Denial of Service-1
Denial of Service-1
Denial of Service-1
Denial of service attacks usually do not lead to system compromise, data loss, or
theft. However, a DoS attack can cause a significant loss of time and resources to
the targeted service since it can last anywhere between a few hours and several
months.
For example, one way of doing this is by sending many requests with fabricated
return addresses (i.e., they are junk) to a server. This makes it impossible for the
server to verify their source. It can lead to a server simply exhausting its RAM or
CPU capacity, and crashing.
A multitude of different DoS attacks exists. Depending on the attack vector, DoS
attacks either seek to flood or to crash a system. The three main types of DoS
attacks are:
• Application-layer attacks are intended to crash a specific application or
service rather than a whole network. It is usually achieved by flooding the
app with malicious HTTP requests and making it unable to respond further.
Application-layer attacks are measured in requests per second (RPS).
• Protocol or network-layer attacks exploit weaknesses in network
protocols and procedures by targeting infrastructure and network
management tools. They seek to disrupt a whole network instead of a single
application. These attacks are measured in packets per second (PPS) or bits
per second (BPS).
• Volumetric attacks are the most common type of DoS attack. It seeks to
overwhelm a target’s bandwidth capacity by flooding it with fake requests. It
creates network congestion and makes it impossible for legitimate traffic to
pass. The magnitude of these attacks is measured in bits per second (BPS).
There are two general methods of DoS attacks: flooding services or crashing
services. Flood attacks occur when the system receives too much traffic for the
server to buffer, causing them to slow down and eventually stop. Popular flood
attacks include:
• Buffer overflow attacks – the most common DoS attack. The concept is to send
more traffic to a network address than the programmers have built the system to
handle. It includes the attacks listed below, in addition to others that are designed
to exploit bugs specific to certain applications or networks
• ICMP flood – leverages misconfigured network devices by sending spoofed
packets that ping every computer on the targeted network, instead of just one
specific machine. The network is then triggered to amplify the traffic. This attack
is also known as the smurf attack or ping of death.
• SYN flood – sends a request to connect to a server, but never completes
the handshake. Continues until all open ports are saturated with requests and none
are available for legitimate users to connect to.
Other DoS attacks simply exploit vulnerabilities that cause the target system or
service to crash. In these attacks, input is sent that takes advantage of bugs in the
target that subsequently crash or severely destabilize the system, so that it can’t be
accessed or used.
Motives for Denial of Service Attacks
• Financial motives. Organized crime groups can use the threat of a DoS
attack to extort organizations. Some companies will pay up simply to
avoid the disruption that an attack would cause, or to end a sustained
attack.
• Political or social motives. DoS attacks can be used to take down
websites or networks of political opponents, or of companies or
organizations that an activist group sees as unethical. Readily available
‘stress-testing’ software such as LOIC can enable individuals to band
together and launch DDoS attacks with the click of a button.
• As a form of distraction. Attackers may use a DoS attack to draw your
attention away from other malicious activities they are carrying out. A
DoS attack on one system may preempt a more serious breach of
another system, or a different kind of attack on the same system.
• Self-inflicted incidents. Denial of Service disruptions can sometimes
stem from mistakes on the part of an organization’s IT department (eg.
failing to configure the company’s server properly, resulting in an
overload of network requests).
While Denial of Service attacks are difficult to prevent entirely, there are a
number of measures you can take to limit their effectiveness, and react
appropriately when they do occur:
It may be difficult to spot a DoS attack, as interferences may initially appear non-
malicious. You can use several criteria to determine if you are being attacked with
a DoS. The three most common symptoms of an attack, according to the United
States Computer Emergency Readiness Team (US-CERT), include:
DDoS allows for exponentially more requests to be sent to the target, therefore
increasing the attack power. It also increases the difficulty of attribution, as the true
source of the attack is harder to identify.
DDoS attacks have increased in magnitude as more and more devices come online
through the Internet of Things (IoT). IoT devices often use default passwords and
do not have sound security postures, making them vulnerable to compromise and
exploitation. Infection of IoT devices often goes unnoticed by users, and an
attacker could easily compromise hundreds of thousands of these devices to
conduct a high-scale attack without the device owners’ knowledge.
What is the difference between a DDoS attack and a DoS attack?
DoS utilizes a single connection, while a DDoS attack utilizes many sources of
attack traffic, often in the form of a botnet. Generally speaking, many of the
attacks are fundamentally similar and can be attempted using one more many
sources of malicious traffic.