• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
DoS or DDoS attack

DoS or DDoS attack






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds


Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    DoS or DDoS attack DoS or DDoS attack Presentation Transcript

    • DoS or DDoS AttackA red eye to Web ServicesPresented by...Tamal BiswasKousik LayekTridib Biswas
    • Module Index• What is DoS?• What is DDoS?• Recent attack on web.• Methods of attack.• Performing DoS attacks.• How do we know an attack is happening?• What to do if we are experiencing an attack?• How do we avoid being part of the problem?• Conclusion.
    • Denial of Services(DoS)Its an attack tomake a machine ornetwork resourceunavailable to itsintended users.
    • Denial of Services(DoS)BackIts an attack tomake a machine ornetwork resourceunavailable to itsintended users.
    • Distributed Denial-of-Service attackIts an attack to make amachine or networkresource unavailable to itsintended usersby using others computer.NetworkBack
    • A big-bang of DDoS attackThe internetaround thewhole world wasslowed down on27th march.Because thatday DDoS attacktook place withnear about 300Gbps.Back
    • Method of attack• ICMP flood• Teardrop attacks• Permanent denial-of-service attacks• Reflected / Spoofed attack• Low-rate Denial-of-Service attacks• Peer-to-peer attacks
    • Some best DoS attack method• ICMP flood:– Sends packets to all computer hosts rather than aspecific machine.• Teardrop attacks:– Fragmented over-sized pay-loads to be send tothe target machine.• Permanent denial-of-service attacks:– It may cause replacement of hardware also.Back
    • Performing DoS or DDoS Attack• A wide range of programs are used to launchDoS-attacks. Some of those are...JoltBubonicTargaBlastPantherCrazy Pinger
    • Some best DoS Attack tools• Jolt:– Finds exploit vulnerability in windows networking code.– Consumes 100% CPU time by sending heavy CPUconsuming packets.• LaTierra:– It sends TCP packets to more than one port number.• Nemsey:– generates random packets with random port number andfloods victim with it.Back
    • How do we know an attack is happening?• unusually slow network performance (openingfiles or accessing websites)• unavailability of a particular website• inability to access any website• dramatic increase in the amount of spam youreceive in your account
    • A common message after DoSBack
    • What to do if we are experiencing anattack?• contact your network administrators.• In case of home computer, consider contactingyour internet service provider (ISP).• Immediatly get disconnected from internet.Back
    • How do we avoid being part of theproblem?• Install and maintain anti-virus.• Install a firewall.• Configure the firewall to restrict incommingand outgoing traffic.• Follow good security practices for distributingyour email address.• Applying email filters may help you manageunwanted traffic.Back
    • Conclusion• Susceptibility to attacks could be alleviatedwith better Internet.• Don’t leave all the decision making to themachines.• Provide ‘intelligent’ support along the path.• Create “Hardened” networks.
    • Refferences• http://en.wikipedia.org/wiki/Denial-of-service_attack
    • Thank you...