SlideShare a Scribd company logo
1 of 15
Denial-of-Service (DoS)
Attack
Table of Contents
2
 A Denial-of-Service (DoS) Attack
 Web Servers
 Types of DoS Attacks
 More Information on Types of DoS
Attacks
 More Information on Types of DoS
Attacks (UDP Attacks)
 More Information on Types of DoS
Attacks (ICMP Attacks)
 More Information on Types of DoS
Attacks (Ping of Death)
 More Information on Types of DoS
Attacks (Slowloris)
 More Information on Types of DoS
Attacks (NTP Amplification)
 More Information on Types of DoS
Attacks (HTTP Flood)
 Conclusion
 This type of a cyberattack is aimed at shutting down a machine or a network, so
that it becomes inaccessible to its intended users. This is accomplished by either
flooding the target with traffic or by sending such information to it, which triggers a
crash. In either situation, a DoS attack ensures that the legitimate users (i.e.
employees, account holders or members) of a service or resource cannot access it
any longer. Such an attack makes online services unavailable to the end-user by
either suspending the servers or by interrupting their services.
 This kind of an attack is usually aimed at web servers of high-profile organizations
that are in the banking or commercial sector as well as media agencies and
government organizations along with trade organizations. A DoS attack might not
lead to any loss or theft of significant information but it is harmful as it can make its
victim lose a significant amount of time and money to resolve this issue.
3
A Denial-of-Service (DoS) Attack
YELLOW
 In the context of discussing a DoS attack or any other cyberattack, it becomes
imperative to understand the most basic information about web servers. A web
server stores as well as makes available all the files that are needed to make
any website and web page accessible over the Internet. Web hosting companies
offer various plans to lease these web servers. These companies provide the
technology along with server space and other related services to ensure that
these websites remain accessible consistently. One might come across terms such
as “Windows Hosting”, “Cloud Hosting” and “Web Hosting”, which all refer to
hosting services.
Web Servers
4
Types of DoS Attacks
 DoS attacks can be of different types which have been
mentioned below, in no particular order.
 UDP attacks
 HTTP flood
 ICMP attacks
 Protocol attacks
 Volume-based attacks
 Application-layer attacks
 Ping of death
 Slowloris
 NTP application
5
More Information on Types of DoS
Attacks6
Three of the above-mentioned types of DoS attacks have been touched upon in brief here.
 DoS attacks based on the protocol: Its goal is to consume the resources of real servers or the
component implemented which are meant for intermediate communication such as load balancer
and firewall. Its transmission rate is measured in packets per second. Ping of Death, SYN floods,
Smurf denial of services and fragmented packet attacks, are examples of this type of an attack.
 DoS attacks based on volume: This attack aims to saturate the bandwidth of the affected site.
Its magnitude is calibrated in bits per second. This type of an attack includes spoof-packet flood,
ICMP flood and UDP flood.
 DoS attacks on the application layer: This type of an attack ensures that the web server breaks
down. It is measured in request per second and has specific targets such as Apache, OpenBSD
and Windows. The examples of this type of an attack are GET/POST floods and Low-and-Slow
attacks.
More Information on Types of DoS
Attacks (UDP Attacks)
7
UDP flood attacks are meant to target as well as flood random ports on the remote
host. The host continuously keeps checking for the application ports. When no port is
found, it leaves a reply with ICMP, which is destination unreachable packet
message. This affects the host resources and results in inaccessibility of services. As
is evident from the name itself, it attacks and affects the host with User Datagram
Protocol packets (UDP).
More Information on Types of DoS
Attacks (ICMP Attacks)
8
An Internet Control Message Protocol (ICMP) attack consumes both incoming and outgoing
bandwidth. This happens because all the affected servers will attempt frequently to react with
ICMP echo reply packets. This results in either shutdown or slowing down of the entire system. It is
similar to a UDP attack but if affects the target with ICMP echo request packets, which are sent at
a high transmission rate rather than waiting for any reply. In it, an attacker attempts to overwhelm
a targeted device with ICMP echo-requests (pings).
In normal circumstances, ICMP echo-request and echo-reply messages are used to ping a network
device. This is done to diagnose the health and connectivity of the device as well as the connection
between the sender and the device. When the target is flooded with request packets, the network
is forced to respond with an equal number of reply packets. This results in the target becoming
inaccessible to normal traffic.
Custom tools or codes are involved in other types of ICMP request attacks.
More Information on Types of DoS
Attacks (Ping of Death)
9
In this type of an attack there is a continuous transmission of malfunctioned or malicious pings to the
server. 65535 bytes is the maximum packet length of the IP packet, including the header. The data link
layer has a limit of maximum frame size at 1500 bytes over an Ethernet. In this kind of a scenario, a
maximum IP packet is segmented across multiple IP fragments. The receiving host possesses the IP
packets or fragments to complete the entire IP.
The malware manipulates the fragment data. This leads to recipient packets which are higher than
65535 bytes, when reassembled. This can be an overwhelming volume for the memory space that had
been allocated for the packet. Hence, it results in denial of service for even those packets which are
real and legitimate.
More Information on Types of DoS
Attacks (Slowloris)
10
It is a type of DoS attack in which a single machine can take down the web server of another
machine. It is achieved with minimal bandwidth as well as side effects, on unrelated services
and ports. This type of an attack tries to keep open several connections to the web server that
is the target. It tries to keep them open for as long as it can be possible. This is achieved by it
by opening connections and sending a partial request to the target web server. It sends HTTP
headers subsequently and periodically, which add to the request but never complete it. These
connections will be kept open by those servers that are affected, which will fill their pool of
concurrent connection to the maximum level. This will eventually result in denying additional
connection attempts from the clients and cause a slowing down of the entire system.
11
1-800-123 -8156
Whoa! That’s a big number, aren’t you proud?
More Information on Types of DoS Attacks
(NTP Amplification)
In it, the publically-accessible Network Time Protocol (NTP) servers are exploited by
the attacker. That is done to overwhelm the targeted server with User Datagram
Protocol (UDP) traffic. NTP is one of the oldest network protocols. This type of an
attack is essentially a reflection attack. A reflection attack involves obtaining a
response from a server to a spoofed IP address. In NTP Amplification attack, the
attacker sends a packet that has a forged IP address, which is that of the victim’s. The
server then replies to this address. When reflection attacks are amplified, as is in this
case, it can be very dangerous as it ensures obtaining a server response that is not at
all proportionate to the original packet request that was sent.
In this kind of an attack, the query-to-response ratio lies in between 20:1 and 200:1
or even more, which ensures that any attacker who has a list of open NTP servers can
easily produce a disastrously high-bandwidth, high-volume attack.
More Information on Types of DoS Attacks
(HTTP Flood)
HTTP flooding attacks are specifically designed for their particular target. This makes
it much harder to uncover and block these. Since these attacks make use of standard
URL requests, HTTP flooding attacks are almost indistinguishable from authentic traffic.
In this kind of an attack, seemingly legitimate HTTP GET or POST requests are utilized
to attack a web server or even a web application. In comparison to other types of
attacks, it consumes minimum bandwidth to slow down its target web server or
application.
Conclusion
The information provided here makes it very well evident that how a Denial-of-Service
(DoS) attack can pose a threat to web servers as well as applications. Hence, it is
extremely crucial to take proper steps to make sure that every safety measure is
implemented to avert such an attack or minimize its changes of occurring.
15
Thanks!
ANY QUESTIONS?
You can find me at:
www.htshosting.org
www.htshosting.org/best-web-hosting-company-India
www.htshosting.org/best-windows-hosting
www.htshosting.org/best-cloud-hosting-company
support@htshosting.org

More Related Content

What's hot

AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSAN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSIJNSA Journal
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation TechniquesIntruGuard
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSSuzanne Aldrich
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1InfoSec Girls
 
Entropy based DDos Detection in SDN
Entropy based DDos Detection in SDNEntropy based DDos Detection in SDN
Entropy based DDos Detection in SDNVishal Vasudev
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicState of the Internet
 
Monitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a lanMonitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a laneSAT Publishing House
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackAhmed Ghazey
 
Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017Suzanne Aldrich
 
BADCamp 2017 - Anatomy of DDoS
BADCamp 2017 - Anatomy of DDoSBADCamp 2017 - Anatomy of DDoS
BADCamp 2017 - Anatomy of DDoSSuzanne Aldrich
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleHimani Singh
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attackschris zlatis
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct doxBaig Mirza
 
Ntp in Amplification Inferno
Ntp in Amplification InfernoNtp in Amplification Inferno
Ntp in Amplification InfernoSriram Krishnan
 
Chapter 04
Chapter 04Chapter 04
Chapter 04cclay3
 
The Anatomy of DDoS Attacks
The Anatomy of DDoS AttacksThe Anatomy of DDoS Attacks
The Anatomy of DDoS AttacksAcquia
 
Quantifying the impact of flood attack on
Quantifying the impact of flood attack onQuantifying the impact of flood attack on
Quantifying the impact of flood attack onijcsa
 

What's hot (20)

DDos
DDosDDos
DDos
 
Ddos
DdosDdos
Ddos
 
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSAN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1
 
Entropy based DDos Detection in SDN
Entropy based DDos Detection in SDNEntropy based DDos Detection in SDN
Entropy based DDos Detection in SDN
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - Infographic
 
Monitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a lanMonitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a lan
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017
 
BADCamp 2017 - Anatomy of DDoS
BADCamp 2017 - Anatomy of DDoSBADCamp 2017 - Anatomy of DDoS
BADCamp 2017 - Anatomy of DDoS
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 example
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
 
Drdos
DrdosDrdos
Drdos
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct dox
 
Ntp in Amplification Inferno
Ntp in Amplification InfernoNtp in Amplification Inferno
Ntp in Amplification Inferno
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
The Anatomy of DDoS Attacks
The Anatomy of DDoS AttacksThe Anatomy of DDoS Attacks
The Anatomy of DDoS Attacks
 
Quantifying the impact of flood attack on
Quantifying the impact of flood attack onQuantifying the impact of flood attack on
Quantifying the impact of flood attack on
 

Similar to Denial of-service (do s) attack

12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacksHaltdos
 
Using the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdfUsing the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdffms12345
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Gaurav Sharma
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...IJNSA Journal
 
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdfMS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdfssuser262297
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxmadlynplamondon
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year projectAmeya Vashishth
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introductionswang2010
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS IJITCA Journal
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Mumbai Academisc
 
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET Journal
 
Whitepaper on DDoS Mitigation
Whitepaper on DDoS MitigationWhitepaper on DDoS Mitigation
Whitepaper on DDoS MitigationGaurav Bhatia
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMcscpconf
 

Similar to Denial of-service (do s) attack (20)

12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
114331707
114331707114331707
114331707
 
Using the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdfUsing the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdf
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdfMS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
 
Dos.pptx
Dos.pptxDos.pptx
Dos.pptx
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...
 
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
 
L1803046876
L1803046876L1803046876
L1803046876
 
Whitepaper on DDoS Mitigation
Whitepaper on DDoS MitigationWhitepaper on DDoS Mitigation
Whitepaper on DDoS Mitigation
 
A041201010
A041201010A041201010
A041201010
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
 

More from HTS Hosting

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress HostingHTS Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingHTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated ServersHTS Hosting
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server PlansHTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated ServersHTS Hosting
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting SolutionsHTS Hosting
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager SetupHTS Hosting
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting PlansHTS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingHTS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreHTS Hosting
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business WebsiteHTS Hosting
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting TermsHTS Hosting
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersHTS Hosting
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingHTS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball ContentsHTS Hosting
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated ServersHTS Hosting
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans HTS Hosting
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansHTS Hosting
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting ServicesHTS Hosting
 

More from HTS Hosting (20)

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server Plans
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting Solutions
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager Setup
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting Plans
 
VPS Hosting
VPS HostingVPS Hosting
VPS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and More
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business Website
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting Terms
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web Servers
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball Contents
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated Servers
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting Plans
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

Denial of-service (do s) attack

  • 2. Table of Contents 2  A Denial-of-Service (DoS) Attack  Web Servers  Types of DoS Attacks  More Information on Types of DoS Attacks  More Information on Types of DoS Attacks (UDP Attacks)  More Information on Types of DoS Attacks (ICMP Attacks)  More Information on Types of DoS Attacks (Ping of Death)  More Information on Types of DoS Attacks (Slowloris)  More Information on Types of DoS Attacks (NTP Amplification)  More Information on Types of DoS Attacks (HTTP Flood)  Conclusion
  • 3.  This type of a cyberattack is aimed at shutting down a machine or a network, so that it becomes inaccessible to its intended users. This is accomplished by either flooding the target with traffic or by sending such information to it, which triggers a crash. In either situation, a DoS attack ensures that the legitimate users (i.e. employees, account holders or members) of a service or resource cannot access it any longer. Such an attack makes online services unavailable to the end-user by either suspending the servers or by interrupting their services.  This kind of an attack is usually aimed at web servers of high-profile organizations that are in the banking or commercial sector as well as media agencies and government organizations along with trade organizations. A DoS attack might not lead to any loss or theft of significant information but it is harmful as it can make its victim lose a significant amount of time and money to resolve this issue. 3 A Denial-of-Service (DoS) Attack
  • 4. YELLOW  In the context of discussing a DoS attack or any other cyberattack, it becomes imperative to understand the most basic information about web servers. A web server stores as well as makes available all the files that are needed to make any website and web page accessible over the Internet. Web hosting companies offer various plans to lease these web servers. These companies provide the technology along with server space and other related services to ensure that these websites remain accessible consistently. One might come across terms such as “Windows Hosting”, “Cloud Hosting” and “Web Hosting”, which all refer to hosting services. Web Servers 4
  • 5. Types of DoS Attacks  DoS attacks can be of different types which have been mentioned below, in no particular order.  UDP attacks  HTTP flood  ICMP attacks  Protocol attacks  Volume-based attacks  Application-layer attacks  Ping of death  Slowloris  NTP application 5
  • 6. More Information on Types of DoS Attacks6 Three of the above-mentioned types of DoS attacks have been touched upon in brief here.  DoS attacks based on the protocol: Its goal is to consume the resources of real servers or the component implemented which are meant for intermediate communication such as load balancer and firewall. Its transmission rate is measured in packets per second. Ping of Death, SYN floods, Smurf denial of services and fragmented packet attacks, are examples of this type of an attack.  DoS attacks based on volume: This attack aims to saturate the bandwidth of the affected site. Its magnitude is calibrated in bits per second. This type of an attack includes spoof-packet flood, ICMP flood and UDP flood.  DoS attacks on the application layer: This type of an attack ensures that the web server breaks down. It is measured in request per second and has specific targets such as Apache, OpenBSD and Windows. The examples of this type of an attack are GET/POST floods and Low-and-Slow attacks.
  • 7. More Information on Types of DoS Attacks (UDP Attacks) 7 UDP flood attacks are meant to target as well as flood random ports on the remote host. The host continuously keeps checking for the application ports. When no port is found, it leaves a reply with ICMP, which is destination unreachable packet message. This affects the host resources and results in inaccessibility of services. As is evident from the name itself, it attacks and affects the host with User Datagram Protocol packets (UDP).
  • 8. More Information on Types of DoS Attacks (ICMP Attacks) 8 An Internet Control Message Protocol (ICMP) attack consumes both incoming and outgoing bandwidth. This happens because all the affected servers will attempt frequently to react with ICMP echo reply packets. This results in either shutdown or slowing down of the entire system. It is similar to a UDP attack but if affects the target with ICMP echo request packets, which are sent at a high transmission rate rather than waiting for any reply. In it, an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings). In normal circumstances, ICMP echo-request and echo-reply messages are used to ping a network device. This is done to diagnose the health and connectivity of the device as well as the connection between the sender and the device. When the target is flooded with request packets, the network is forced to respond with an equal number of reply packets. This results in the target becoming inaccessible to normal traffic. Custom tools or codes are involved in other types of ICMP request attacks.
  • 9. More Information on Types of DoS Attacks (Ping of Death) 9 In this type of an attack there is a continuous transmission of malfunctioned or malicious pings to the server. 65535 bytes is the maximum packet length of the IP packet, including the header. The data link layer has a limit of maximum frame size at 1500 bytes over an Ethernet. In this kind of a scenario, a maximum IP packet is segmented across multiple IP fragments. The receiving host possesses the IP packets or fragments to complete the entire IP. The malware manipulates the fragment data. This leads to recipient packets which are higher than 65535 bytes, when reassembled. This can be an overwhelming volume for the memory space that had been allocated for the packet. Hence, it results in denial of service for even those packets which are real and legitimate.
  • 10. More Information on Types of DoS Attacks (Slowloris) 10 It is a type of DoS attack in which a single machine can take down the web server of another machine. It is achieved with minimal bandwidth as well as side effects, on unrelated services and ports. This type of an attack tries to keep open several connections to the web server that is the target. It tries to keep them open for as long as it can be possible. This is achieved by it by opening connections and sending a partial request to the target web server. It sends HTTP headers subsequently and periodically, which add to the request but never complete it. These connections will be kept open by those servers that are affected, which will fill their pool of concurrent connection to the maximum level. This will eventually result in denying additional connection attempts from the clients and cause a slowing down of the entire system.
  • 11. 11 1-800-123 -8156 Whoa! That’s a big number, aren’t you proud?
  • 12. More Information on Types of DoS Attacks (NTP Amplification) In it, the publically-accessible Network Time Protocol (NTP) servers are exploited by the attacker. That is done to overwhelm the targeted server with User Datagram Protocol (UDP) traffic. NTP is one of the oldest network protocols. This type of an attack is essentially a reflection attack. A reflection attack involves obtaining a response from a server to a spoofed IP address. In NTP Amplification attack, the attacker sends a packet that has a forged IP address, which is that of the victim’s. The server then replies to this address. When reflection attacks are amplified, as is in this case, it can be very dangerous as it ensures obtaining a server response that is not at all proportionate to the original packet request that was sent. In this kind of an attack, the query-to-response ratio lies in between 20:1 and 200:1 or even more, which ensures that any attacker who has a list of open NTP servers can easily produce a disastrously high-bandwidth, high-volume attack.
  • 13. More Information on Types of DoS Attacks (HTTP Flood) HTTP flooding attacks are specifically designed for their particular target. This makes it much harder to uncover and block these. Since these attacks make use of standard URL requests, HTTP flooding attacks are almost indistinguishable from authentic traffic. In this kind of an attack, seemingly legitimate HTTP GET or POST requests are utilized to attack a web server or even a web application. In comparison to other types of attacks, it consumes minimum bandwidth to slow down its target web server or application.
  • 14. Conclusion The information provided here makes it very well evident that how a Denial-of-Service (DoS) attack can pose a threat to web servers as well as applications. Hence, it is extremely crucial to take proper steps to make sure that every safety measure is implemented to avert such an attack or minimize its changes of occurring.
  • 15. 15 Thanks! ANY QUESTIONS? You can find me at: www.htshosting.org www.htshosting.org/best-web-hosting-company-India www.htshosting.org/best-windows-hosting www.htshosting.org/best-cloud-hosting-company support@htshosting.org