DoS or DDoS attack

1,608
-1

Published on

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,608
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
129
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

DoS or DDoS attack

  1. 1. DoS or DDoS AttackA red eye to Web ServicesPresented by...Tamal BiswasKousik LayekTridib Biswas
  2. 2. Module Index• What is DoS?• What is DDoS?• Recent attack on web.• Methods of attack.• Performing DoS attacks.• How do we know an attack is happening?• What to do if we are experiencing an attack?• How do we avoid being part of the problem?• Conclusion.
  3. 3. Denial of Services(DoS)Its an attack tomake a machine ornetwork resourceunavailable to itsintended users.
  4. 4. Denial of Services(DoS)BackIts an attack tomake a machine ornetwork resourceunavailable to itsintended users.
  5. 5. Distributed Denial-of-Service attackIts an attack to make amachine or networkresource unavailable to itsintended usersby using others computer.NetworkBack
  6. 6. A big-bang of DDoS attackThe internetaround thewhole world wasslowed down on27th march.Because thatday DDoS attacktook place withnear about 300Gbps.Back
  7. 7. Method of attack• ICMP flood• Teardrop attacks• Permanent denial-of-service attacks• Reflected / Spoofed attack• Low-rate Denial-of-Service attacks• Peer-to-peer attacks
  8. 8. Some best DoS attack method• ICMP flood:– Sends packets to all computer hosts rather than aspecific machine.• Teardrop attacks:– Fragmented over-sized pay-loads to be send tothe target machine.• Permanent denial-of-service attacks:– It may cause replacement of hardware also.Back
  9. 9. Performing DoS or DDoS Attack• A wide range of programs are used to launchDoS-attacks. Some of those are...JoltBubonicTargaBlastPantherCrazy Pinger
  10. 10. Some best DoS Attack tools• Jolt:– Finds exploit vulnerability in windows networking code.– Consumes 100% CPU time by sending heavy CPUconsuming packets.• LaTierra:– It sends TCP packets to more than one port number.• Nemsey:– generates random packets with random port number andfloods victim with it.Back
  11. 11. How do we know an attack is happening?• unusually slow network performance (openingfiles or accessing websites)• unavailability of a particular website• inability to access any website• dramatic increase in the amount of spam youreceive in your account
  12. 12. A common message after DoSBack
  13. 13. What to do if we are experiencing anattack?• contact your network administrators.• In case of home computer, consider contactingyour internet service provider (ISP).• Immediatly get disconnected from internet.Back
  14. 14. How do we avoid being part of theproblem?• Install and maintain anti-virus.• Install a firewall.• Configure the firewall to restrict incommingand outgoing traffic.• Follow good security practices for distributingyour email address.• Applying email filters may help you manageunwanted traffic.Back
  15. 15. Conclusion• Susceptibility to attacks could be alleviatedwith better Internet.• Don’t leave all the decision making to themachines.• Provide ‘intelligent’ support along the path.• Create “Hardened” networks.
  16. 16. Refferences• http://en.wikipedia.org/wiki/Denial-of-service_attack
  17. 17. Thank you...

×