DoS or DDoS AttackA red eye to Web ServicesPresented by...Tamal BiswasKousik LayekTridib Biswas
Module Index• What is DoS?• What is DDoS?• Recent attack on web.• Methods of attack.• Performing DoS attacks.• How do we know an attack is happening?• What to do if we are experiencing an attack?• How do we avoid being part of the problem?• Conclusion.
Denial of Services(DoS)Its an attack tomake a machine ornetwork resourceunavailable to itsintended users.
Denial of Services(DoS)BackIts an attack tomake a machine ornetwork resourceunavailable to itsintended users.
Distributed Denial-of-Service attackIts an attack to make amachine or networkresource unavailable to itsintended usersby using others computer.NetworkBack
A big-bang of DDoS attackThe internetaround thewhole world wasslowed down on27th march.Because thatday DDoS attacktook place withnear about 300Gbps.Back
Some best DoS attack method• ICMP flood:– Sends packets to all computer hosts rather than aspecific machine.• Teardrop attacks:– Fragmented over-sized pay-loads to be send tothe target machine.• Permanent denial-of-service attacks:– It may cause replacement of hardware also.Back
Performing DoS or DDoS Attack• A wide range of programs are used to launchDoS-attacks. Some of those are...JoltBubonicTargaBlastPantherCrazy Pinger
Some best DoS Attack tools• Jolt:– Finds exploit vulnerability in windows networking code.– Consumes 100% CPU time by sending heavy CPUconsuming packets.• LaTierra:– It sends TCP packets to more than one port number.• Nemsey:– generates random packets with random port number andfloods victim with it.Back
How do we know an attack is happening?• unusually slow network performance (openingfiles or accessing websites)• unavailability of a particular website• inability to access any website• dramatic increase in the amount of spam youreceive in your account
What to do if we are experiencing anattack?• contact your network administrators.• In case of home computer, consider contactingyour internet service provider (ISP).• Immediatly get disconnected from internet.Back
How do we avoid being part of theproblem?• Install and maintain anti-virus.• Install a firewall.• Configure the firewall to restrict incommingand outgoing traffic.• Follow good security practices for distributingyour email address.• Applying email filters may help you manageunwanted traffic.Back
Conclusion• Susceptibility to attacks could be alleviatedwith better Internet.• Don’t leave all the decision making to themachines.• Provide ‘intelligent’ support along the path.• Create “Hardened” networks.