SlideShare a Scribd company logo
1 of 7
Download to read offline
denial of
	 service
attacks
over
	a
coffee
denial of service attacks over a coffee
Denial-of-service (DoS) attacks are among the least understood
of IT security threats. For some users, they’re a threat against
which firewalls are all but helpless. For others, they’re an
especially practical way to block access to a website. Still others
will say that they’re nothing new under the sun: DoS attacks are
as old as the Internet itself and have to be taken into account in
advance, as with any virus threat.
Actually, everyone is right. From a technical standpoint,
launching a DoS attack is easy. Protecting against these attacks
is a challenge. The key is not to react to a DoS attack, but to act
before such an attack even occurs. This booklet, or “blog book”,
collects a group of blog posts that pursue a common goal: to
increase our understanding of DoS attacks and learn how to
protect against them.
Jean-François Audenard
editorial
2
content
launching a denial of service attack for $200
a newly available testing service for DDoS attacks
the battle against DDoS attacks:
our experience (part 1)
the battle against DDoS attacks:
our experience (part 2)
3 denial of service attacks over a coffee
the article online
http://oran.ge/S3pJVF
4
launching a denial of service attack for $200
denial of service attacks over a coffee
launching a denial
of service attack
for $200
by Jean-François Audenard
I’ve written on this topic before. With a little motivation,
practically anyone can launch a distributed denial-of-service
(DDoS) attack to take out a website (or an entire website hosting
platform).
And it’s not very expensive. For $200 (according to a blog post
published by Damballa, a company specializing in detecting
and combating botnets) it’s possible to rent a network of
80,000-120,000 zombie machines for 24 hours. According to
the (believable) figures listed on the site, you can launch attacks
between 10 Gbps and 100 Gbps: enough to cause a lot of
problems.
If you’re skeptical about what these DDoS “vendors” are capable
of, no worries. Some will let you try out the service free for three
minutes to give you an all-powerful “I rule the Web” rush. Key the
evil mastermind music…
5
a newly available testing service for DDoS attacks
denial of service attacks over a coffee
a newly available
testing service for
DDoS attacks
by Jean-François Audenard
Among the plethora of threats an IT security professional must
guard against, distributed denial-of-service (DDoS) attacks
are a special case. They make it very hard to test the proper
functioning of response mechanisms.
During a DDoS attack, an attacker sends a synchronized flood
of packets to overload the target’s servers or network access.
It’s hard to produce a strong enough stream of attacks (which
is relatively doable for testing purposes), but it’s also especially
difficult to generate the necessary distributed traffic from several
thousand sources.
how to prevent these attacks
When setting up a prevention system for DDoS attacks, it can be
important to test the system “live,” to avoid any mishaps during a
real attack.
The Blitz Distributed Testing Service meets all of these needs.
Using this service, it is theoretically possible to purchase
“windows of opportunity” during which you can launch a DDoS
attack from 5,000 to 10,000 different sources (the United States
government probably uses a service of this type to test its
systems’ resistance against this type of threat).
denial of service attacks over a coffee6
Our blog :
http://www.orange-business.com/en/blogs/connecting-technology
download
the entire
document at
http://oran.ge/VIo7V3free
Orange,French“anonymoussociety”(S.A.)withanoperatingcapitalof10,595,541,532,78rueOlivierdeSerres–75015Paris–380129866RCSParis

More Related Content

Viewers also liked

Energy in Factory Automation and the Role of Industrial Networks
Energy in Factory Automation and the Role of Industrial Networks Energy in Factory Automation and the Role of Industrial Networks
Energy in Factory Automation and the Role of Industrial Networks ControlEng
 
BLD Restaurant :: Toronto ON
BLD Restaurant :: Toronto ONBLD Restaurant :: Toronto ON
BLD Restaurant :: Toronto ONdznr00
 
Building a new model for agencies and consultancies (en & cn) kevin lee 2011
Building a new model for agencies and consultancies (en & cn) kevin lee 2011Building a new model for agencies and consultancies (en & cn) kevin lee 2011
Building a new model for agencies and consultancies (en & cn) kevin lee 2011Kevin Lee
 
Videoconferencing Solutions
Videoconferencing SolutionsVideoconferencing Solutions
Videoconferencing SolutionsVideoguy
 
Proud to be PERSIAN
Proud to be PERSIANProud to be PERSIAN
Proud to be PERSIANmjf
 
Trends Assessment
Trends AssessmentTrends Assessment
Trends AssessmentTraceyVang
 
Leasing & Energy Allocations in Commercial Buildings
Leasing & Energy  Allocations in Commercial BuildingsLeasing & Energy  Allocations in Commercial Buildings
Leasing & Energy Allocations in Commercial BuildingsBetterBricks
 
COSMIC: Middleware for Xeon Phi Servers and Clusters
COSMIC: Middleware for Xeon Phi Servers and ClustersCOSMIC: Middleware for Xeon Phi Servers and Clusters
COSMIC: Middleware for Xeon Phi Servers and Clustersinside-BigData.com
 
Someone's Done that Already: The Best Practices of Sharing Best Practices, pr...
Someone's Done that Already: The Best Practices of Sharing Best Practices, pr...Someone's Done that Already: The Best Practices of Sharing Best Practices, pr...
Someone's Done that Already: The Best Practices of Sharing Best Practices, pr...craigslist_fndn
 

Viewers also liked (12)

Energy in Factory Automation and the Role of Industrial Networks
Energy in Factory Automation and the Role of Industrial Networks Energy in Factory Automation and the Role of Industrial Networks
Energy in Factory Automation and the Role of Industrial Networks
 
BLD Restaurant :: Toronto ON
BLD Restaurant :: Toronto ONBLD Restaurant :: Toronto ON
BLD Restaurant :: Toronto ON
 
Building a new model for agencies and consultancies (en & cn) kevin lee 2011
Building a new model for agencies and consultancies (en & cn) kevin lee 2011Building a new model for agencies and consultancies (en & cn) kevin lee 2011
Building a new model for agencies and consultancies (en & cn) kevin lee 2011
 
Assignment 3
Assignment 3Assignment 3
Assignment 3
 
Videoconferencing Solutions
Videoconferencing SolutionsVideoconferencing Solutions
Videoconferencing Solutions
 
Proud to be PERSIAN
Proud to be PERSIANProud to be PERSIAN
Proud to be PERSIAN
 
Trends Assessment
Trends AssessmentTrends Assessment
Trends Assessment
 
Leasing & Energy Allocations in Commercial Buildings
Leasing & Energy  Allocations in Commercial BuildingsLeasing & Energy  Allocations in Commercial Buildings
Leasing & Energy Allocations in Commercial Buildings
 
Target Gets Drawn Into Gun Rights Battle
Target Gets Drawn Into Gun Rights BattleTarget Gets Drawn Into Gun Rights Battle
Target Gets Drawn Into Gun Rights Battle
 
COSMIC: Middleware for Xeon Phi Servers and Clusters
COSMIC: Middleware for Xeon Phi Servers and ClustersCOSMIC: Middleware for Xeon Phi Servers and Clusters
COSMIC: Middleware for Xeon Phi Servers and Clusters
 
Crrc presentation
Crrc presentationCrrc presentation
Crrc presentation
 
Someone's Done that Already: The Best Practices of Sharing Best Practices, pr...
Someone's Done that Already: The Best Practices of Sharing Best Practices, pr...Someone's Done that Already: The Best Practices of Sharing Best Practices, pr...
Someone's Done that Already: The Best Practices of Sharing Best Practices, pr...
 

More from Orange Business Services

OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOrange Business Services
 
Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange Orange Business Services
 
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificDriving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificOrange Business Services
 
How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy? How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy? Orange Business Services
 
Building the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-PacificBuilding the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-PacificOrange Business Services
 
How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific Orange Business Services
 
Digitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industryDigitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industryOrange Business Services
 
SDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your businessSDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your businessOrange Business Services
 
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016Orange Business Services
 
World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...Orange Business Services
 
Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Orange Business Services
 
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSEOrange Business Services
 
Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Orange Business Services
 
Digitally transforming transport and logistics
Digitally transforming transport and logisticsDigitally transforming transport and logistics
Digitally transforming transport and logisticsOrange Business Services
 
Smart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaSmart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaOrange Business Services
 
Digging deep - the digital transformation of mining
Digging deep - the digital transformation of miningDigging deep - the digital transformation of mining
Digging deep - the digital transformation of miningOrange Business Services
 
Retail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingRetail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingOrange Business Services
 
[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?Orange Business Services
 

More from Orange Business Services (20)

OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
 
Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange
 
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificDriving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
 
How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy? How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy?
 
Building the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-PacificBuilding the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-Pacific
 
How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific
 
Digitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industryDigitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industry
 
SDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your businessSDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your business
 
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
 
World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...
 
Orange Data Centre and Cloud
Orange Data Centre and CloudOrange Data Centre and Cloud
Orange Data Centre and Cloud
 
Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?
 
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
 
Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...
 
Digitally transforming transport and logistics
Digitally transforming transport and logisticsDigitally transforming transport and logistics
Digitally transforming transport and logistics
 
Smart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaSmart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital India
 
Digging deep - the digital transformation of mining
Digging deep - the digital transformation of miningDigging deep - the digital transformation of mining
Digging deep - the digital transformation of mining
 
Retail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingRetail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shopping
 
[White Paper] Are containers the future ?
[White Paper] Are containers the future ?[White Paper] Are containers the future ?
[White Paper] Are containers the future ?
 
[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?
 

Recently uploaded

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 

Recently uploaded (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 

[EN] Denial of Service Attacks Over a Coffee preview

  • 2. denial of service attacks over a coffee Denial-of-service (DoS) attacks are among the least understood of IT security threats. For some users, they’re a threat against which firewalls are all but helpless. For others, they’re an especially practical way to block access to a website. Still others will say that they’re nothing new under the sun: DoS attacks are as old as the Internet itself and have to be taken into account in advance, as with any virus threat. Actually, everyone is right. From a technical standpoint, launching a DoS attack is easy. Protecting against these attacks is a challenge. The key is not to react to a DoS attack, but to act before such an attack even occurs. This booklet, or “blog book”, collects a group of blog posts that pursue a common goal: to increase our understanding of DoS attacks and learn how to protect against them. Jean-François Audenard editorial 2
  • 3. content launching a denial of service attack for $200 a newly available testing service for DDoS attacks the battle against DDoS attacks: our experience (part 1) the battle against DDoS attacks: our experience (part 2) 3 denial of service attacks over a coffee
  • 4. the article online http://oran.ge/S3pJVF 4 launching a denial of service attack for $200 denial of service attacks over a coffee launching a denial of service attack for $200 by Jean-François Audenard I’ve written on this topic before. With a little motivation, practically anyone can launch a distributed denial-of-service (DDoS) attack to take out a website (or an entire website hosting platform). And it’s not very expensive. For $200 (according to a blog post published by Damballa, a company specializing in detecting and combating botnets) it’s possible to rent a network of 80,000-120,000 zombie machines for 24 hours. According to the (believable) figures listed on the site, you can launch attacks between 10 Gbps and 100 Gbps: enough to cause a lot of problems. If you’re skeptical about what these DDoS “vendors” are capable of, no worries. Some will let you try out the service free for three minutes to give you an all-powerful “I rule the Web” rush. Key the evil mastermind music…
  • 5. 5 a newly available testing service for DDoS attacks denial of service attacks over a coffee a newly available testing service for DDoS attacks by Jean-François Audenard Among the plethora of threats an IT security professional must guard against, distributed denial-of-service (DDoS) attacks are a special case. They make it very hard to test the proper functioning of response mechanisms. During a DDoS attack, an attacker sends a synchronized flood of packets to overload the target’s servers or network access. It’s hard to produce a strong enough stream of attacks (which is relatively doable for testing purposes), but it’s also especially difficult to generate the necessary distributed traffic from several thousand sources. how to prevent these attacks When setting up a prevention system for DDoS attacks, it can be important to test the system “live,” to avoid any mishaps during a real attack. The Blitz Distributed Testing Service meets all of these needs. Using this service, it is theoretically possible to purchase “windows of opportunity” during which you can launch a DDoS attack from 5,000 to 10,000 different sources (the United States government probably uses a service of this type to test its systems’ resistance against this type of threat).
  • 6. denial of service attacks over a coffee6 Our blog : http://www.orange-business.com/en/blogs/connecting-technology download the entire document at http://oran.ge/VIo7V3free