SlideShare a Scribd company logo
1 of 20
Common forms and remedies
Neeta Bhadane
Raunaq Nilekani
Sahasranshu
Introduction
 What is a Denial of Service attack?
 Using up resources and / or bandwidth of a server in a malicious way to prevent
legitimate users from accessing its services.
 What is a DDoS?
 A DoS attack carried out using a large number of compromised systems improving
its potency and reducing traceability of the originator.
 Some common DoS methodologies
 SYN flood – exploits poor implementation of TCP in some OSs.
 Ping of Death – uses inherent weakness in IP fragmentation and reassembly
 Notorious DDoS attacks
 MyDoom
 Smurf attack
SYN Flood methodology
Ping of Death
 Maximum legal size of IP packets is 65535 bytes.
 Because of limitations in the physical layer, packets
may have to be fragmented and then reassembled at
the destination.
 A fragmented packet with the maximum offset and
size greater than 7 bytes will cause the server to
allocate a buffer of size > 65535 bytes.
Distributed DoS attacks
 Involves using some common DoS methodology, but
the attack is carried out from a large number of
machines
 IP spoofing is a common technique used in almost all
forms of attack.
 Botnets consist of a large number of “zombie”
machines controlled by a single user which can be
used to carry out all sorts of attacks (including DDoS)
 Network and protocol implementation loopholes can
also be used for launching such attacks
Distributed DoS attacks (contd.)
© Copyright 2008, WSTA, All Rights Reserved.
Notorious Attacks
 Smurf attack:
 A simple C program which spoofs the targets IP address
and sends a broadcast ECHO (ICMP) message. All
machines receiving the broadcast message ping the
target machine, causing a massive DoS.
 MyDoom: Fastest spreading email worm. On execution,
opened a backdoor on the TCP 3127 port and could then
be used to run DDoS attacks on specific domains. The
affected domains were sco.com, microsoft.com, Google,
AltaVista and Lycos
Techniques to mitigate Security Threats
 Access Lists
 NAT
Access Lists
 Introduction
 Purpose of Access Lists
 Need for Access Lists
 Definition
 List of conditions
Detecting DOS attacks
 How to determine if your system is under attack?
 Show CPU utilization
 Access-lists implementation
Commands (some examples)
 access−list 111 permit ip 172.16.0.0 0.0.255.255 any
 access−list 111 deny ip any any log
 Interface serial 0/1
 ip access−group 111 out
Prevention of DOS attacks
 Cisco product ASA
 Will be demonstrated in the simulation
Attacks mitigated by ALs
 IP address spoofing
 DOS smurf attacks
 DOS sync attacks
 Filtering traceroute
Network Address Translation
“Network Address Translation also known as IP
Masquerading or NAT, is an Internet standard
that enables translation of IP addresses used
within one network to different IP addresses
known within another network”
Need for NAT
 Shortage of IP addresses with protocol IPv4
-IP address is a unique 32 bit number
-100 million of hosts & 350 million of users
-NAT comes into picture requires only single
IP address to represent a group of computers.
Types of NAT
 Basic NAT :
Involves IP translation only - not port mapping
 PAT (Port Address Translation):
Involves translation of both IP addresses & port numbers.
a. SNAT : Translation of Source IP address & port number
b. DNAT: Translation of Destination IP address & port number
NAT Configuration
NAT Security Capabilities
 Basic NAT acts as firewall between Internet & local Intranet,
protects Intranet from Denial of service attack.
 NAT routers having advanced firewall implements stateful
packet inspection which allows filtering of unnecessary data
like IP spoofing, SYN flooding from your router.
 NAT router supporting port forwarding keeps unwanted
traffic away from your local network.
References
 www.windowsecurity.com
 http://en.wikipedia.org
 Risk mitigation & threat management: compliance, security, and DDoS
prevention : by Andreas M. Antonopoulos and Johna Till Johnson
 http://computer.howstuffworks.com/nat.htm
 http://nislab.bu.edu/sc546/sc441Spring2003/NAT/index.htm
 http://en.wikipedia.org/wiki/Network_address_translation
 http://www.ipv6.com/articles/nat/NAT-In-Depth.htm
DDOS (1).ppt

More Related Content

Similar to DDOS (1).ppt

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptxdawitTerefe5
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddoskalyan kumar
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introductionswang2010
 
Innovation in Network Security
Innovation in Network Security Innovation in Network Security
Innovation in Network Security MoranLeven
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical HackerDavid Sweigert
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeMyNOG
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System AdminMD SAHABUDDIN
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacksHaltdos
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer AttacksArun Modi
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Gaurav Sharma
 
Networkin new
Networkin newNetworkin new
Networkin newrajujast
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year projectAmeya Vashishth
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosHaltdos
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 

Similar to DDOS (1).ppt (20)

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptx
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 
Innovation in Network Security
Innovation in Network Security Innovation in Network Security
Innovation in Network Security
 
L1803046876
L1803046876L1803046876
L1803046876
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
20320140501016
2032014050101620320140501016
20320140501016
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
DDoS.ppt
DDoS.pptDDoS.ppt
DDoS.ppt
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
Networkin new
Networkin newNetworkin new
Networkin new
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 

Recently uploaded

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 

Recently uploaded (20)

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 

DDOS (1).ppt

  • 1. Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu
  • 2. Introduction  What is a Denial of Service attack?  Using up resources and / or bandwidth of a server in a malicious way to prevent legitimate users from accessing its services.  What is a DDoS?  A DoS attack carried out using a large number of compromised systems improving its potency and reducing traceability of the originator.  Some common DoS methodologies  SYN flood – exploits poor implementation of TCP in some OSs.  Ping of Death – uses inherent weakness in IP fragmentation and reassembly  Notorious DDoS attacks  MyDoom  Smurf attack
  • 4. Ping of Death  Maximum legal size of IP packets is 65535 bytes.  Because of limitations in the physical layer, packets may have to be fragmented and then reassembled at the destination.  A fragmented packet with the maximum offset and size greater than 7 bytes will cause the server to allocate a buffer of size > 65535 bytes.
  • 5. Distributed DoS attacks  Involves using some common DoS methodology, but the attack is carried out from a large number of machines  IP spoofing is a common technique used in almost all forms of attack.  Botnets consist of a large number of “zombie” machines controlled by a single user which can be used to carry out all sorts of attacks (including DDoS)  Network and protocol implementation loopholes can also be used for launching such attacks
  • 6. Distributed DoS attacks (contd.) © Copyright 2008, WSTA, All Rights Reserved.
  • 7. Notorious Attacks  Smurf attack:  A simple C program which spoofs the targets IP address and sends a broadcast ECHO (ICMP) message. All machines receiving the broadcast message ping the target machine, causing a massive DoS.  MyDoom: Fastest spreading email worm. On execution, opened a backdoor on the TCP 3127 port and could then be used to run DDoS attacks on specific domains. The affected domains were sco.com, microsoft.com, Google, AltaVista and Lycos
  • 8. Techniques to mitigate Security Threats  Access Lists  NAT
  • 9. Access Lists  Introduction  Purpose of Access Lists  Need for Access Lists  Definition  List of conditions
  • 10. Detecting DOS attacks  How to determine if your system is under attack?  Show CPU utilization  Access-lists implementation
  • 11. Commands (some examples)  access−list 111 permit ip 172.16.0.0 0.0.255.255 any  access−list 111 deny ip any any log  Interface serial 0/1  ip access−group 111 out
  • 12. Prevention of DOS attacks  Cisco product ASA  Will be demonstrated in the simulation
  • 13. Attacks mitigated by ALs  IP address spoofing  DOS smurf attacks  DOS sync attacks  Filtering traceroute
  • 14. Network Address Translation “Network Address Translation also known as IP Masquerading or NAT, is an Internet standard that enables translation of IP addresses used within one network to different IP addresses known within another network”
  • 15. Need for NAT  Shortage of IP addresses with protocol IPv4 -IP address is a unique 32 bit number -100 million of hosts & 350 million of users -NAT comes into picture requires only single IP address to represent a group of computers.
  • 16. Types of NAT  Basic NAT : Involves IP translation only - not port mapping  PAT (Port Address Translation): Involves translation of both IP addresses & port numbers. a. SNAT : Translation of Source IP address & port number b. DNAT: Translation of Destination IP address & port number
  • 18. NAT Security Capabilities  Basic NAT acts as firewall between Internet & local Intranet, protects Intranet from Denial of service attack.  NAT routers having advanced firewall implements stateful packet inspection which allows filtering of unnecessary data like IP spoofing, SYN flooding from your router.  NAT router supporting port forwarding keeps unwanted traffic away from your local network.
  • 19. References  www.windowsecurity.com  http://en.wikipedia.org  Risk mitigation & threat management: compliance, security, and DDoS prevention : by Andreas M. Antonopoulos and Johna Till Johnson  http://computer.howstuffworks.com/nat.htm  http://nislab.bu.edu/sc546/sc441Spring2003/NAT/index.htm  http://en.wikipedia.org/wiki/Network_address_translation  http://www.ipv6.com/articles/nat/NAT-In-Depth.htm