DDOs Attacks (Distributed Denial of Service
Attacks
DoS Basics
What is Internet?
What resources you access through Internet?
Who uses those resources?
Good vs Bad Users
Denial-of-Service attack
-DoS attack is a malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers.
-What is (DoS)Attack
An attack that attempts to stop or prevent a legitimate user from accessing a service or system. The attacker will either directly attack the users network or system or the system or service that the users are attempting to access.
-Distributed denial of service attack (DDoS)
This type of attack is distributed among many different systems making it more powerful and harder to shutdown
2. DoS Basics
What is Internet?
What resources you access through Internet?
Who uses those resources?
Good vs Bad Users
Denial-of-Service attack
-DoS attack is a malicious attempt by a single person or a group of people to cause the victim,
site, or node to deny service to its customers.
3. What is (DoS)Attack
- An attack that attempts to stop or prevent a legitimate user from accessing a
service or system. The attacker will either directly attack the users network or
system or the system or service that the users are attempting to access.
-Distributed denial of service attack (DDoS)
This type of attack is distributed among many different systems making it more
powerful and harder to shutdown
4. DDos Feature
•Protection from different attacks
•Volumetric Attacks: attempt to consume the forwarding capacity either within the target network/service,
or between the target network/service and the rest of the Internet
•State-Exhaustion Attacks; this attempts to consume the connection state tables which are present in
many infrastructure components such as load-balancers, firewalls and the application servers
themselves
•Application Layer Attacks: targets some aspect of application or service at Layer-7. These are the most
deadly kind of attacks as they are very difficult to pro-actively detect and mitigate
5. DDOs benefit
Extends protection from risks by addressing attacks before they reach your
routers and/or firewall
Mitigates your exposure to compliance and liability issues
Provides 24/7 monitoring so you can use in-house IS/IT resources more
effectively
Ensures you remain compliant to regulations, such as Payment Card Industry
(PCI) standards, by protecting the integrity of your network