0% found this document useful (0 votes)
238 views11 pages

Dos Attack

The document summarizes a seminar presented by Moinak Sutradhar on denial-of-service (DoS) attacks. It includes an introduction defining DoS attacks, highlights various attack techniques such as advanced persistent DoS and HTTP POST DoS attacks. It also discusses symptoms of DoS attacks, defense techniques including firewalls, and the legality of such attacks. The conclusion emphasizes that DoS attacks are punishable offenses and thanks the seminar guide and classmates for their support.

Uploaded by

bong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
238 views11 pages

Dos Attack

The document summarizes a seminar presented by Moinak Sutradhar on denial-of-service (DoS) attacks. It includes an introduction defining DoS attacks, highlights various attack techniques such as advanced persistent DoS and HTTP POST DoS attacks. It also discusses symptoms of DoS attacks, defense techniques including firewalls, and the legality of such attacks. The conclusion emphasizes that DoS attacks are punishable offenses and thanks the seminar guide and classmates for their support.

Uploaded by

bong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

SILIGURI INSTITUTE OF TECHNOLOGY

SEMINAR ON :

DoS attack SEMINAR ON :


SOLAR FUELS

(Denial-Of-Service Attack)

BY :
Moinak sutradhar
BACHELOR OF COMPUTER APPLICATIONS
SEMINAR GUIDE :
MRS. TUMPA BANNERJEE
ASSISTANT PROFESSOR, BACHELOR OF COMPUTER APPLICATIONS

HIGHLIGHTS :
 INTRODUCTION TO DENIAL-OF-SERVICE ATTACK
 SCHEMATIC DIAGRAM OF DoS ATTACK.
 SYMPTOMS
 ATTACK TECHN IQUES
 ARCHITECTURE OF DDoS ATTACK
 DISTRIBUTED ATTACK
 DEFENSE TECHNIQUES
 LEGALITY
 CONCLUSION
INTRODUCTION :

 AN ATTEMPT TO MAKE A MACHINE OR NETWORK RESOURCE UNAVAILABLE.


 INTERRUPT OR SUSPEND SERVICES OF A HOST CONNECTED TO THE INTERNET.
 TARGET SITES ARE OFTEN HIGH PROFILE WEB-SERVERS SUCH AS BANKS.
 IT INVOLVES SIMULTANEOUS MULTI-THREADED ISO LAYER ATTACKS.
 IT PERSISTS OVER EXTENDED PERIODS.
 A WIDE ARRAY OF PROGRAMS ARE USED TO LAUNCH DoS ATTACK.
 IT INVOLVES THE INABILITY TO ACCESS ANY WEBSITE.
SCHEMATIC DIAGRAM :
SYMPTOMS OF DoS ATTACK :

 SLOW NETWORK PERFORMANCES.


 UNAVAILABILITY OF A PARTICULAR WEBSITE.
 INABILITY TO ACCESS ANY WEBSITE.
 DISCONNECTION OF A WIRELESS OR A WIRED INTERNET CONNECTION.
 LONG TERM DENIAL OF ACCESS TO THE WEB OR INTERNET SERVICES.
 DRAMATIC INCREASE IN THE NUMBER OF SPAM MAILS
ATTACK TECHNIQUES :

 ADVANCED PERSISTENT DoS (APDoS)


 APPLICATION LAYER FLOODS.
 DENIAL-OF-SERVICE LEVEL II
 DDoS EXTORTION
 HTTP POST DoS ATTACK
 NUKE
 PEER TO PEER ATTACKS
DEFENSE TECHNIQUES:

 APPLICATION FRONT END HARDWARE

 APPLICATION LEVEL KEY COMPLETION INDICATORS

 BLACKHOLING AND SINKHOLING

 DDS BASED DEFENSE

 FIREWALLS
LEGALITY :

 MANY JURISDICTION HAVE LAWS STATING DENIAL-OF-SERVICE AS ILLEGAL.

 CONSIDERED A FEDERAL CRIME UNDER COMPUTER FRAUD AND ABUSE ACT.

 CAN BE SENTENCED TO A PENALTY OF 10 YEARS IN PRISON.

 DoS ATTACK CONSIDERED AS AN EFFECTIVE PART OF CYBER-CRIME.


CONCLUSION :
 A MACHINE MAY BECOME A PART OF DDoS ATTACK WITH THE USER’S CONSENT.
 EXAMPLE : OPERATION PAYBACK
 TOOLS FOR DDoS INCLUDE : PREDATOR’S FACE AND ROLLING THUNDER.
 SIMPLE ATTACKS MAY APPEAR WITH A WIDE RANGE OF BLOCKED IP ADDRESSES.
 ROUTERS CAN BE OVERWHELMED UNDER DoS ATTACK BY MANUAL SETTINGS.
 SYN FLOODS OCCUR WHEN A HOST SENDS A FLOOD OF TCP/SYN PACKETS.
 DoS IS A PUNISHABLE OFFENCE UNDER MANY JURISDICTIONS.
I WOULD LIKE TO THANK :

 ALL TEACHERS

 MY CLASSMATES

 AND SPECIALLY, MY SEMINAR GUIDE MRS. TUMPA BANNERJEE, ASSISTANT PROFESSOR,


BACHELOR OF COMPUTER APPLICATIONS.

WHO HAVE SUPPORTED ME IN ALL POSSIBLE WAYS AND HELPED MY SEMINAR TO BE A SUCCESSFUL ONE.

THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy