Your SlideShare is downloading. ×
DoS or DDoS attack
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

DoS or DDoS attack

976

Published on

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
976
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
78
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. DoS or DDoS AttackA red eye to Web ServicesPresented by...Tamal BiswasKousik LayekTridib Biswas
  • 2. Module Index• What is DoS?• What is DDoS?• Recent attack on web.• Methods of attack.• Performing DoS attacks.• How do we know an attack is happening?• What to do if we are experiencing an attack?• How do we avoid being part of the problem?• Conclusion.
  • 3. Denial of Services(DoS)Its an attack tomake a machine ornetwork resourceunavailable to itsintended users.
  • 4. Denial of Services(DoS)BackIts an attack tomake a machine ornetwork resourceunavailable to itsintended users.
  • 5. Distributed Denial-of-Service attackIts an attack to make amachine or networkresource unavailable to itsintended usersby using others computer.NetworkBack
  • 6. A big-bang of DDoS attackThe internetaround thewhole world wasslowed down on27th march.Because thatday DDoS attacktook place withnear about 300Gbps.Back
  • 7. Method of attack• ICMP flood• Teardrop attacks• Permanent denial-of-service attacks• Reflected / Spoofed attack• Low-rate Denial-of-Service attacks• Peer-to-peer attacks
  • 8. Some best DoS attack method• ICMP flood:– Sends packets to all computer hosts rather than aspecific machine.• Teardrop attacks:– Fragmented over-sized pay-loads to be send tothe target machine.• Permanent denial-of-service attacks:– It may cause replacement of hardware also.Back
  • 9. Performing DoS or DDoS Attack• A wide range of programs are used to launchDoS-attacks. Some of those are...JoltBubonicTargaBlastPantherCrazy Pinger
  • 10. Some best DoS Attack tools• Jolt:– Finds exploit vulnerability in windows networking code.– Consumes 100% CPU time by sending heavy CPUconsuming packets.• LaTierra:– It sends TCP packets to more than one port number.• Nemsey:– generates random packets with random port number andfloods victim with it.Back
  • 11. How do we know an attack is happening?• unusually slow network performance (openingfiles or accessing websites)• unavailability of a particular website• inability to access any website• dramatic increase in the amount of spam youreceive in your account
  • 12. A common message after DoSBack
  • 13. What to do if we are experiencing anattack?• contact your network administrators.• In case of home computer, consider contactingyour internet service provider (ISP).• Immediatly get disconnected from internet.Back
  • 14. How do we avoid being part of theproblem?• Install and maintain anti-virus.• Install a firewall.• Configure the firewall to restrict incommingand outgoing traffic.• Follow good security practices for distributingyour email address.• Applying email filters may help you manageunwanted traffic.Back
  • 15. Conclusion• Susceptibility to attacks could be alleviatedwith better Internet.• Don’t leave all the decision making to themachines.• Provide ‘intelligent’ support along the path.• Create “Hardened” networks.
  • 16. Refferences• http://en.wikipedia.org/wiki/Denial-of-service_attack
  • 17. Thank you...

×