17
DoS or DDoS Attack A red eye to Web Services Presented by... Tamal Biswas Kousik Layek Tridib Biswas

DoS or DDoS attack

Embed Size (px)

Citation preview

Page 1: DoS or DDoS attack

DoS or DDoS AttackA red eye to Web Services

Presented by...

Tamal BiswasKousik LayekTridib Biswas

Page 2: DoS or DDoS attack

Module Index

• What is DoS?• What is DDoS?• Recent attack on web.• Methods of attack.• Performing DoS attacks.• How do we know an attack is happening?• What to do if we are experiencing an attack?• How do we avoid being part of the problem?• Conclusion.

Page 3: DoS or DDoS attack

Denial of Services(DoS)Its an attack to make a machine or network resource unavailable to its intended users.

Page 4: DoS or DDoS attack

Denial of Services(DoS)

Back

Its an attack to make a machine or network resource unavailable to its intended users.

Page 5: DoS or DDoS attack

Distributed Denial-of-Service attack

Its an attack to make a machine or network resource unavailable to its intended usersby using others computer.

Network

Back

Page 6: DoS or DDoS attack

A big-bang of DDoS attackThe internet around the whole world was slowed down on 27th march.

Because that day DDoS attack took place with near about 300 Gbps.

Back

Page 7: DoS or DDoS attack

Method of attack

• ICMP flood • Teardrop attacks • Permanent denial-of-service attacks• Reflected / Spoofed attack• Low-rate Denial-of-Service attacks • Peer-to-peer attacks

Page 8: DoS or DDoS attack

Some best DoS attack method

• ICMP flood: – Sends packets to all computer hosts rather than a

specific machine.• Teardrop attacks: – Fragmented over-sized pay-loads to be send to the

target machine.• Permanent denial-of-service attacks: – It may cause replacement of hardware also.

Back

Page 9: DoS or DDoS attack

Performing DoS or DDoS Attack

• A wide range of programs are used to launch DoS-attacks. Some of those are... JoltBubonicTargaBlastPantherCrazy Pinger

Page 10: DoS or DDoS attack

Some best DoS Attack tools

• Jolt: – Finds exploit vulnerability in windows networking code.– Consumes 100% CPU time by sending heavy CPU

consuming packets.

• LaTierra: – It sends TCP packets to more than one port number.

• Nemsey: – generates random packets with random port number and

floods victim with it.

Back

Page 11: DoS or DDoS attack

How do we know an attack is happening?

• unusually slow network performance (opening files or accessing websites)

• unavailability of a particular website• inability to access any website• dramatic increase in the amount of spam you

receive in your account

Page 12: DoS or DDoS attack

A common message after DoS

Back

Page 13: DoS or DDoS attack

What to do if we are experiencing an attack?

• contact your network administrators.• In case of home computer, consider contacting

your internet service provider (ISP).• Immediatly get disconnected from internet.

Back

Page 14: DoS or DDoS attack

How do we avoid being part of the problem?

• Install and maintain anti-virus.• Install a firewall.• Configure the firewall to restrict incomming

and outgoing traffic.• Follow good security practices for distributing

your email address. • Applying email filters may help you manage

unwanted traffic.

Back

Page 15: DoS or DDoS attack

Conclusion

• Susceptibility to attacks could be alleviated with better Internet.

• Don’t leave all the decision making to the machines.

• Provide ‘intelligent’ support along the path.• Create “Hardened” networks.

Page 16: DoS or DDoS attack

Refferences

• http://en.wikipedia.org/wiki/Denial-of-service_attack

Page 17: DoS or DDoS attack

Thank you...