Distributed Denial of Service Attacks: Nitin Bisht 140231 CSE LLL
Distributed Denial of Service Attacks: Nitin Bisht 140231 CSE LLL
Service Attacks
NITIN BISHT
140231
CSE lll
1
Table of Content
o Introduction to DDoS
o How it Works
o Aim of DDoS Attack
o Types of DDoS
o DDoS Symptoms
o DDoS Mitigation
o Famous DDoS Attacks
2
Introduction
3
Introduction
4
DDoS VS DoS
6
How DDoS attack works
7
DDoS attack
8
DDoS Attack Report
9
AIM OF A DDoS ATTACK
10
Types of DDoS attacks
11
Network or Volume Centric
12
Network or Volume Centric
13
UDP Floods
14
ICMP Floods
15
Application – layer attack
17
Application – layer attack
18
Protocol attack
19
Protocol attack
20
DDoS Attack
21
DDoS Attack
22
FACTS
There was a 180% percent increase in the total number of DDoS attacks in 2016
compared to 2015.
The online gaming sector is currently the most susceptible to attack, accounting for
50% of all DDoS attacks.
IV.DDoS in India
24
Scientologist Church
• This attack took place on January 8, 2008 .
• It was attacked by hacker group Anonymous.
• The DDoS attack was meant to be a protest
against the Church of Scientology’s philosophies
and practices.
• The program was able to shut down the
Scientologist church website momentarily.
• The program that was deployed was used to
fight for Wikileaks.
25
Hong Kong’s Democracy Attack
• It started in June 2014, in Hong Kong to bring
destruction to the Chinese government . This
movement is called Occupy Central.
• Occupy Central used this DDoS attack against
the Chinese government because they wanted a
one man one vote system when electing
officials to represent political office.
• This all led Occupy Central to push their DDoS
attack forward and brought down a major
political website.
26
The New Year Attack
• It took place on December 31,2015.
• New World Hacking took responsibly for this
huge DDoS attack.
• They were capable of disrupting BBC’s global
website, along with Donald Trumps website as
well.
• The tool that was used to deploy these attacks
is called BangStresser.
27
The DDoS Attack in India
29
DDoS Mitigation
30
DDoS Mitigation
32
DDoS Mitigation
33
DDoS Myths
Myths:
Enterprises believe they are fully protected
with only cloud based DDoS mitigation.
Facts:
Cloud based DDoS mitigation only protects
against large, volumetric attacks, and fails
to provide adequate protection against low
and slow application layer attacks
34
DDoS Myths
Myths:
We will not become a target. Our business is
too small.
Facts:
DDoS attacks do not discriminate. Any
organization, big or small, is in danger or
experiencing the risks associated with a
DDoS attack.
35
DDoS Myths
Myths:
My Internet Service Provider (ISP) is protecting
me from DDoS attacks.
Facts:
ISP’s lack the ability to detect, analyze and
mitigate DDoS attacks and other cyber
threats
36
THANK YOU !
37