0% found this document useful (0 votes)
147 views37 pages

Distributed Denial of Service Attacks: Nitin Bisht 140231 CSE LLL

The document provides an overview of distributed denial of service (DDoS) attacks. It describes how DDoS attacks work by exploiting vulnerabilities in systems to form large networks of compromised devices (botnets) that can overwhelm targets with fake traffic. There are three main types of DDoS attacks - volumetric attacks that flood networks, protocol attacks that exhaust resources, and application layer attacks that mimic human behavior. Popular targets include gaming, banking and news websites. Mitigation involves tools that identify and filter legitimate traffic during attacks.

Uploaded by

Akash S N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
147 views37 pages

Distributed Denial of Service Attacks: Nitin Bisht 140231 CSE LLL

The document provides an overview of distributed denial of service (DDoS) attacks. It describes how DDoS attacks work by exploiting vulnerabilities in systems to form large networks of compromised devices (botnets) that can overwhelm targets with fake traffic. There are three main types of DDoS attacks - volumetric attacks that flood networks, protocol attacks that exhaust resources, and application layer attacks that mimic human behavior. Popular targets include gaming, banking and news websites. Mitigation involves tools that identify and filter legitimate traffic during attacks.

Uploaded by

Akash S N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Distributed Denial of

Service Attacks

NITIN BISHT
140231
CSE lll
1
Table of Content
o Introduction to DDoS
o How it Works
o Aim of DDoS Attack
o Types of DDoS
o DDoS Symptoms
o DDoS Mitigation
o Famous DDoS Attacks

2
Introduction

 A Distributed Denial of Service (DDoS) attack is


an attempt to make an online service
unavailable by overwhelming it with traffic from
multiple sources.

 In the United States, the people that take part


in DDoS attacks are charged with legal offenses
at the federal level, both criminally and civilly.

3
Introduction

 The average DDoS attack is about 50 gbps.

 DDoS Duration :- not defined

 Targets :- Gaming industries , banks , news


websites

4
DDoS VS DoS

 In a DoS attack, a hacker uses a single


Internet connection to either exploit a
software vulnerability or flood a target with
fake requests—usually in an attempt to
exhaust server resources .

 On the other hand, distributed denial of


service (DDoS) attacks are launched from
multiple connected devices that are
distributed across the Internet.
5
How DDoS attack works

 In a typical DDoS attack, the hacker begins


by exploiting a computer system and
making it the DDoS master.
 The attack master system identifies other
vulnerable systems and gains control over
them by either infecting the systems
with malware or through bypassing the
authentication controls .

6
How DDoS attack works

 The attacker creates a command-and-


control server to command the network of
bots, also called a botnet.
 The person in control of a botnet is
sometimes referred to as the botmaster.
 Their main aim is to prevent legitimate
users from accessing a system or site.

7
DDoS attack

8
DDoS Attack Report

9
AIM OF A DDoS ATTACK

Common reason for DDoS attacks are:


1.Expression of anger and criticism.
2.Training ground for other attacks.
3.Distraction from other malicious actions.
4.Anticompetitive business practices.
5.Means to extract money.
6.To disrupt operation of private or government
enterprise.

10
Types of DDoS attacks

There are broadly 3 types of DDoS attacks :-

Network or Volume centric attack – 64%

Protocol attacks – 20%

Ap Application layer attack - 16%

11
Network or Volume Centric

 These attacks use bots and botnets to


flood the network layers with a substantial
amount of seemingly legitimate traffic.

 This consumes an excessive amount of


bandwidth within or outside of the network
and causes network operations to become
extremely slow or to not work at all.

12
Network or Volume Centric

 These kinds of attacks are more difficult to


mitigate than attacks from a single source

 Volumetric attacks come in a variety of forms,


including:

• User Datagram Protocol (UDP) Floods


• ICMP floods ( Internet Control Message
Protocol)

13
UDP Floods

 Random ports on a server are flooded with UDP


packets, causing the server to repeatedly
check for and respond to non-existent
applications at the ports.

 As a result, the system is unable to


respond to legitimate applications.

14
ICMP Floods

 A server is flooded with ICMP echo


requests from multiple spoofed IP addresses.

 As the targeted server processes and


replies to these phony requests, it is
eventually overloaded and unable to process
valid ICMP echo requests.

15
Application – layer attack

 The goal of an application layer attack is to


exhaust resources by consuming too much.

 They target the layer that manages HTTP and


SMTP communication.

 They target web application packets in order to


disrupt the transmission of data between hosts.
 They attack on apache ,windows web servor ,
as they are more vulnerable.
16
Application – layer attack

 These type of attacks are more sophisticated


and are gaining in popularity than other types
of DDoS attacks.

 For example:- an HTTP Flood – the most


common application-layer attack – uses
botnets to force a target to expend an
excessive amount of resources when
responding to a HTTP request

17
Application – layer attack

 HTTP floods and other application-layer


DDoS attacks mimic human-user behavior
making them much more difficult to detect
than other types of attacks.

 Web based email apps, WordPress, Joomla, and


forum software are good examples of
application specific targets.

18
Protocol attack

 Protocol attacks target the connection state


tables in firewalls, web application servers,
and other infrastructure components.

 One of the most common state-exhaustion


attacks was the ping of death, in which a
65,536-byte ping packet is defragmented
and sent to a target server as fast as
possible.

19
Protocol attack

 Once the target reassembles the large


packet, a buffer overload typically occurs.

 In the likely scenario that the target


attempts to respond to the pings, even
more bandwidth is consumed, eventually
causing the targeted system to crash.

20
DDoS Attack

21
DDoS Attack

• DDoS attacks are the single largest threat to


our Internet and the Internet of Things.

• The more our world becomes connected and


dependent on the Internet, the more
opportunities to get exploited by these types of
attack.

22
FACTS

 There was a 180% percent increase in the total number of DDoS attacks in 2016
compared to 2015.

 The online gaming sector is currently the most susceptible to attack, accounting for
50% of all DDoS attacks.

 Software and technology companies -25%


 Internet and telecoms companies - 5%
of the total attack. 23
Famous Attack
 3 Most Famous DDoS Attacks

I. Scientologist Church Gets Hit Hard By


Anonymous!

II. Hong Kong’s Democracy Movement Attack

III.The New Year Attack !

IV.DDoS in India
24
Scientologist Church
• This attack took place on January 8, 2008 .
• It was attacked by hacker group Anonymous.
• The DDoS attack was meant to be a protest
against the Church of Scientology’s philosophies
and practices.
• The program was able to shut down the
Scientologist church website momentarily.
• The program that was deployed was used to
fight for Wikileaks.

25
Hong Kong’s Democracy Attack
• It started in June 2014, in Hong Kong to bring
destruction to the Chinese government . This
movement is called Occupy Central.
• Occupy Central used this DDoS attack against
the Chinese government because they wanted a
one man one vote system when electing
officials to represent political office.
• This all led Occupy Central to push their DDoS
attack forward and brought down a major
political website.

26
The New Year Attack
• It took place on December 31,2015.
• New World Hacking took responsibly for this
huge DDoS attack.
• They were capable of disrupting BBC’s global
website, along with Donald Trumps website as
well.
• The tool that was used to deploy these attacks
is called BangStresser.

27
The DDoS Attack in India

• It took place on November ,2016.


• It was one of the biggest attack ever done
on an ISP.
• The attack was of a huge magnitude of 200
gigabytes per second.
• This is the reason behind the recent slowing
down of the internet experienced by users
around Mumbai.
• An FIR was filed against the DDoS attack
with the Mumbai police.
28
SYMPTOMS

The United States Computer Emergency Readiness


Team(US-CERT) has identified symptoms of a
denial-of-service attack to include:
unusually slow network performance
unavailability of a particular web site
inability to access any web site
dramatic increase in the number of spam emails
received (this type of DoS attack is considered
an e-mail bomb).

29
DDoS Mitigation

30
DDoS Mitigation

 DDoS mitigation is a set of techniques or tools


for resisting the impact of DDoS attacks on
networks attached to the Internet by protecting
the target and relay networks.
 DDoS mitigation also requires identifying
incoming traffic to separate human traffic from
human-like bots and hijacked web browsers.
 The process is done by comparing signatures
and examining different attributes of the traffic,
including IP addresses, cookie variations, HTTP
headers, and JavaScript footprints.
31
DDoS Mitigation

32
DDoS Mitigation

 Best practices for DDoS mitigation include


having both anti-DDoS technology and anti-
DDoS emergency response services such
as Incapsula, Akamai, CloudFlare or Radware.

 DDoS mitigation is also available through cloud-


based providers.
 User must install anti-virus.
 User must install firewall.

33
DDoS Myths

 Myths:
Enterprises believe they are fully protected
with only cloud based DDoS mitigation.

 Facts:
Cloud based DDoS mitigation only protects
against large, volumetric attacks, and fails
to provide adequate protection against low
and slow application layer attacks
34
DDoS Myths

 Myths:
We will not become a target. Our business is
too small.

 Facts:
DDoS attacks do not discriminate. Any
organization, big or small, is in danger or
experiencing the risks associated with a
DDoS attack.

35
DDoS Myths

 Myths:
My Internet Service Provider (ISP) is protecting
me from DDoS attacks.

 Facts:
ISP’s lack the ability to detect, analyze and
mitigate DDoS attacks and other cyber
threats

36
THANK YOU !

37

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy