Cyberattacks
Cyberattacks
Attacks
A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the regular
functioning of a targeted server, service, or network by overwhelming it with a flood of traffic
from multiple sources. The goal of a DDoS attack is to make the targeted resource unavailable to
its intended users, causing downtime, slowdowns, or complete unresponsiveness.
Traffic Flood: The attacker instructs the compromised computers to send a large volume of
traffic to the target. This flood of traffic can take various forms, including simple data packets,
connection requests, or even malicious payloads.
Overwhelm Resources: The massive influx of traffic overwhelms the target's resources,
such as bandwidth, processing power, memory, and network connections. As a result, the target
becomes unable to respond to legitimate requests from genuine users.
Service Disruption: With the target's resources exhausted, the service or server becomes
unavailable to legitimate users. This leads to downtime, loss of revenue, and potential damage
to the target's reputation.
Mitigation: Network administrators and security teams often use various strategies to
mitigate DDoS attacks. These may include filtering traffic to separate legitimate requests from
malicious ones, redistributing traffic across multiple servers, or relying on content delivery
networks (CDNs) that can absorb and manage traffic spikes.
There are several types of DDoS attacks, each with different methods and
objectives:
Volumetric Attacks: These attacks flood the target with an overwhelming amount of
traffic, aiming to saturate its network capacity. UDP floods and DNS amplification attacks fall
into this category.
TCP State Exhaustion Attacks: These attacks focus on consuming the available
connections or resources of a target's server, causing it to be unable to accept new connections.
SYN floods and ACK floods are examples of this type.
Application Layer Attacks: These attacks target the application layer of a service,
aiming to exhaust specific resources like CPU or memory. Examples include HTTP floods and
Slowloris attacks.
UDP Floods: Attackers flood the target with a large volume of User Datagram Protocol
(UDP) packets, often from spoofed IP addresses, overwhelming the target's network.
ICMP Floods: Attackers flood the target with Internet Control Message Protocol (ICMP)
Echo Request packets, often referred to as "ping" requests.
TCP State Exhaustion Attacks:
SYN Floods: Attackers send a flood of TCP SYN packets to initiate connections but never
complete the three-way handshake, causing the target to exhaust its resources managing half-
open connections.
ACK Floods: Attackers send a flood of TCP ACK packets to consume the target's resources,
leading to resource exhaustion.
Slowloris: Attackers initiate multiple slow and incomplete HTTP requests, keeping the
connections open and consuming server resources.
RUDY (R-U-Dead-Yet): Similar to Slowloris, RUDY sends slow and incomplete POST requests
to exhaust server resources.
HTTP POST Floods: Attackers send a large number of POST requests to overwhelm the
server's processing capacity.
HTTP GET/POST Floods: A combination of GET and POST requests targeting different
resources to exhaust both the network and server resources.
Amplification Attacks:
DNS Amplification: Attackers send small DNS queries with spoofed source IP addresses to
open resolvers, which then send large responses to the target, amplifying the attack.
NTP Amplification: Attackers exploit Network Time Protocol (NTP) servers that respond with
larger packets than the requests they receive, amplifying the attack.
SSDP Amplification: Attackers exploit Simple Service Discovery Protocol (SSDP) servers, often
used in home routers and IoT devices, to amplify traffic.
Smurf Attack: Attackers send ICMP Echo Request packets with a victim's spoofed IP address
to broadcast networks, causing all devices to respond to the victim, overwhelming it.
Fraggle Attack: Similar to Smurf, Fraggle targets UDP services using IP broadcast addresses.
.
Financial Gain: Some DDoS attacks are launched with the intent of extorting money
from the target. Attackers may threaten to continue the attack unless a ransom is paid.
Revenge: Individuals or groups might target specific organizations or individuals they have
personal grievances against, seeking to cause harm or disruption.
Disruption: DDoS attacks can be used to disrupt critical infrastructure, public services, or
high-profile events. For example, attacks might target government websites, news
organizations, or online services during major events.
Testing and Experimentation: Some attackers might use DDoS attacks as a means
of testing security measures, vulnerabilities, and the resilience of networks and systems.
Distraction: DDoS attacks can serve as a diversion to draw attention away from other
cyberattacks, like data breaches or malware infiltrations.