SlideShare une entreprise Scribd logo
1  sur  22
DoS & DDoS
Attacks
OUTLINE
• “DoS Attacks” – What Is
• History
• Types
• Main targets
• How to Defend
3
• A DoS attack: preventing legal users, authorized access to a
system resource . The attacker uses specialized software to send
a flood of data packets to the target Device .
• DDoS ( distributed DoS attacks)
the attacker gains illegal administrative access to as many computers on the
Internet as possible and uses the multiple computers to send a flood of data
packets to the target Device
DoS = when a single host attacks
DDoS = when multiple hosts attack simultaneously
WHAT IS “DOS ATTACK”
Effect
• Too expensive
• Hard to prove who used the computer
Aim OF “DOS ATTACKS”

Purpose is to shut down a site, not penetrate it. may be
vandalism(including terrorism)
• Modification of internal data, change of programs

overloading the victim's resources
HISTORY
Morris Worm (November 2, 1988)
• First DDoS attack to cripple large amounts of network
infrastructure
• Self-replicating, self-propagating.
• Exploited software commonality (monoculture)
HISTORY
Morris Worm effect
• Infected systems became “catatonic “
• Took roughly three days to come under control
• Ultimately infected 10% of Internet computers (6,000) and
cost $ millions to clean up.
• Morris convicted under computer fraud and abuse act, three
years probation, fine of $10,000, he is now prof. At MIT
ESTONIAN CYBERWAR, 2007
• Weeks of cyber attacks followed, targeting government and banks,
ministries, newspapers and broadcasters Web sites of Estonia.
•
• 128 unique DDoS attacks
• Used hundreds or thousands of "zombie" computers and pelted Estonian
Web sites with thousands of requests a second
ESTONIAN CYBERWAR, 2007
• The attack heavily affected infrastructures of
all network:
– Routers damaged.
– Routing tables changed.
– DNS servers overloaded.
– Email servers mainframes failure, and etc.
In Feb 2000, series of massive DoS attacks incapacitated several high-
visibility Internet e-commerce sites, including Yahoo, Ebay and E*trade
In Jan 2001, Microsoft’s name sever infrastructure was disabled
>>98% of users could not get to any Microsoft’s servers
In Oct 2002, all Domain Name System servers were attacked
Attack lasted only an hour
9 of the 13 servers were seriously affected
In Aug 2009, the attack on Twitter and Facebook
HISTORY
Why should we care?
Internet is now a critical resource whose disruption has financial
implications, or even dire consequences on human safety
 Cybercrime and cyberwarfare might use of DoS or DDoS as a potential
weapon to disrupt or degrade critical infrastructure
 DDoS attacks are a major threat to the stability of the Internet
Pa
ge
The DoS Attack Surface
 Any part of your network or
services that is vulnerable to
an attack
– Network Interfaces
– Infrastructure
– Firewall/IPS
– Servers
– Protocols
– Applications
– Databases
 Attackers will find the
weakness
Distributed Denial-of-service
Attacker uses multiple PCs for DoS by:
Utilizing vulnerabilities to gain access to these systems
Installing malicious backdoor programs , thereby making zombies
Creating botnets: large collection of zombies under the control of
attacker
Generally, a control hierarchy is used to create botnets
Handlers: The initial layer of zombies that are directly controlled by the
attacker
Agent systems: Subordinate zombies that are controlled by handlers
Attacker sends a single command to handler, which then automatically
forwards it to all agents under its control
Example: Tribe Flood Network (TFN), TFN2K
15
How They Work ?
Victim
Daemon
Daemon
Daemon
Daemon
Daemon
Master
Real Attacker
16
How They Talk ?
Trinoo tool: attacker uses TCP; masters and daemons
use UDP; password authentication.
TFN ”Tribe Flood Network" tool: attacker uses shell to
invoke master; masters and daemons use ICMP
ECHOREPLY.
Stacheldraht tool: attacker uses encrypted TCP
connection to master; masters and daemons use TCP
and ICMP ECHO REPLY; rcp used for auto-update.
Approaches to DOS ATTACKS
Flooding attack
Work by sending a vast number of messages whose processing consumes
some key resource at the target
The strength lies in the volume, rather than the content
Implications :
 Make the traffic look legitimate
 Flow of traffic is large enough to consume victim’s resources
 Send with high packet rate
Pa
ge
Flooding DDoS
Internet designed for minimal-processing and best-effort forwarding
any packet
 Make shrewd use of flaws in the Internet design and systems
Vulnerability attack
 Vulnerability : a bug in implementation or a bug in a default configuration
of a service
 Malicious messages (exploits) : unexpected input that utilize the
vulnerability are sent
 Consequences :
 The system slows down or crashes or freezes or reboots
 Target application goes into infinite loop
 Consumes a vast amount of memory
 Ex : Ping of death, teardrop attacks, etc.
Approaches to DOS ATTACKS
HOW TO DEFEND
• Firewalls - can effectively prevent users from launching simple
flooding type attacks from machines behind the firewall.
• Switches - Some switches provide automatic and/or system-
wide rate limiting, traffic shaping, delayed binding to detect
and remediate denial of service attacks
• Routers - If you add rules to take flow statistics out of the
router during the DoS attacks, they further slow down and
complicate the matter
• DDS based defense
• Clean pipes
Distributed Denial of Service Attacks could be Detected
by Monitoring the Source IP.
Airmon-ng start wlan0
Airodump-ng wlan0mon >> get mac Add. And target
channel
Iwconfig wlan0mon channel # >> edit your channel to
the target channel
Aireplay -0 500 -a MAC ADD. wlan0mon
-0> send deauthentication messages
500 > # of packets to send
-a > option [mac address the the interface ]
HOW TO DO THAT
Thanks for your attention!

Contenu connexe

Tendances

An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
Rollingsherman
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Kaustubh Padwad
 

Tendances (20)

Denial of service
Denial of serviceDenial of service
Denial of service
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Ddos attacks
Ddos attacksDdos attacks
Ddos attacks
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Sql injection
Sql injectionSql injection
Sql injection
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 
Xss attack
Xss attackXss attack
Xss attack
 
DNS spoofing/poisoning Attack
DNS spoofing/poisoning AttackDNS spoofing/poisoning Attack
DNS spoofing/poisoning Attack
 
Secure Session Management
Secure Session ManagementSecure Session Management
Secure Session Management
 

Similaire à DDOS Attack

Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
 Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/... Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/...
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
Suhail Khan
 

Similaire à DDOS Attack (20)

Aleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS Attacks
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive design
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39
 
A041201010
A041201010A041201010
A041201010
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Adarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.pptAdarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.ppt
 
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
 Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/... Distributed denial-of-service (DDoS) attack ||  Seminar Report @ gestyy.com/...
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Dos attack
Dos attackDos attack
Dos attack
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Plus de Ahmed Salama (9)

Seven Ways To Be a Healthy Programmer!.pdf
Seven Ways To Be a Healthy Programmer!.pdfSeven Ways To Be a Healthy Programmer!.pdf
Seven Ways To Be a Healthy Programmer!.pdf
 
10 Code Anti-Patterns to Avoid in Software Development.pdf
10 Code Anti-Patterns to Avoid in Software Development.pdf10 Code Anti-Patterns to Avoid in Software Development.pdf
10 Code Anti-Patterns to Avoid in Software Development.pdf
 
Introduction to web development
Introduction to web developmentIntroduction to web development
Introduction to web development
 
Introduction to Django
Introduction to DjangoIntroduction to Django
Introduction to Django
 
Introduction to python
Introduction to pythonIntroduction to python
Introduction to python
 
Quick Start to marketing.
Quick Start to marketing.Quick Start to marketing.
Quick Start to marketing.
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Konard zuse
Konard zuseKonard zuse
Konard zuse
 
Introduction to Computer Science Department
Introduction to Computer Science DepartmentIntroduction to Computer Science Department
Introduction to Computer Science Department
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

DDOS Attack

  • 2. OUTLINE • “DoS Attacks” – What Is • History • Types • Main targets • How to Defend
  • 3. 3 • A DoS attack: preventing legal users, authorized access to a system resource . The attacker uses specialized software to send a flood of data packets to the target Device . • DDoS ( distributed DoS attacks) the attacker gains illegal administrative access to as many computers on the Internet as possible and uses the multiple computers to send a flood of data packets to the target Device DoS = when a single host attacks DDoS = when multiple hosts attack simultaneously WHAT IS “DOS ATTACK”
  • 4.
  • 5. Effect • Too expensive • Hard to prove who used the computer
  • 6. Aim OF “DOS ATTACKS”  Purpose is to shut down a site, not penetrate it. may be vandalism(including terrorism) • Modification of internal data, change of programs  overloading the victim's resources
  • 7. HISTORY Morris Worm (November 2, 1988) • First DDoS attack to cripple large amounts of network infrastructure • Self-replicating, self-propagating. • Exploited software commonality (monoculture)
  • 8. HISTORY Morris Worm effect • Infected systems became “catatonic “ • Took roughly three days to come under control • Ultimately infected 10% of Internet computers (6,000) and cost $ millions to clean up. • Morris convicted under computer fraud and abuse act, three years probation, fine of $10,000, he is now prof. At MIT
  • 9. ESTONIAN CYBERWAR, 2007 • Weeks of cyber attacks followed, targeting government and banks, ministries, newspapers and broadcasters Web sites of Estonia. • • 128 unique DDoS attacks • Used hundreds or thousands of "zombie" computers and pelted Estonian Web sites with thousands of requests a second
  • 10. ESTONIAN CYBERWAR, 2007 • The attack heavily affected infrastructures of all network: – Routers damaged. – Routing tables changed. – DNS servers overloaded. – Email servers mainframes failure, and etc.
  • 11. In Feb 2000, series of massive DoS attacks incapacitated several high- visibility Internet e-commerce sites, including Yahoo, Ebay and E*trade In Jan 2001, Microsoft’s name sever infrastructure was disabled >>98% of users could not get to any Microsoft’s servers In Oct 2002, all Domain Name System servers were attacked Attack lasted only an hour 9 of the 13 servers were seriously affected In Aug 2009, the attack on Twitter and Facebook HISTORY
  • 12. Why should we care? Internet is now a critical resource whose disruption has financial implications, or even dire consequences on human safety  Cybercrime and cyberwarfare might use of DoS or DDoS as a potential weapon to disrupt or degrade critical infrastructure  DDoS attacks are a major threat to the stability of the Internet
  • 13. Pa ge The DoS Attack Surface  Any part of your network or services that is vulnerable to an attack – Network Interfaces – Infrastructure – Firewall/IPS – Servers – Protocols – Applications – Databases  Attackers will find the weakness
  • 14. Distributed Denial-of-service Attacker uses multiple PCs for DoS by: Utilizing vulnerabilities to gain access to these systems Installing malicious backdoor programs , thereby making zombies Creating botnets: large collection of zombies under the control of attacker Generally, a control hierarchy is used to create botnets Handlers: The initial layer of zombies that are directly controlled by the attacker Agent systems: Subordinate zombies that are controlled by handlers Attacker sends a single command to handler, which then automatically forwards it to all agents under its control Example: Tribe Flood Network (TFN), TFN2K
  • 15. 15 How They Work ? Victim Daemon Daemon Daemon Daemon Daemon Master Real Attacker
  • 16. 16 How They Talk ? Trinoo tool: attacker uses TCP; masters and daemons use UDP; password authentication. TFN ”Tribe Flood Network" tool: attacker uses shell to invoke master; masters and daemons use ICMP ECHOREPLY. Stacheldraht tool: attacker uses encrypted TCP connection to master; masters and daemons use TCP and ICMP ECHO REPLY; rcp used for auto-update.
  • 17. Approaches to DOS ATTACKS Flooding attack Work by sending a vast number of messages whose processing consumes some key resource at the target The strength lies in the volume, rather than the content Implications :  Make the traffic look legitimate  Flow of traffic is large enough to consume victim’s resources  Send with high packet rate
  • 19. Internet designed for minimal-processing and best-effort forwarding any packet  Make shrewd use of flaws in the Internet design and systems Vulnerability attack  Vulnerability : a bug in implementation or a bug in a default configuration of a service  Malicious messages (exploits) : unexpected input that utilize the vulnerability are sent  Consequences :  The system slows down or crashes or freezes or reboots  Target application goes into infinite loop  Consumes a vast amount of memory  Ex : Ping of death, teardrop attacks, etc. Approaches to DOS ATTACKS
  • 20. HOW TO DEFEND • Firewalls - can effectively prevent users from launching simple flooding type attacks from machines behind the firewall. • Switches - Some switches provide automatic and/or system- wide rate limiting, traffic shaping, delayed binding to detect and remediate denial of service attacks • Routers - If you add rules to take flow statistics out of the router during the DoS attacks, they further slow down and complicate the matter • DDS based defense • Clean pipes Distributed Denial of Service Attacks could be Detected by Monitoring the Source IP.
  • 21. Airmon-ng start wlan0 Airodump-ng wlan0mon >> get mac Add. And target channel Iwconfig wlan0mon channel # >> edit your channel to the target channel Aireplay -0 500 -a MAC ADD. wlan0mon -0> send deauthentication messages 500 > # of packets to send -a > option [mac address the the interface ] HOW TO DO THAT
  • 22. Thanks for your attention!