DR - Feleke Assignment-Denial of Service
DR - Feleke Assignment-Denial of Service
Service (DDOs)
A DoS attack is a denial of service attack where a computer is used to flood a server with
TCP and UDP packets. A DDoS attack is where multiple systems target a single system with a
DoS attack. The targeted network is then bombarded with packets from multiple locations.
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are two of the most
intimidating threats that modern enterprises face. Few forms of attack can have the financial
consequences as that of a successful DoS attack. Security surveys indicate that the cost of a
DDoS attack averages between 20,000-40,000 dollars per hour. This is an astronomical figure
and can put even the largest organizations under pressure.
3. ICMP Attacks
ICMP attacks consume both incoming and outgoing bandwidth because all the affected servers
will frequently attempt to react with ICMP echo reply packets which result in shutdown or slow
down of the entire system. It is similar to the UDP attacks but if approaches and affects the target
with ICMP echo request packet and sends with a high transmission rate instead of waiting for
any reply.
In the SYN flood attack, the requestor transmits the many SYN requests but never react to the
response of host SYN-ACK or it transmits the SYN request from a spoofed or masked IP
address. Now the host server, wait for the acknowledgement for every request from the receiver
and the persistent binding of resources until the establishment of new connections which
ultimately results in denial of services. It happens to exploit the defined weakness in the
connection sequence of TCP. It is similar to a three-way handshake. When any SYN request
needs to be initiated with TCP connection with any host servers, then it should be acknowledged
by SYN-ACK responses and verified again by ACK messages from the requestor. Hence this
type of attacks affects the responses from the requestor making denial of services.
4. Ping of Death
This type of attack includes transmitting continuous malfunctioned or malicious pings to the
server. The maximum packet length of the IP packet including the header is 65535 bytes. The
data link layer has the limits of maximum frame size as 1500 bytes over an Ethernet. In this
scenario, a maximum IP packet is segmented across multiple IP fragments and receiving host
possess the IP packets or fragments to complete the entire IP.
The malware manipulation of fragment data and ends up with recipient packets which are higher
than 65535 bytes when it is reassembled. It can be overwhelmed from the memory space
allocated for the packet which results in denial of service for even legitimate and real packets.
5. Slowloris
This type of attacks gives a huge impact such as enabling one web server by bringing down the
other web server without impacting other ports or services of the host network. It does this by
holding multiple connections to the host web server as long as possible and achieves this by
establishing a connection to the host server but it transmits only partial requests.
It persistently transmits more headers of HTTP but never satisfies the request. The host system
maintains the open port or services for this false connection which affects the space for
legitimate requests. As the name insists, this causes a slowdown of the entire system by
overwhelming of concurrent connection range.
6. Amplification of NTP
In this type of attack, the hacker attacks the public accessing Network Time Protocols to
overflow a host server by generating UDP traffic. It is described as amplification stabbing since
the ratio of a query to response in such cases lies in the range of 1:20 or 1:200 or much more
than that. It signifies that the hacker gets a list of open NTP servers and produce the maximum
volume of DoS attacks and distressing maximum bandwidth. This type of attack only focuses on
NTP protocols.
7. HTTP Flood
Here the hacker attacks the legitimate and generic HTTP GET or POST response to exploits a
web application or web server. It doesn’t use any spoofing techniques or reflection methods or
any malfunctioned packets. It consumes only minimum bandwidth than other types of attacks to
slow down the application or a host server. It is more effective when it pushes the system or
application to allot maximum possible resources in response to every unit request