Data Security and Encryption: Assignment # 2
Data Security and Encryption: Assignment # 2
Data Security and Encryption: Assignment # 2
Encryption
Assignment # 2
Protecting Electronic Commerce
From
Distributed Denial-of-Service
Attacks
Submitted to:
Dr. Adnan Ahmad
Submitted by:
Ammar Umer
DDP-SP13-BSE-016
Anam Naimat
DDP-SP13-BSE-018
Date: 14-11-2016
TREE-STRUCTURE
Attack Mechanisms
Denial
of
Denial of
Service
Service
Distribute
Distribute
dd Dos
Dos
Congestiv
Congestiv
e/
e/
Protocol
Protocol
Attacks
Attacks
Volume
Volume
Based
Based
Attacks
Attacks
UDP
UDP
Floods
Floods
ICMP
ICMP
Floods
Floods
Advance
Advance
Persistanc
Persistanc
ee Dos
Dos
SpoofSpoofPacket
Packet
Floods
Floods
SYN
SYN
Floods
Floods
Applicatio
Applicatio
nn Layer
Layer
Attacks
Attacks
Fragment
Fragment
ed
ed Packet
Packet
Attacks
Attacks
Death
Pill
Death Pill
Attack
Attack
Smurf
Smurf
DDos
DDos
Ping
Ping of
of
Death
Death
Teardrop
Teardrop
Land
Land
NTP
NTP
Amplificat
Amplificat
ion
ion
Slowloris
Slowloris
GET/POST
GET/POST
Protection Mechanism
Apache
Apache
Attacks
Attacks
OS
OS
Vulnerabil
Vulnerabil
ities
ities
are difficult to mount and sustain because attackers cannot forge VIP rights, attackers cannot
easily find and infiltrate computers with active VIP rights for an intended victim,and VIP rights
are term- and usage-limited. Consequently, VIPnet can protect a (perhaps major) portion of an emerchants revenues from the effects of congestion and DoS attacks. For this service,e-merchants
pay a fee to ISPs,thus amortizing the necessary investment.