New Microsoft Office Word Document
New Microsoft Office Word Document
New Microsoft Office Word Document
Some of the most common tools for initiating a Botnet DDoS attack are easily
downloaded from multiple online sources, and include:
SlowLoris
Especially dangerous to hosts running Apache, dhttpd, Tomcat and GoAhead
WebServer, Slowloris is a highly-targeted attack, enabling one web server to take
down another server, without affecting other services or ports on the target network.
Qslowloris
Uses Qt libraries to execute the methods used by Slowloris, offering a graphical user
interface that makes the program highly easy to use.
Apache Killer
Utilizes an exploit in the Apache OS first discovered by a Google security engineer.
Apache Killer pings a server, tells the server to break up whatever file is transferred
into a vast number of tiny chunks, using the "range" variable. When the server tries
to comply with this request, it runs out of memory, or encounters other errors, and
crashes.
There are also many too
Includes UDP floods, ICMP floods, and other spoofed-packet floods. The attacks
goal is to saturate the bandwidth of the attacked site, and magnitude is measured in
bits per second (Bps).
Protocol Attacks
Includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and
more. This type of attack consumes actual server resources, or those of intermediate
communication equipment, such as firewalls and load balancers, and is measured in
Packets per second.
Application Layer Attacks
Includes Slowloris, Zero-day DDoS attacks, DDoS attacks that target Apache,
Windows or OpenBSD vulnerabilities and more. Comprised of seemingly legitimate
and innocent requests, the goal of these attacks is to crash the web server, and the
magnitude is measured in Requests per second.
SYN-ACK response, or sends the SYN requests from a spoofed IP address. Either
way, the host system continues to wait for acknowledgement for each of the
requests, binding resources until no new connections can be made, and ultimately
resulting in denial of service.
Ping of Death
A ping of death ("POD") attack involves the attacker sending multiple malformed or
malicious pings to a computer. The maximum packet length of an IP packet
(including header) is 65,535 bytes. However, the Data Link Layer usually poses limits
to the maximum frame size - for example 1500 bytes over an Ethernet network. In
this case, a large IP packet is split across multiple IP packets (known as fragments),
and the recipient host reassembles the IP fragments into the complete packet. In a
Ping of Death scenario, following malicious manipulation of fragment content, the
recipient ends up with an IP packet which is larger than 65,535 bytes when
reassembled. This can overflow memory buffers allocated for the packet, causing
denial of service for legitimate packets.
Slowloris
Slowloris is a highly-targeted attack, enabling one web server to take down another
server, without affecting other services or ports on the target network. Slowloris does
this by holding as many connections to the target web server open for as long as
possible. It accomplishes this by creating connections to the target server, but
sending only a partial request. Slowloris constantly sends more HTTP headers, but
never completes a request. The targeted server keeps each of these false
connections open. This eventually overflows the maximum concurrent connection
pool, and leads to denial of additional connections from legitimate clients.
NTP Amplification
In NTP Amplification attacks the perpetrator exploits publically-accessible Network
Time Protocol (NTP) servers to overwhelm the targeted server with User Datagram
Protocol (UDP) traffic. In an NTP amplification attack, the query-to-response ratio is
anywhere between 1:20 and 1:200 or more. This means that any attacker that
obtains a list of open NTP servers (e.g., by using tool like Metasploit or data from the
Open NTP Project) can easily generate a devastating high-bandwidth, high-volume
DDoS attack.
HTTP Flood
In HTTP flood DDoS attack the attacker exploits seemingly-legitimate HTTP GET or
POST requests to attack a web server or application. HTTP floods do not use
malformed packets, spoofing or reflection techniques, and require less bandwidth
than other attacks to bring down the targeted site or server. The attack is most
effective when it forces the server or application to allocate the maximum resources
possible in response to each single request.
Zero-day DDoS Attacks
Zero-day are simply unknown or new attacks, exploiting vulnerabilities for which no
patch has yet been released. The term is well-known amongst the members of the
hacker community, where the practice of trading Zero-day vulnerabilities has become
a popular activity.
Incapsula mitigates a massive HTTP flood: 690,000,000 DDoS requests from 180,000 botnets IPs.
In all these scenarios, Incapsula applies its DDoS protection solutions outside of your
network, meaning that only filtered traffic reaches your hosts. Moreover, Incapsula
maintains an extensive DDoS threat knowledge base, which includes new and
emerging attack methods. This constantly-updated information is aggregated across
our entire network - identifying new threats as they emerge, detecting known
malicious users, and applying remedies in real-time across all Incapsula-protected
websites.
How do you avoid being part of the problem?
Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS
attack, but there are steps you can take to reduce the likelihood that an attacker will use
your computer to attack other computers:
Install and maintain anti-virus software (see Understanding Anti-Virus Software for
more information).
Install a firewall, and configure it to restrict traffic coming into and leaving your
computer (see Understanding Firewalls for more information).
Follow good security practices for distributing your email address (see Reducing
Spam for more information). Applying email filters may help you manage unwanted
traffic.
If you notice that you cannot access your own files or reach any external websites
from your work computer, contact your network administrators. This may indicate
that your computer or your organization's network is being attacked.
If you are having a similar experience on your home computer, consider
contacting your internet service provider (ISP). If there is a problem, the ISP might
be able to advise you of an appropriate course of action.
Author