SlideShare a Scribd company logo
Denial of Service Attack
DoS Attack
 DoS attack
 DDoS attack
 Types of DoS attack
 Symptoms
 Defense technique
 Prevention from DoS attack
 Side effects of attacks
 Legality
 Denial of Service Attack
 Denial of service attack is a one type of system
attack and also one type of cyber attack where the
perpetrator seeks to make a machine or network
resource unavailable to its intended users by
temporarily or indefinitely disrupting services of a
host connected to the Internet.
 Denial of service attack is typically accomplished
by flooding the targeted machine or resource with
superfluous requests in an attempt to overload
systems and prevent some or all
legitimate(defense) requests from being fulfilled.
 Criminals of DoS attacks often target sites or
services hosted on high profile web servers
such as banks or credit cards payment
gateways, revenge, blackmail and activism can
motivate these attacks.
 The system’s which are used for attacking are
known as Zombie System’s and attacked are
known as Victim System’s.
 Distributed denial of service attack…
 Distributed denial-of-service attack, the coming
traffic flooding the victim originates from many
different sources. This effectively makes it
impossible to stop the attack simply by blocking
a single source.
Denial of Service Attack
 Flood attack: Attacker keeps on flooding
victim’s system with ‘n’ no of pings which result
in huge traffic which the system cannot handle.
 Buffer overflow attack: It is a technique used for
performing of DoS attack.
 Ping of death: The attacker sends huge oversize
packet to the victim’s system which causes the
system to freeze or crash.
 SYN attack
 Nuke
 Teardrop
 Smurf attack
 The United States Computer Emergency
Readiness Team (US-CERT) has identified
symptoms of a denial-of-service attack to
include:
 Unusually slow network performance (opening
files or accessing web sites)
 Unavailability of a particular web site
 Inability to access any web site
 Dramatic increase in the number of spam
emails received (this type of DoS attack is
considered an e-mail bomb).
 Disconnection of a wireless or wired internet
connection
 Long-term denial of access to the web or any
internet services.
 Application front end hardware
 Application level Key Completion Indicators
 Blackholing and sinkholing
 IPS based prevention
 DDS based defense
 Firewalls
 Routers
 Switches
 Upstream filtering
Denial of Service Attack
 Implementing filter’s
 Disable unused network services
 Maintain regular backup
 Maintain password policies
 Tools such as Zombie Zapper, RID (remote
intrusion detector)
 In computer network security, backscatter is a
side-effect of a spoofed denial-of-service attack.
In this kind of attack, the attacker spoofs (or
forges) the source address in IP packets sent to
the victim. In general, the victim machine
cannot distinguish between the spoofed
packets and legitimate packets, so the victim
responds to the spoofed packets as it normally
would. These response packets are known as
backscatter.
 If the attacker is spoofing source addresses
randomly, the backscatter response packets from
the victim will be sent back to random
destinations. This effect can be used by network
telescopes as indirect evidence of such attacks.
 The term "backscatter analysis" refers to observing
backscatter packets arriving at a statistically
significant portion of the IP address space to
determine characteristics of DoS attacks and
victims.
 Many jurisdictions have laws under which
denial-of-service attacks are illegal.
 In the US, denial-of-service attacks may be
considered a federal crime under the Computer
Fraud and Abuse Act with penalties that include
years of imprisonment. The Computer Crime
and Intellectual Property Section of the
US Department of Justice handles cases of DoS.
 In European countries, committing criminal denial-
of-service attacks may, as a minimum, lead to
arrest. The United Kingdom is unusual in that it
specifically outlawed denial-of-service attacks and
set a maximum penalty of 10 years in prison with
the Police and Justice Act 2006, which amended
Section 3 of the Computer Misuse Act 1990.
 On January 7, 2013, Anonymous posted a
petition on the whitehouse.gov site asking that
DDoS be recognized as a legal form of protest
similar to the Occupy protests, the claim being that
the similarity in purpose of both are same.
 Inspiration from Prof. Jyana B. Shah and Prof.
Tejas P. Bhatt
 Youtube
 Google
 Wiki
 Some my own knowledge
Denial of Service Attack

More Related Content

Denial of Service Attack

  • 3.  DoS attack  DDoS attack  Types of DoS attack  Symptoms  Defense technique  Prevention from DoS attack  Side effects of attacks  Legality
  • 4.  Denial of Service Attack
  • 5.  Denial of service attack is a one type of system attack and also one type of cyber attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.  Denial of service attack is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate(defense) requests from being fulfilled.
  • 6.  Criminals of DoS attacks often target sites or services hosted on high profile web servers such as banks or credit cards payment gateways, revenge, blackmail and activism can motivate these attacks.  The system’s which are used for attacking are known as Zombie System’s and attacked are known as Victim System’s.
  • 7.  Distributed denial of service attack…  Distributed denial-of-service attack, the coming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.
  • 9.  Flood attack: Attacker keeps on flooding victim’s system with ‘n’ no of pings which result in huge traffic which the system cannot handle.  Buffer overflow attack: It is a technique used for performing of DoS attack.  Ping of death: The attacker sends huge oversize packet to the victim’s system which causes the system to freeze or crash.
  • 10.  SYN attack  Nuke  Teardrop  Smurf attack
  • 11.  The United States Computer Emergency Readiness Team (US-CERT) has identified symptoms of a denial-of-service attack to include:  Unusually slow network performance (opening files or accessing web sites)  Unavailability of a particular web site  Inability to access any web site
  • 12.  Dramatic increase in the number of spam emails received (this type of DoS attack is considered an e-mail bomb).  Disconnection of a wireless or wired internet connection  Long-term denial of access to the web or any internet services.
  • 13.  Application front end hardware  Application level Key Completion Indicators  Blackholing and sinkholing  IPS based prevention  DDS based defense  Firewalls  Routers  Switches  Upstream filtering
  • 15.  Implementing filter’s  Disable unused network services  Maintain regular backup  Maintain password policies  Tools such as Zombie Zapper, RID (remote intrusion detector)
  • 16.  In computer network security, backscatter is a side-effect of a spoofed denial-of-service attack. In this kind of attack, the attacker spoofs (or forges) the source address in IP packets sent to the victim. In general, the victim machine cannot distinguish between the spoofed packets and legitimate packets, so the victim responds to the spoofed packets as it normally would. These response packets are known as backscatter.
  • 17.  If the attacker is spoofing source addresses randomly, the backscatter response packets from the victim will be sent back to random destinations. This effect can be used by network telescopes as indirect evidence of such attacks.  The term "backscatter analysis" refers to observing backscatter packets arriving at a statistically significant portion of the IP address space to determine characteristics of DoS attacks and victims.
  • 18.  Many jurisdictions have laws under which denial-of-service attacks are illegal.  In the US, denial-of-service attacks may be considered a federal crime under the Computer Fraud and Abuse Act with penalties that include years of imprisonment. The Computer Crime and Intellectual Property Section of the US Department of Justice handles cases of DoS.
  • 19.  In European countries, committing criminal denial- of-service attacks may, as a minimum, lead to arrest. The United Kingdom is unusual in that it specifically outlawed denial-of-service attacks and set a maximum penalty of 10 years in prison with the Police and Justice Act 2006, which amended Section 3 of the Computer Misuse Act 1990.  On January 7, 2013, Anonymous posted a petition on the whitehouse.gov site asking that DDoS be recognized as a legal form of protest similar to the Occupy protests, the claim being that the similarity in purpose of both are same.
  • 20.  Inspiration from Prof. Jyana B. Shah and Prof. Tejas P. Bhatt  Youtube  Google  Wiki  Some my own knowledge