SlideShare une entreprise Scribd logo
1  sur  23
SPAMMING, SPOOFING, DOS&
DDOS ATTACK
MUZAMMAL HUSSAIN MCF1601076
M SHARIAT ULLAH MCF1601070
SYED ALI MUJTABA MCF1600975
M SHAHBAZ SAHID MCF1601034
SPAMMING
•What is spam?
• Spam is flooding the Internet with many copies of the same message, in an
attempt to force the message on people who would not otherwise choose to
receive it.
• Most spam is commercial advertising, often for dubious products, get-rich-
quick schemes, or quasi-legal services.
• Spam costs the sender very little to send -- most of the costs are paid for by
the recipient or the carriers rather than by the sender.
• There are two main types of spam, and they have different effects on Internet
users.
• Cancellable Usenet spam:
• is a single message sent to 20 or more Usenet
newsgroups. Through long experience, Usenet
users have found that any message posted to so
many newsgroups is often not relevant to most
or all of them. Usenet spam is aimed at
"lurkers", people who read newsgroups but
rarely or never post and give their address
away. Usenet spam robs users of the utility of
the newsgroups by overwhelming them with a
barrage of advertising or other irrelevant posts
•Email spam:
targets individual users with direct mail messages. Email
spam lists are often created by scanning Usenet postings,
stealing Internet mailing lists, or searching the Web for
addresses. Email spams typically cost users money out-
of-pocket to receive. Many people - anyone with
measured phone service - read or receive their mail
while the meter is running, so to speak. Spam costs them
additional money.
is sending spam to mailing lists (public or private email
discussion forums.) Because many mailing lists limit
activity to their subscribers, spammers will use
automated tools to subscribe to as many mailing lists as
possible, so that they can grab the lists of addresses, or
use the mailing list as a direct target for their attacks.
SPOOFING
•In the context of network security, a spoofing attack is a
situation in which a person or program successfully
masquerades as another by falsifying data, to gain an
illegitimate advantage.
TYPES OF SPOOFING
• IP Spoof
• Web Spoof
• E-mail Spoof
• Non Technical Spoof
IP SPOOFING
• The creation of IP packets with a forged source.
•The purpose of it is to conceal the identity of the sender
or impersonating another computing system.
USES OF IP SPOOFING
• Denial-of-service attack.
• To defeat networks security.
DEFENSE AGAINST IP SPOOFING
• Packet filtering- one defense against IP spoofing .
• Ingress filtering
• Egress filtering
DEFENSE AGAINST IP SPOOFING
•Upper Layers:
• Some upper layer protocols provide their own defense
against IP spoofing.
WEB SPOOFING
• It’s a security attack that allows an adversary to observe and
modify all web pages sent to the victim’s machine and
observe all information entered into forms by the victim.
• The attack is initiated when a victim visits a malicious web page,
or receives a malicious email message. The attack is implemented
using JavaScript and Web serves plug-ins.
DANGERS OF WEB SPOOFING
•After your browser has been fooled, the spoofed web
server can send you fake web pages or prompt you to
provide personal information such as login Id, password,
or even credit card or bank account numbers.
HOW TO PREVENT IT
• Don’t click links in emails instead always copy and
paste, or even better manually type the URL in.
• When entering personal or sensitive information,
verify the URL is as you expect, and the site’s SSL
certificate matches that URL.
• Understand why you’re providing the information
does it make sense? Does the site need to know your
SSN?
EMAIL SPOOF
• E-mail spoofing is the forgery of an e-mail header so that
the message appears to have originated from someone or
somewhere other than the actual source.
EMAIL SPOOF PROTECTION
• Double check the email you are replying to, make sure
that the letters are what they truly seem. For example,
l(lower case L) is not the same as I(upper case).
• Look at the IP information of the email header. If an
email originated from inside your network, the sender
should have very similar IP address.
NON-TECHNICAL SPOOFING
•These non-computer based techniques are commonly
referred to as social engineering. With social engineering,
an attacker tries to convince someone that he is someone
else.
•This can be as simple as the attacker calling someone on
the phone saying that he is a certain person.
NON-TECHNICAL SPOOF
PROTECTION
• Educate your users
The help desk
Receptionist
Administrators
. Have proper policies:
Password policy
Security policy
DoS Attacks:
an attacker can attack a network from a
distance and therefore, it is sometimes difficult to collect
evidences against the attacker.
Types:
Physical Attack
Network DoS Attack
Physical Attack:
This type of attack is very basic and it
is in the base of radio interferences which can be created
even from cordless phones that operate in 2.4 GHz range.
Network DoS Attack:
As the Wireless Access Point creates a
shared medium, it offers the possibility to flood the traffic of this
medium toward the AP which
will make its processing more slow toward the clients that
attempt to connect
Prevention:
• Change the SSID and the network password regularly.
• Change the default password of access points
• Turn off guest networking
• Update the firmware of your wireless device.
Pyloris is a popular DoS tool that you can download from
− https://sourceforge.net/projects/pyloris/
DDOS Attacks:
A Distributed Denial of Service (DDoS)
attack is an attempt to make an online service or a website
unavailable by overloading it with huge floods of traffic
generated from multiple sources.
A large scale volumetric DDoS attack can generate a
traffic measured in tens of Gigabits (and even hundreds of
Gigabits) per second. We are sure your normal network will not
be able to handle such traffic.
Types of DDoS Attacks:
DDoS attacks can be broadly
categorized into three categories:
• Volume-based Attacks
• Protocol Attacks
Volume-Based Attacks:
Here, an attacker tries to saturate the
bandwidth of the target site. The attack magnitude is
measured in Bits per Second (bps).
Protocol Attacks:
This type of attack consumes actual server
resources and other resources like firewalls and load
balancers. The attack magnitude is measured in Packets
per Second.
Application Layer Attacks:
Here the goal is to crash the web server. The
attack magnitude is measured in Requests per Second.
HOW TO FIX A DDOS ATTACK:
• Your DDoS protection starts from identifying and closing all
the possible OS and application level vulnerabilities in your
system, closing all the possible ports, removing unnecessary
access from the system and hiding your server behind a proxy
or CDN system.
• If you see a low magnitude of the
DDoS, then you can find many firewall-based solutions which
can help you in filtering out DDoS based traffic. But if you have
high volume of DDoS attack like in gigabits or even more, then
you should take the help of a DDoS protection service provider
THANK YOU

Contenu connexe

Tendances

Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Gaurav Sharma
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackAhmed Ghazey
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
DDoS Attack and Mitigation
DDoS Attack and MitigationDDoS Attack and Mitigation
DDoS Attack and MitigationDevang Badrakiya
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacksRollingsherman
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddoskalyan kumar
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningeSAT Publishing House
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 

Tendances (20)

Network Security
Network  SecurityNetwork  Security
Network Security
 
DDos
DDosDDos
DDos
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
Spoofing
Spoofing Spoofing
Spoofing
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
 
DDoS Attack and Mitigation
DDoS Attack and MitigationDDoS Attack and Mitigation
DDoS Attack and Mitigation
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learning
 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 

Similaire à Spamming, spoofing, Dos&DDos attack

Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attacktaufiq463421
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptxRajeshArora97
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Securitypadmeshagrekar
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxmadlynplamondon
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017Shyam Pareek
 
Man in the Middle.pptx
Man in the Middle.pptxMan in the Middle.pptx
Man in the Middle.pptxAVNIKASODARIYA
 
Man in the Middle.pptx
Man in the Middle.pptxMan in the Middle.pptx
Man in the Middle.pptxanwarsnied2
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherPankaj Dubey
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designperfetbyedshareen
 
Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Typeshirakhalid2394
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 

Similaire à Spamming, spoofing, Dos&DDos attack (20)

Attacks Types
Attacks TypesAttacks Types
Attacks Types
 
cyber-warfare.pptx
cyber-warfare.pptxcyber-warfare.pptx
cyber-warfare.pptx
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
IP spoofing .pptx
IP spoofing .pptxIP spoofing .pptx
IP spoofing .pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
 
Man in the Middle.pptx
Man in the Middle.pptxMan in the Middle.pptx
Man in the Middle.pptx
 
Man in the Middle.pptx
Man in the Middle.pptxMan in the Middle.pptx
Man in the Middle.pptx
 
Man in the Middle.pptx
Man in the Middle.pptxMan in the Middle.pptx
Man in the Middle.pptx
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive design
 
Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Types
 
Spoofing
SpoofingSpoofing
Spoofing
 

Dernier

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Dernier (20)

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 

Spamming, spoofing, Dos&DDos attack

  • 1. SPAMMING, SPOOFING, DOS& DDOS ATTACK MUZAMMAL HUSSAIN MCF1601076 M SHARIAT ULLAH MCF1601070 SYED ALI MUJTABA MCF1600975 M SHAHBAZ SAHID MCF1601034
  • 2. SPAMMING •What is spam? • Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. • Most spam is commercial advertising, often for dubious products, get-rich- quick schemes, or quasi-legal services. • Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.
  • 3. • There are two main types of spam, and they have different effects on Internet users. • Cancellable Usenet spam: • is a single message sent to 20 or more Usenet newsgroups. Through long experience, Usenet users have found that any message posted to so many newsgroups is often not relevant to most or all of them. Usenet spam is aimed at "lurkers", people who read newsgroups but rarely or never post and give their address away. Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising or other irrelevant posts
  • 4. •Email spam: targets individual users with direct mail messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. Email spams typically cost users money out- of-pocket to receive. Many people - anyone with measured phone service - read or receive their mail while the meter is running, so to speak. Spam costs them additional money. is sending spam to mailing lists (public or private email discussion forums.) Because many mailing lists limit activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible, so that they can grab the lists of addresses, or use the mailing list as a direct target for their attacks.
  • 5. SPOOFING •In the context of network security, a spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.
  • 6. TYPES OF SPOOFING • IP Spoof • Web Spoof • E-mail Spoof • Non Technical Spoof
  • 7. IP SPOOFING • The creation of IP packets with a forged source. •The purpose of it is to conceal the identity of the sender or impersonating another computing system.
  • 8. USES OF IP SPOOFING • Denial-of-service attack. • To defeat networks security.
  • 9. DEFENSE AGAINST IP SPOOFING • Packet filtering- one defense against IP spoofing . • Ingress filtering • Egress filtering
  • 10. DEFENSE AGAINST IP SPOOFING •Upper Layers: • Some upper layer protocols provide their own defense against IP spoofing.
  • 11. WEB SPOOFING • It’s a security attack that allows an adversary to observe and modify all web pages sent to the victim’s machine and observe all information entered into forms by the victim. • The attack is initiated when a victim visits a malicious web page, or receives a malicious email message. The attack is implemented using JavaScript and Web serves plug-ins.
  • 12. DANGERS OF WEB SPOOFING •After your browser has been fooled, the spoofed web server can send you fake web pages or prompt you to provide personal information such as login Id, password, or even credit card or bank account numbers.
  • 13. HOW TO PREVENT IT • Don’t click links in emails instead always copy and paste, or even better manually type the URL in. • When entering personal or sensitive information, verify the URL is as you expect, and the site’s SSL certificate matches that URL. • Understand why you’re providing the information does it make sense? Does the site need to know your SSN?
  • 14. EMAIL SPOOF • E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.
  • 15. EMAIL SPOOF PROTECTION • Double check the email you are replying to, make sure that the letters are what they truly seem. For example, l(lower case L) is not the same as I(upper case). • Look at the IP information of the email header. If an email originated from inside your network, the sender should have very similar IP address.
  • 16. NON-TECHNICAL SPOOFING •These non-computer based techniques are commonly referred to as social engineering. With social engineering, an attacker tries to convince someone that he is someone else. •This can be as simple as the attacker calling someone on the phone saying that he is a certain person.
  • 17. NON-TECHNICAL SPOOF PROTECTION • Educate your users The help desk Receptionist Administrators . Have proper policies: Password policy Security policy
  • 18. DoS Attacks: an attacker can attack a network from a distance and therefore, it is sometimes difficult to collect evidences against the attacker. Types: Physical Attack Network DoS Attack Physical Attack: This type of attack is very basic and it is in the base of radio interferences which can be created even from cordless phones that operate in 2.4 GHz range.
  • 19. Network DoS Attack: As the Wireless Access Point creates a shared medium, it offers the possibility to flood the traffic of this medium toward the AP which will make its processing more slow toward the clients that attempt to connect Prevention: • Change the SSID and the network password regularly. • Change the default password of access points • Turn off guest networking • Update the firmware of your wireless device. Pyloris is a popular DoS tool that you can download from − https://sourceforge.net/projects/pyloris/
  • 20. DDOS Attacks: A Distributed Denial of Service (DDoS) attack is an attempt to make an online service or a website unavailable by overloading it with huge floods of traffic generated from multiple sources. A large scale volumetric DDoS attack can generate a traffic measured in tens of Gigabits (and even hundreds of Gigabits) per second. We are sure your normal network will not be able to handle such traffic. Types of DDoS Attacks: DDoS attacks can be broadly categorized into three categories: • Volume-based Attacks • Protocol Attacks
  • 21. Volume-Based Attacks: Here, an attacker tries to saturate the bandwidth of the target site. The attack magnitude is measured in Bits per Second (bps). Protocol Attacks: This type of attack consumes actual server resources and other resources like firewalls and load balancers. The attack magnitude is measured in Packets per Second. Application Layer Attacks: Here the goal is to crash the web server. The attack magnitude is measured in Requests per Second.
  • 22. HOW TO FIX A DDOS ATTACK: • Your DDoS protection starts from identifying and closing all the possible OS and application level vulnerabilities in your system, closing all the possible ports, removing unnecessary access from the system and hiding your server behind a proxy or CDN system. • If you see a low magnitude of the DDoS, then you can find many firewall-based solutions which can help you in filtering out DDoS based traffic. But if you have high volume of DDoS attack like in gigabits or even more, then you should take the help of a DDoS protection service provider