blast
Panther
Crazy Pinger
Some best DoS Attack tools
• Jolt:
– Finds exploit vulnerability in windows networking code.
– Consumes 100% CPU time by sending heavy CPU
consuming packets.
• LaTierra:
– It sends TCP packets to more than one port number.
• Nemsey:
– generates random packets with random port number and
floods victim with it.
Back
How do we know an attack is happening?
• unusually slow network performance (opening
files or accessing websites)
• unavailability of a particular website
• inability to access any website
• dramatic increase in the amount of spam you
receive in your account
A common message after DoS
Back
What to do if we are experiencing an
attack?
• contact your network administrators.
• In case of home computer, consider contacting
your internet service provider (ISP).
• Immediatly get disconnected from internet.
Back
How do we avoid being part of the
problem?
• Install and maintain anti-virus.
• Install a firewall.
• Configure the firewall to restrict incomming
and outgoing traffic.
• Follow good security practices for distributing
your email address.
• Applying email filters may help you manage
unwanted traffic.
Back
Conclusion
• Susceptibility to attacks could be alleviated
with better Internet.
• Don’t leave all the decision making to the
machines.
• Provide ‘intelligent’ support along the path.
• Create “Hardened” networks.
Refferences
• http://en.wikipedia.org/wiki/Denial-of-
service_attack
Thank you...

More Related Content

PPTX
Basics of Denial of Service Attacks
PPT
DDoS Attack PPT by Nitin Bisht
PPTX
DDoS - Distributed Denial of Service
PPTX
Charging in electric vehicles(ev)
PPTX
Denial of Service Attacks (DoS/DDoS)
PPTX
Denial of service
PPS
Neural Networks
PPT
Fundamentals of Database system
Basics of Denial of Service Attacks
DDoS Attack PPT by Nitin Bisht
DDoS - Distributed Denial of Service
Charging in electric vehicles(ev)
Denial of Service Attacks (DoS/DDoS)
Denial of service
Neural Networks
Fundamentals of Database system

What's hot (20)

PPTX
Malware analysis
PPTX
Denial of service attack
PPTX
Denial of service attack
PPTX
Ransomware Attack.pptx
PPT
DDOS Attack
PPTX
Intrusion prevention system(ips)
PPTX
Introduction to Malware Analysis
PPTX
PPT
DDoS Attacks
PPTX
Denial of Service Attack
PPTX
Dos n d dos
PPTX
An introduction to denial of service attacks
PPT
Intrusion detection system ppt
PDF
Malware and security
PPTX
Network security (vulnerabilities, threats, and attacks)
PDF
Ransomware attacks
PPTX
DNS spoofing/poisoning Attack
PDF
Malicious software
PPTX
Destributed denial of service attack ppt
PDF
OWASP Top 10 Web Application Vulnerabilities
Malware analysis
Denial of service attack
Denial of service attack
Ransomware Attack.pptx
DDOS Attack
Intrusion prevention system(ips)
Introduction to Malware Analysis
DDoS Attacks
Denial of Service Attack
Dos n d dos
An introduction to denial of service attacks
Intrusion detection system ppt
Malware and security
Network security (vulnerabilities, threats, and attacks)
Ransomware attacks
DNS spoofing/poisoning Attack
Malicious software
Destributed denial of service attack ppt
OWASP Top 10 Web Application Vulnerabilities
Ad

Similar to DoS or DDoS attack (20)

PPTX
Dos attack
PPTX
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
PDF
denialofservice.pdfdos attacck basic details with interactive design
PDF
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
PPTX
DoS Attack - Incident Handling
PPTX
Session for InfoSecGirls - New age threat management vol 1
PDF
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
PPTX
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
PPTX
Denial of service
PPTX
DrupalCon Vienna 2017 - Anatomy of DDoS
PPTX
3-types of attacks_Types of attacks.pptx
PPTX
DoS/DDoS
PPT
Aleksei zaitchenkov slides about DOS Attacks
PPTX
basicsofdenialofservice-160223110554.pptx
PPT
Dos threats and countermeasures
PDF
types and DOS attack & basics of denial of service.pdf
PPTX
Cyber Security Terms
PDF
Whitepaper on DDoS Mitigation
PPT
Protecting your business from ddos attacks
PDF
AtlSecCon 2016
Dos attack
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
denialofservice.pdfdos attacck basic details with interactive design
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
DoS Attack - Incident Handling
Session for InfoSecGirls - New age threat management vol 1
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
Denial of service
DrupalCon Vienna 2017 - Anatomy of DDoS
3-types of attacks_Types of attacks.pptx
DoS/DDoS
Aleksei zaitchenkov slides about DOS Attacks
basicsofdenialofservice-160223110554.pptx
Dos threats and countermeasures
types and DOS attack & basics of denial of service.pdf
Cyber Security Terms
Whitepaper on DDoS Mitigation
Protecting your business from ddos attacks
AtlSecCon 2016
Ad

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Cloud computing and distributed systems.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Spectroscopy.pptx food analysis technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MIND Revenue Release Quarter 2 2025 Press Release
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Big Data Technologies - Introduction.pptx
Review of recent advances in non-invasive hemoglobin estimation
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Spectroscopy.pptx food analysis technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology

DoS or DDoS attack

  • 1. DoS or DDoS Attack A red eye to Web Services Presented by... Tamal Biswas Kousik Layek Tridib Biswas
  • 2. Module Index • What is DoS? • What is DDoS? • Recent attack on web. • Methods of attack. • Performing DoS attacks. • How do we know an attack is happening? • What to do if we are experiencing an attack? • How do we avoid being part of the problem? • Conclusion.
  • 3. Denial of Services(DoS) Its an attack to make a machine or network resource unavailable to its intended users.
  • 4. Denial of Services(DoS) Back Its an attack to make a machine or network resource unavailable to its intended users.
  • 5. Distributed Denial-of-Service attack Its an attack to make a machine or network resource unavailable to its intended users by using others computer. Network Back
  • 6. A big-bang of DDoS attack The internet around the whole world was slowed down on 27th march. Because that day DDoS attack took place with near about 300 Gbps. Back
  • 7. Method of attack • ICMP flood • Teardrop attacks • Permanent denial-of-service attacks • Reflected / Spoofed attack • Low-rate Denial-of-Service attacks • Peer-to-peer attacks
  • 8. Some best DoS attack method • ICMP flood: – Sends packets to all computer hosts rather than a specific machine. • Teardrop attacks: – Fragmented over-sized pay-loads to be send to the target machine. • Permanent denial-of-service attacks: – It may cause replacement of hardware also. Back
  • 9. Performing DoS or DDoS Attack • A wide range of programs are used to launch DoS-attacks. Some of those are... Jolt Bubonic Targa Blast Panther Crazy Pinger
  • 10. Some best DoS Attack tools • Jolt: – Finds exploit vulnerability in windows networking code. – Consumes 100% CPU time by sending heavy CPU consuming packets. • LaTierra: – It sends TCP packets to more than one port number. • Nemsey: – generates random packets with random port number and floods victim with it. Back
  • 11. How do we know an attack is happening? • unusually slow network performance (opening files or accessing websites) • unavailability of a particular website • inability to access any website • dramatic increase in the amount of spam you receive in your account
  • 12. A common message after DoS Back
  • 13. What to do if we are experiencing an attack? • contact your network administrators. • In case of home computer, consider contacting your internet service provider (ISP). • Immediatly get disconnected from internet. Back
  • 14. How do we avoid being part of the problem? • Install and maintain anti-virus. • Install a firewall. • Configure the firewall to restrict incomming and outgoing traffic. • Follow good security practices for distributing your email address. • Applying email filters may help you manage unwanted traffic. Back
  • 15. Conclusion • Susceptibility to attacks could be alleviated with better Internet. • Don’t leave all the decision making to the machines. • Provide ‘intelligent’ support along the path. • Create “Hardened” networks.