SlideShare a Scribd company logo
1 of 3
Case Study: The Distributed Denial of Service Attack
A recently distributed denial of service attack (DDoS) against a
large DNS service provider showed the weaknesses inherent in
the Internet domain name system. On October 21, 2016, during
the early morning hours, users on the East Coast found
difficulty in connecting with Amazon.com, Wired.com, the New
York Times, and other websites. The issues stemmed from the
inability to lookup the IP addresses of these websites from the
large DNS infrastructure company “DYN,” located in New
Hampshire. DNS is the phonebook for the Internet, allowing
computers to change a human readable name such as
“Amazon.com,” seen in the web browser, to a machine-readable
IP address, which in turn is used to connect to the remote server
by the local computer. Without the ability to lookup names and
convert them to routable IP addresses, the human user would
have to enter in the IP address by hand number by number, and
thus destroy the usability of the Internet. This attack had three
waves: the first at 7 a.m. EST, then early noon, and again at 4
p.m. EST. What was of interest was the size of the waves of
attacks numbering in the tens of millions of devices sending
numerous connections as well as the sources—webcams and
DVRs. What had been unleashed by malicious actors was a
botnet virus that targeted the Internet of Things devices (i.e.,
home security systems webcams, DVRs, and other “things”),
which the owners left set to their default passwords. Once the
botnet virus, called “Mirai,” had spread throughout home user’s
network, all was ready for the call to attack by the command
and control server against any target the hackers wanted. The
“DYN” attack and similar outages brings into focus three areas
of concern to the security professional: legacy protocols (DNS)
that were not designed with security as an integral aspect; the
lack of accountability of service providers who transport
malware and attack traffic; and finally, lack of responsibility by
manufacturers and users to secure devices that have the
potential to massively compromise our daily life.
The case is based on Newman, L. H. (2016, October 21). What
We Know About Friday’s Massive East Coast Internet Outage.
Retrieved November 22, 2016, from https://www.wired.com/
2016/10/internet-outage-ddos-dns-dyn/.
1. Describe a layered security approach that would prevent
such a DDoS attack.
2. What measure could have allowed earlier detection of such
an attack from the service provider and home networks?
With PGP, Phil Zimmermann experienced resistance from the
U.S. government before being allowed to distribute it. Do an
Internet search to find additional information about
Zimmermann's case. Then, in a 1- to 2-page group report,
perform the following:
Provide at least three reasons for this resistance.
Provide references for each of the three reasons that justify the
concerns of the government as legitimate.
Identify the individual contributions of each member of the
group.
Your report should be written in APA style.
Case Study The Distributed Denial of Service AttackA recently

More Related Content

More from MorganLudwig40

For the final Portfolio Project, create a presentation about an even.docx
For the final Portfolio Project, create a presentation about an even.docxFor the final Portfolio Project, create a presentation about an even.docx
For the final Portfolio Project, create a presentation about an even.docx
MorganLudwig40
 
For the final Portfolio Project, write a paper about an event in a p.docx
For the final Portfolio Project, write a paper about an event in a p.docxFor the final Portfolio Project, write a paper about an event in a p.docx
For the final Portfolio Project, write a paper about an event in a p.docx
MorganLudwig40
 
FOR SKYESSAYSFor the Final Project, you will assume the role of .docx
FOR SKYESSAYSFor the Final Project, you will assume the role of .docxFOR SKYESSAYSFor the Final Project, you will assume the role of .docx
FOR SKYESSAYSFor the Final Project, you will assume the role of .docx
MorganLudwig40
 
For Professor2013DetailsCombine all elements completed in previ.docx
For Professor2013DetailsCombine all elements completed in previ.docxFor Professor2013DetailsCombine all elements completed in previ.docx
For Professor2013DetailsCombine all elements completed in previ.docx
MorganLudwig40
 
For professor2013DetailsCombine all elements completed in pre.docx
For professor2013DetailsCombine all elements completed in pre.docxFor professor2013DetailsCombine all elements completed in pre.docx
For professor2013DetailsCombine all elements completed in pre.docx
MorganLudwig40
 
For Prof. Goodman!Global Economic Environment Course A.docx
For Prof. Goodman!Global Economic Environment Course A.docxFor Prof. Goodman!Global Economic Environment Course A.docx
For Prof. Goodman!Global Economic Environment Course A.docx
MorganLudwig40
 
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docx
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docxFor Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docx
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docx
MorganLudwig40
 
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docx
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docxFor Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docx
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docx
MorganLudwig40
 
For every historical figure known for making significant, if not rev.docx
For every historical figure known for making significant, if not rev.docxFor every historical figure known for making significant, if not rev.docx
For every historical figure known for making significant, if not rev.docx
MorganLudwig40
 
For each module’sActiveLearningDiscu.docx
For each module’sActiveLearningDiscu.docxFor each module’sActiveLearningDiscu.docx
For each module’sActiveLearningDiscu.docx
MorganLudwig40
 
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docx
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docxFollowing the Case Study 1 Malpractice Action brought by Yolanda Pi.docx
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docx
MorganLudwig40
 

More from MorganLudwig40 (20)

For the last question set up and diagram an Incident Command System .docx
For the last question set up and diagram an Incident Command System .docxFor the last question set up and diagram an Incident Command System .docx
For the last question set up and diagram an Incident Command System .docx
 
For the Final Project, you provide an in-depth analysis of schizophr.docx
For the Final Project, you provide an in-depth analysis of schizophr.docxFor the Final Project, you provide an in-depth analysis of schizophr.docx
For the Final Project, you provide an in-depth analysis of schizophr.docx
 
For the final Portfolio Project, create a presentation about an even.docx
For the final Portfolio Project, create a presentation about an even.docxFor the final Portfolio Project, create a presentation about an even.docx
For the final Portfolio Project, create a presentation about an even.docx
 
For the final Portfolio Project, write a paper about an event in a p.docx
For the final Portfolio Project, write a paper about an event in a p.docxFor the final Portfolio Project, write a paper about an event in a p.docx
For the final Portfolio Project, write a paper about an event in a p.docx
 
For the assignment attached, i need 3-4 pages of material added on t.docx
For the assignment attached, i need 3-4 pages of material added on t.docxFor the assignment attached, i need 3-4 pages of material added on t.docx
For the assignment attached, i need 3-4 pages of material added on t.docx
 
FOR SKYESSAYSFor the Final Project, you will assume the role of .docx
FOR SKYESSAYSFor the Final Project, you will assume the role of .docxFOR SKYESSAYSFor the Final Project, you will assume the role of .docx
FOR SKYESSAYSFor the Final Project, you will assume the role of .docx
 
For Professor2013DetailsCombine all elements completed in previ.docx
For Professor2013DetailsCombine all elements completed in previ.docxFor Professor2013DetailsCombine all elements completed in previ.docx
For Professor2013DetailsCombine all elements completed in previ.docx
 
For professor2013DetailsCombine all elements completed in pre.docx
For professor2013DetailsCombine all elements completed in pre.docxFor professor2013DetailsCombine all elements completed in pre.docx
For professor2013DetailsCombine all elements completed in pre.docx
 
For Prof. Stewart OnlyChpt 12200 word minimum for each questio.docx
For Prof. Stewart OnlyChpt 12200 word minimum for each questio.docxFor Prof. Stewart OnlyChpt 12200 word minimum for each questio.docx
For Prof. Stewart OnlyChpt 12200 word minimum for each questio.docx
 
For more than five decades, Robin M. Williams, Jr. served as profess.docx
For more than five decades, Robin M. Williams, Jr. served as profess.docxFor more than five decades, Robin M. Williams, Jr. served as profess.docx
For more than five decades, Robin M. Williams, Jr. served as profess.docx
 
For Part 2 of your MAP Clearly describe the desired outcome(s) from.docx
For Part 2 of your MAP Clearly describe the desired outcome(s) from.docxFor Part 2 of your MAP Clearly describe the desired outcome(s) from.docx
For Part 2 of your MAP Clearly describe the desired outcome(s) from.docx
 
For Prof. Goodman!Global Economic Environment Course A.docx
For Prof. Goodman!Global Economic Environment Course A.docxFor Prof. Goodman!Global Economic Environment Course A.docx
For Prof. Goodman!Global Economic Environment Course A.docx
 
FOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docx
FOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docxFOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docx
FOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docx
 
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docx
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docxFor Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docx
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docx
 
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docx
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docxFor Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docx
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docx
 
For informed consent to occur, there must be a shared decision-makin.docx
For informed consent to occur, there must be a shared decision-makin.docxFor informed consent to occur, there must be a shared decision-makin.docx
For informed consent to occur, there must be a shared decision-makin.docx
 
For each of the four variables listed above, identify the level of m.docx
For each of the four variables listed above, identify the level of m.docxFor each of the four variables listed above, identify the level of m.docx
For each of the four variables listed above, identify the level of m.docx
 
For every historical figure known for making significant, if not rev.docx
For every historical figure known for making significant, if not rev.docxFor every historical figure known for making significant, if not rev.docx
For every historical figure known for making significant, if not rev.docx
 
For each module’sActiveLearningDiscu.docx
For each module’sActiveLearningDiscu.docxFor each module’sActiveLearningDiscu.docx
For each module’sActiveLearningDiscu.docx
 
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docx
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docxFollowing the Case Study 1 Malpractice Action brought by Yolanda Pi.docx
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docx
 

Case Study The Distributed Denial of Service AttackA recently

  • 1. Case Study: The Distributed Denial of Service Attack A recently distributed denial of service attack (DDoS) against a large DNS service provider showed the weaknesses inherent in the Internet domain name system. On October 21, 2016, during the early morning hours, users on the East Coast found difficulty in connecting with Amazon.com, Wired.com, the New York Times, and other websites. The issues stemmed from the inability to lookup the IP addresses of these websites from the large DNS infrastructure company “DYN,” located in New Hampshire. DNS is the phonebook for the Internet, allowing computers to change a human readable name such as “Amazon.com,” seen in the web browser, to a machine-readable IP address, which in turn is used to connect to the remote server by the local computer. Without the ability to lookup names and convert them to routable IP addresses, the human user would have to enter in the IP address by hand number by number, and thus destroy the usability of the Internet. This attack had three waves: the first at 7 a.m. EST, then early noon, and again at 4 p.m. EST. What was of interest was the size of the waves of attacks numbering in the tens of millions of devices sending numerous connections as well as the sources—webcams and DVRs. What had been unleashed by malicious actors was a botnet virus that targeted the Internet of Things devices (i.e., home security systems webcams, DVRs, and other “things”), which the owners left set to their default passwords. Once the botnet virus, called “Mirai,” had spread throughout home user’s network, all was ready for the call to attack by the command and control server against any target the hackers wanted. The “DYN” attack and similar outages brings into focus three areas of concern to the security professional: legacy protocols (DNS) that were not designed with security as an integral aspect; the lack of accountability of service providers who transport malware and attack traffic; and finally, lack of responsibility by
  • 2. manufacturers and users to secure devices that have the potential to massively compromise our daily life. The case is based on Newman, L. H. (2016, October 21). What We Know About Friday’s Massive East Coast Internet Outage. Retrieved November 22, 2016, from https://www.wired.com/ 2016/10/internet-outage-ddos-dns-dyn/. 1. Describe a layered security approach that would prevent such a DDoS attack. 2. What measure could have allowed earlier detection of such an attack from the service provider and home networks? With PGP, Phil Zimmermann experienced resistance from the U.S. government before being allowed to distribute it. Do an Internet search to find additional information about Zimmermann's case. Then, in a 1- to 2-page group report, perform the following: Provide at least three reasons for this resistance. Provide references for each of the three reasons that justify the concerns of the government as legitimate. Identify the individual contributions of each member of the group. Your report should be written in APA style.