0% found this document useful (0 votes)
9 views12 pages

Computer Misuse - Denial Service Attack Presentation

The document discusses Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, which overwhelm systems with traffic to prevent legitimate access. It outlines historical examples, differences between DoS and DDoS, and strategies for prevention and mitigation, including contacting ISPs and using detection products. Various attack methods are also described, highlighting their impact on network resources and legitimate users.

Uploaded by

1214482
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views12 pages

Computer Misuse - Denial Service Attack Presentation

The document discusses Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, which overwhelm systems with traffic to prevent legitimate access. It outlines historical examples, differences between DoS and DDoS, and strategies for prevention and mitigation, including contacting ISPs and using detection products. Various attack methods are also described, highlighting their impact on network resources and legitimate users.

Uploaded by

1214482
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Denial of

Service Attack
By: Alexis Perry
Arianna Edwards

11:11PM
Topics Covered

What is Examples How can


We will be Denial of of Denial denial of

presenting on Service of Service service


Attack Attack attack be
mitigated
or
prevented
Imagine you begin scrolling
through your Instagram feed
on a school computer when
suddenly you cannot access
Instagram, you cannot find A DoS attack (denial of service attack) is a
YouTube on your device, and security event that floods serves, systems
your IT SBA won’t open. As or networks with traffic to overwhelm their
many emails from unknown resources which prevents legitimate users
from being able to use specific computer
individuals flood into your systems, devices, service or other IT
school email, you realize you resources. DoS and DDoS attacks often
are experiencing a DoS/DDoS use vulnerabilities in the way networking
protocols handle network traffic.
attack.

Back to Agenda Page


DOS ATTACKS
THE FIRST DoS ATTACK
DoS attacks on internet-connected systems have a long history that
arguably started with the Robert Morris worm attack in 1988. In that
attack, Morris, a graduate student at MIT, released a self-
reproducing piece of malware -- a worm -- that quickly spread
through the global internet and triggered buffer overflows and DoS
attacks on the affected systems. Dos attacks are carried out for the following
reasons:

(Monetary gain: Attackers demand payment from victims to end


DoS or DDoS attacks
(Harm and individual or organization: Organizations/individuals
can lose money while recovering from a DoS attack
Sabotaging victim(s): DoS attackers just want to cause a lot of
damage and inconvenience a lot of people.

Back to Topivs Page


DoS Attack examples include:
The Google Attack, AWS (Amazon Web Series) Dyn Attack
2020 One of the more recent examples of a In October 2016, a DDoS attack was
DDoS Attack occurred in February 2020, carried out on a domain name system
impacting Amazon Web Services (AWS), a (DNS) provider, Dyn, which hosts and
The attacker used several networks to cloud computing service used by over a manages the domain names of select
spoof 167 Mpps (millions of packets per million companies, individuals, and companies in this directory on its
second) to 180,000 exposed CLDAP, government entities. server. When Dyn’s server was
DNS, and SMTP servers, which would compromised, it also affected the
then send large responses to us. This The hackers used directories on websites of the companies it hosts.
demonstrates the volumes a well- Connection-less Lightweight Directory The attack on Dyn flooded its servers
resourced attacker can achieve: This Access Protocol (CLDAP) servers to send with overwhelming traffic, creating a
was four times larger than the record- huge amounts of information to AWS's massive web outage and shutting
breaking 623 Gbps attack from the servers—as many as 2.3 terabits per down over 80 websites, including
Mirai botnet a year earlier. second (Tbps). However, Amazon was major sites like Twitter (now X),
able to stop the attack before it became a Amazon, Spotify, Airbnb, PayPal, and
big security risk for its customers. Netflix.

Back to Topivs Page


DIFFERENCE BETWEEN DoS and DDoS ATTACKS

DoS utilizes a single connection, while


a DDoS attack utilizes many sources
of attack traffic. This makes DDoS
attacks more difficult to prevent,
however they can be prevented with
these 3 strategies:
(1) Contacting an ISP
(2) Using denial-of-service attack
detection products
(3) Contracting with a backup ISP and
using cloud-based anti-DoS

HOW TO PREVENT A DoS/DDoS ATTACK


How to Prevent/Mitigate a DoS attack
futher explained
When a DoS attack is underway, it is recommended that the enterprise or individuals affected contact their ISP (Internet Service
Provider) to determine whether the incident is an actual DoS attack or degradation of performance caused by another factor. The ISP
can help mitigate DoS and DDoS attacks by rerouting malicious traffic and utilizing load balancers to reduce the attack's impact.
Load balancing uses an appliance to identify which server in a pool can best meet a given client request, while ensuring heavy
network traffic doesn't overwhelm a single server.

Denial-of-service attack detection products (they offer DoS detection functions) include:
Intrusion detection systems- Intrusion Detection System (IDS) observes network traffic for malicious transactions and sends
immediate alerts when it is detected.
Intrusion prevention systems- A network security technology that constantly monitors network traffic to identify threats.
Firewalls- A network security device designed to monitor, filter, and control incoming and outgoing network traffic based on
predetermined security rules.

Cloud DDoS Mitigation software is designed to safeguard cloud infrastructures against DDoS attacks and works to maintain
uninterrupted service availability. They will also adeptly identify patterns indicative of DDoS attacks, thereby initiating prompt
responses to deflect potential threats. These include Radware Cloud DDoS Protection Service, A10 Thunder Threat Protection
System, Akamai Prolexic, AWS Shield, and Microsoft Azure DDoS Protection

Back to Agenda Page


AMPLIFIED DOMAIN NAME
SYSTEM (DNS) DENIAL-OF- APPLICATION LAYER ATTACKS BUFFER OVERFLOW ATTACK
SERVICE ATTACK

Methods
of DoS An Amplified Domain System (DMS)
attack is a type of attack where the Application layer attacks, also called
A buffer overflow attack occurs when a
program attempts storing too much

attacks attacker manipulates open DNS servers to


send large volumes of legitimate traffic.
This is said to be a two-step attack . The
Layer 7 (L7) attacks, go after the top layer
of the internet system where websites and
apps run. This is where things like clicking
information into a storage space (called a
buffer).

Buffers are like temporary storage bins in


cybercriminal first uses a spoofed IP a link (HTTP GET) or submitting a form
your computer’s memory. They hold data
address to send massive requests to DNS (HTTP POST) happen.
for a short time while it's being moved
servers.
from one place to another.
The DNS server then replies to the These attacks try to mess up how a
But if a program tries to put too much data
request, creating an attack on the target website works by taking advantage of
into a buffer, it overflows—kind of like
victim. The size of these attacks is larger weak spots or site itself. Unlike other
stuffing a small backpack with way too
than the spoofed request, resulting in attacks that mainly flood the internet
much stuff. The extra data spills over into
large amounts of traffic going to the connection, these are able to wear out the
other parts of memory, which can mess
victim server. The attack often results in actual website, causing it to crash or slow
things up by changing important data or
complete inaccessibility of data for a down. They can do this without needing a
even letting hackers sneak in harmful
company or organization. lot of internet power.
code.
COMPUTERS OR OTHER
NETWORK-CONNECTED
THE PING-OF-DEATH ATTACK A SYN FLOOD ATTACK
DEVICES THAT HAVE BEEN
INFECTED
Methods The person infiltrating the
of DoS system may use
computers or other
This attack abuses the
ping protocol by sending
This attack abuses the
TCP’s handshake protocol

attacks network devices that have


been infected by malware
out request messages
with payloads (the actual
(the client establishes a
TCP connection with a
and made part of a botnet. message in transmitted server). They also direct a
DDoS attackes, including data) which are too big, high-volume stream of
those using botnets, use these payloads cause the false requests to open a
command-and-control systems attacked to TCP connection.
(C&C) servers (computers become overwhelmed, Accepting many requests
they control) to dictate stop responding to is a resource-intensive
what the kind of attack to legitimate requests for operation and can result in
launch/types of data to service and crash the the denial of legitimate
transmit/systems or system. users access to the
network resources to server.
target when attacking
STATE EXHAUSTION ATTACKS THE TEARDROP ATTACK VOLUMETRIC DOS ATTAC

Methods When the state tables An Internet Protocol


packet goes through IP
These aim to interfere
with legitimate access to

of DoS held in firewalls, routers


and other network devices specification and is
fragmented when the
network resources by
using all bandwidth

attacks are targeted by attackers


and filled with attack data
it is called a state
packets are too large to
be handled by
available to reach those
resources. The attackers
direct a high volume of
exhaustion attack, also intermediary routers and network traffic to the
known as Transmission it requires packet system they are targeting.
Control Protocol (TCP) fragments to specify The victim’s devices are
attack. The attacker fills fragment offsets. These flooded with network
the state tables by offsets are set to overlap packets using the User
opening more TCP circuits each other in tear drop Datagram Protocol or
than the victim system attacks so the host Internet Control Message
can handle at once. This running the affected OSes Protocol (they generate
also prevents legitimate is unable to reassemble large volumes of traffic,
users from accessing the fragments and the and process the incoming
network resources. system crashes. malicious datagrams).
Thank you!
Insert a parting or call-to-action message here.

You might also like