SlideShare a Scribd company logo
1 of 15
CYBER SECURITY
Distributed Denial of Service Attacks
-:CREATED BY :-
ALAY MEHTA - 141080106011
SHIVANI PATEL- 141080106021
KAVIN RAVAL- 141080106026
KUNTAL SONI- 141080106028
Introduction
 What is a Denial of Service attack?
 Using up resources and / or bandwidth of a server in a malicious way to prevent
legitimate users from accessing its services.
 What is a DDoS?
 A DoS attack carried out using a large number of compromised systems improving its
potency and reducing traceability of the originator.
 Some common DoS methodologies
 SYN flood – exploits poor implementation of TCP in some OSs.
 Ping of Death – uses inherent weakness in IP fragmentation and reassembly
 Notorious DDoS attacks
 MyDoom
 Smurf attack
SYN Flood methodology
Ping of Death
 Maximum legal size of IP packets is 65535 bytes.
 Because of limitations in the physical layer, packets
may have to be fragmented and then reassembled at
the destination.
 A fragmented packet with the maximum offset and
size greater than 7 bytes will cause the server to
allocate a buffer of size > 65535 bytes.
Distributed DoS attacks
 Involves using some common DoS methodology, but
the attack is carried out from a large number of
machines
 IP spoofing is a common technique used in almost all
forms of attack.
 Botnets consist of a large number of “zombie”
machines controlled by a single user which can be
used to carry out all sorts of attacks (including DDoS)
 Network and protocol implementation loopholes can
also be used for launching such attacks
Distributed DoS attacks (contd.)
© Copyright 2008, WSTA, All Rights Reserved.
Techniques to mitigate
Security Threats
 Access Lists
 NAT
Access Lists
 Introduction
 Purpose of Access Lists
 Need for Access Lists
 Definition
 List of conditions
Attacks mitigated by ALs
 IP address spoofing
 DOS smurf attacks
 DOS sync attacks
 Filtering traceroute
Network Address
Translation
“Network Address Translation also
known as IP Masquerading or NAT, is an
Internet standard that enables
translation of IP addresses used
within one network to different IP
addresses known within another
network”
Need for NAT
 Shortage of IP addresses with protocol IPv4
-IP address is a unique 32 bit number
-100 million of hosts & 350 million of users
-NAT comes into picture requires only single
IP address to represent a group of computers.
Types of NAT
 Basic NAT :
Involves IP translation only - not port mapping
 PAT (Port Address Translation):
Involves translation of both IP addresses & port numbers.
a. SNAT : Translation of Source IP address & port number
b. DNAT: Translation of Destination IP address & port
number
NAT
Configuration
Cyber security PPT

More Related Content

What's hot

security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suiteYash Kotak
 
DDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT DevicesDDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT DevicesSeungjoo Kim
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Toolncct
 
Ip Guardian customer presentation
Ip Guardian customer presentationIp Guardian customer presentation
Ip Guardian customer presentationacaiani
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)Devolutions
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolIssar Kapadia
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
 
DDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT DevicesDDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT Devices
 
VPN
VPNVPN
VPN
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
 
Ip Guardian customer presentation
Ip Guardian customer presentationIp Guardian customer presentation
Ip Guardian customer presentation
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Securityic2
Securityic2Securityic2
Securityic2
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
DDOS
DDOSDDOS
DDOS
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Topic22
Topic22Topic22
Topic22
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 

Similar to Cyber security PPT

Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Gaurav Sharma
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introductionswang2010
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceVi Tính Hoàng Nam
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attackHTS Hosting
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddoskalyan kumar
 
denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designperfetbyedshareen
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacksHaltdos
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptxdawitTerefe5
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacksSaptha Wanniarachchi
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!PriyadharshiniHemaku
 
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdfMS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdfssuser262297
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threatSensePost
 

Similar to Cyber security PPT (20)

DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
 
Ddos
DdosDdos
Ddos
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive design
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptx
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacks
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
L1803046876
L1803046876L1803046876
L1803046876
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
 
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdfMS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threat
 

More from Kavin Raval

Valuation - professional prractice and valuation
Valuation - professional prractice and valuationValuation - professional prractice and valuation
Valuation - professional prractice and valuationKavin Raval
 
Retaining wall - design of reinforced concrete structure
Retaining wall - design of reinforced concrete structureRetaining wall - design of reinforced concrete structure
Retaining wall - design of reinforced concrete structureKavin Raval
 
Energy dissipation - irrigation engineering
Energy dissipation - irrigation engineeringEnergy dissipation - irrigation engineering
Energy dissipation - irrigation engineeringKavin Raval
 
Structure analysis PTT
Structure analysis PTTStructure analysis PTT
Structure analysis PTTKavin Raval
 
Soil mechanics PPT
Soil mechanics PPTSoil mechanics PPT
Soil mechanics PPTKavin Raval
 
Highway engineering PPT
Highway engineering PPTHighway engineering PPT
Highway engineering PPTKavin Raval
 
HYDROLOGY AND WATER RESOURCE MANAGMENT PPT
HYDROLOGY AND WATER RESOURCE MANAGMENT PPTHYDROLOGY AND WATER RESOURCE MANAGMENT PPT
HYDROLOGY AND WATER RESOURCE MANAGMENT PPTKavin Raval
 
Environmental engineering PPT
Environmental engineering PPTEnvironmental engineering PPT
Environmental engineering PPTKavin Raval
 
MILNE'S PREDICTOR CORRECTOR METHOD
MILNE'S PREDICTOR CORRECTOR METHODMILNE'S PREDICTOR CORRECTOR METHOD
MILNE'S PREDICTOR CORRECTOR METHODKavin Raval
 
FIELD ASTRONOMY SURVEYING
FIELD ASTRONOMY SURVEYINGFIELD ASTRONOMY SURVEYING
FIELD ASTRONOMY SURVEYINGKavin Raval
 
CONCRETE- ADVANTAGES,HISTORY,FUTURE TRENDS
CONCRETE- ADVANTAGES,HISTORY,FUTURE TRENDSCONCRETE- ADVANTAGES,HISTORY,FUTURE TRENDS
CONCRETE- ADVANTAGES,HISTORY,FUTURE TRENDSKavin Raval
 
LAND USE PLANNING CONSTRUCTION
LAND USE PLANNING CONSTRUCTIONLAND USE PLANNING CONSTRUCTION
LAND USE PLANNING CONSTRUCTIONKavin Raval
 
MARKET- CONCEPTS OF MARKET
MARKET- CONCEPTS OF MARKETMARKET- CONCEPTS OF MARKET
MARKET- CONCEPTS OF MARKETKavin Raval
 
Classification of soil
Classification of soilClassification of soil
Classification of soilKavin Raval
 
Computation of area
Computation of areaComputation of area
Computation of areaKavin Raval
 
SERIES SOLUTION OF ORDINARY DIFFERENTIALL EQUATION
SERIES SOLUTION OF ORDINARY DIFFERENTIALL EQUATIONSERIES SOLUTION OF ORDINARY DIFFERENTIALL EQUATION
SERIES SOLUTION OF ORDINARY DIFFERENTIALL EQUATIONKavin Raval
 
Shallow foundation
Shallow foundationShallow foundation
Shallow foundationKavin Raval
 
Buoyancy and floatation
Buoyancy and floatationBuoyancy and floatation
Buoyancy and floatationKavin Raval
 

More from Kavin Raval (20)

Valuation - professional prractice and valuation
Valuation - professional prractice and valuationValuation - professional prractice and valuation
Valuation - professional prractice and valuation
 
Retaining wall - design of reinforced concrete structure
Retaining wall - design of reinforced concrete structureRetaining wall - design of reinforced concrete structure
Retaining wall - design of reinforced concrete structure
 
Energy dissipation - irrigation engineering
Energy dissipation - irrigation engineeringEnergy dissipation - irrigation engineering
Energy dissipation - irrigation engineering
 
Structure analysis PTT
Structure analysis PTTStructure analysis PTT
Structure analysis PTT
 
Soil mechanics PPT
Soil mechanics PPTSoil mechanics PPT
Soil mechanics PPT
 
Highway engineering PPT
Highway engineering PPTHighway engineering PPT
Highway engineering PPT
 
HYDROLOGY AND WATER RESOURCE MANAGMENT PPT
HYDROLOGY AND WATER RESOURCE MANAGMENT PPTHYDROLOGY AND WATER RESOURCE MANAGMENT PPT
HYDROLOGY AND WATER RESOURCE MANAGMENT PPT
 
Environmental engineering PPT
Environmental engineering PPTEnvironmental engineering PPT
Environmental engineering PPT
 
MILNE'S PREDICTOR CORRECTOR METHOD
MILNE'S PREDICTOR CORRECTOR METHODMILNE'S PREDICTOR CORRECTOR METHOD
MILNE'S PREDICTOR CORRECTOR METHOD
 
FIELD ASTRONOMY SURVEYING
FIELD ASTRONOMY SURVEYINGFIELD ASTRONOMY SURVEYING
FIELD ASTRONOMY SURVEYING
 
ARCHES
ARCHESARCHES
ARCHES
 
CONCRETE- ADVANTAGES,HISTORY,FUTURE TRENDS
CONCRETE- ADVANTAGES,HISTORY,FUTURE TRENDSCONCRETE- ADVANTAGES,HISTORY,FUTURE TRENDS
CONCRETE- ADVANTAGES,HISTORY,FUTURE TRENDS
 
LAND USE PLANNING CONSTRUCTION
LAND USE PLANNING CONSTRUCTIONLAND USE PLANNING CONSTRUCTION
LAND USE PLANNING CONSTRUCTION
 
MARKET- CONCEPTS OF MARKET
MARKET- CONCEPTS OF MARKETMARKET- CONCEPTS OF MARKET
MARKET- CONCEPTS OF MARKET
 
Classification of soil
Classification of soilClassification of soil
Classification of soil
 
Computation of area
Computation of areaComputation of area
Computation of area
 
SERIES SOLUTION OF ORDINARY DIFFERENTIALL EQUATION
SERIES SOLUTION OF ORDINARY DIFFERENTIALL EQUATIONSERIES SOLUTION OF ORDINARY DIFFERENTIALL EQUATION
SERIES SOLUTION OF ORDINARY DIFFERENTIALL EQUATION
 
Shallow foundation
Shallow foundationShallow foundation
Shallow foundation
 
FRICTION
FRICTIONFRICTION
FRICTION
 
Buoyancy and floatation
Buoyancy and floatationBuoyancy and floatation
Buoyancy and floatation
 

Recently uploaded

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Cyber security PPT

  • 2. -:CREATED BY :- ALAY MEHTA - 141080106011 SHIVANI PATEL- 141080106021 KAVIN RAVAL- 141080106026 KUNTAL SONI- 141080106028
  • 3. Introduction  What is a Denial of Service attack?  Using up resources and / or bandwidth of a server in a malicious way to prevent legitimate users from accessing its services.  What is a DDoS?  A DoS attack carried out using a large number of compromised systems improving its potency and reducing traceability of the originator.  Some common DoS methodologies  SYN flood – exploits poor implementation of TCP in some OSs.  Ping of Death – uses inherent weakness in IP fragmentation and reassembly  Notorious DDoS attacks  MyDoom  Smurf attack
  • 5. Ping of Death  Maximum legal size of IP packets is 65535 bytes.  Because of limitations in the physical layer, packets may have to be fragmented and then reassembled at the destination.  A fragmented packet with the maximum offset and size greater than 7 bytes will cause the server to allocate a buffer of size > 65535 bytes.
  • 6. Distributed DoS attacks  Involves using some common DoS methodology, but the attack is carried out from a large number of machines  IP spoofing is a common technique used in almost all forms of attack.  Botnets consist of a large number of “zombie” machines controlled by a single user which can be used to carry out all sorts of attacks (including DDoS)  Network and protocol implementation loopholes can also be used for launching such attacks
  • 7. Distributed DoS attacks (contd.) © Copyright 2008, WSTA, All Rights Reserved.
  • 8. Techniques to mitigate Security Threats  Access Lists  NAT
  • 9. Access Lists  Introduction  Purpose of Access Lists  Need for Access Lists  Definition  List of conditions
  • 10. Attacks mitigated by ALs  IP address spoofing  DOS smurf attacks  DOS sync attacks  Filtering traceroute
  • 11. Network Address Translation “Network Address Translation also known as IP Masquerading or NAT, is an Internet standard that enables translation of IP addresses used within one network to different IP addresses known within another network”
  • 12. Need for NAT  Shortage of IP addresses with protocol IPv4 -IP address is a unique 32 bit number -100 million of hosts & 350 million of users -NAT comes into picture requires only single IP address to represent a group of computers.
  • 13. Types of NAT  Basic NAT : Involves IP translation only - not port mapping  PAT (Port Address Translation): Involves translation of both IP addresses & port numbers. a. SNAT : Translation of Source IP address & port number b. DNAT: Translation of Destination IP address & port number