SlideShare a Scribd company logo
Distributed Denial of
Service Attacks
NITIN BISHT
140231
CSE lll
1
o Introduction to DDoS
o How it Works
o Aim of DDoS Attack
o Types of DDoS
o DDoS Symptoms
o DDoS Mitigation
o Famous DDoS Attacks
Table of Content
2
 A Distributed Denial of Service (DDoS) attack is
an attempt to make an online service
unavailable by overwhelming it with traffic from
multiple sources.
 In the United States, the people that take part
in DDoS attacks are charged with legal offenses
at the federal level, both criminally and civilly.
Introduction
3
 The average DDoS attack is about 50 gbps.
 DDoS Duration :- not defined
 Targets :- Gaming industries , banks , news
websites
Introduction
4
 In a DoS attack, a hacker uses a single
Internet connection to either exploit a
software vulnerability or flood a target with
fake requests—usually in an attempt to
exhaust server resources .
 On the other hand, distributed denial of
service (DDoS) attacks are launched from
multiple connected devices that are
distributed across the Internet.
DDoS VS DoS
5
 In a typical DDoS attack, the hacker begins
by exploiting a computer system and
making it the DDoS master.
 The attack master system identifies other
vulnerable systems and gains control over
them by either infecting the systems
with malware or through bypassing the
authentication controls .
How DDoS attack works
6
 The attacker creates a command-and-
control server to command the network of
bots, also called a botnet.
 The person in control of a botnet is
sometimes referred to as the botmaster.
 Their main aim is to prevent legitimate
users from accessing a system or site.
How DDoS attack works
7
DDoS attack
8
DDoS Attack Report
9
Common reason for DDoS attacks are:
1.Expression of anger and criticism.
2.Training ground for other attacks.
3.Distraction from other malicious actions.
4.Anticompetitive business practices.
5.Means to extract money.
6.To disrupt operation of private or government
enterprise.
AIM OF A DDoS ATTACK
10
There are broadly 3 types of DDoS attacks :-
Network or Volume centric attack – 64%
Protocol attacks – 20%
Ap Application layer attack - 16%
Types of DDoS attacks
11
 These attacks use bots and botnets to
flood the network layers with a substantial
amount of seemingly legitimate traffic.
 This consumes an excessive amount of
bandwidth within or outside of the network
and causes network operations to become
extremely slow or to not work at all.
Network or Volume Centric
12
 These kinds of attacks are more difficult to
mitigate than attacks from a single source
 Volumetric attacks come in a variety of forms,
including:
• User Datagram Protocol (UDP) Floods
• ICMP floods ( Internet Control Message
Protocol)
Network or Volume Centric
13
 Random ports on a server are flooded with UDP
packets, causing the server to repeatedly
check for and respond to non-existent
applications at the ports.
 As a result, the system is unable to
respond to legitimate applications.
UDP Floods
14
 A server is flooded with ICMP echo
requests from multiple spoofed IP addresses.
 As the targeted server processes and
replies to these phony requests, it is
eventually overloaded and unable to process
valid ICMP echo requests.
ICMP Floods
15
 The goal of an application layer attack is to
exhaust resources by consuming too much.
 They target the layer that manages HTTP and
SMTP communication.
 They target web application packets in order to
disrupt the transmission of data between hosts.
 They attack on apache ,windows web servor ,
as they are more vulnerable.
Application – layer attack
16
 These type of attacks are more sophisticated
and are gaining in popularity than other types
of DDoS attacks.
 For example:- an HTTP Flood – the most
common application-layer attack – uses
botnets to force a target to expend an
excessive amount of resources when
responding to a HTTP request
Application – layer attack
17
 HTTP floods and other application-layer
DDoS attacks mimic human-user behavior
making them much more difficult to detect
than other types of attacks.
 Web based email apps, WordPress, Joomla, and
forum software are good examples of
application specific targets.
Application – layer attack
18
 Protocol attacks target the connection state
tables in firewalls, web application servers,
and other infrastructure components.
 One of the most common state-exhaustion
attacks was the ping of death, in which a
65,536-byte ping packet is defragmented
and sent to a target server as fast as
possible.
Protocol attack
19
 Once the target reassembles the large
packet, a buffer overload typically occurs.
 In the likely scenario that the target
attempts to respond to the pings, even
more bandwidth is consumed, eventually
causing the targeted system to crash.
Protocol attack
20
DDoS Attack
21
• DDoS attacks are the single largest threat to
our Internet and the Internet of Things.
• The more our world becomes connected and
dependent on the Internet, the more
opportunities to get exploited by these types of
attack.
DDoS Attack
22
 There was a 180% percent increase in the total number of DDoS attacks in 2016
compared to 2015.
 The online gaming sector is currently the most susceptible to attack, accounting for
50% of all DDoS attacks.
 Software and technology companies -25%
 Internet and telecoms companies - 5%
of the total attack.
FACTS
23
 3 Most Famous DDoS Attacks
I. Scientologist Church Gets Hit Hard By
Anonymous!
II. Hong Kong’s Democracy Movement Attack
III.The New Year Attack !
IV.DDoS in India
Famous Attack
24
• This attack took place on January 8, 2008 .
• It was attacked by hacker group Anonymous.
• The DDoS attack was meant to be a protest
against the Church of Scientology’s philosophies
and practices.
• The program was able to shut down the
Scientologist church website momentarily.
• The program that was deployed was used to
fight for Wikileaks.
Scientologist Church
25
• It started in June 2014, in Hong Kong to bring
destruction to the Chinese government . This
movement is called Occupy Central.
• Occupy Central used this DDoS attack against
the Chinese government because they wanted a
one man one vote system when electing
officials to represent political office.
• This all led Occupy Central to push their DDoS
attack forward and brought down a major
political website.
Hong Kong’s Democracy Attack
26
• It took place on December 31,2015.
• New World Hacking took responsibly for this
huge DDoS attack.
• They were capable of disrupting BBC’s global
website, along with Donald Trumps website as
well.
• The tool that was used to deploy these attacks
is called BangStresser.
The New Year Attack
27
• It took place on November ,2016.
• It was one of the biggest attack ever done
on an ISP.
• The attack was of a huge magnitude of 200
gigabytes per second.
• This is the reason behind the recent slowing
down of the internet experienced by users
around Mumbai.
• An FIR was filed against the DDoS attack
with the Mumbai police.
The DDoS Attack in India
28
The United States Computer Emergency Readiness
Team(US-CERT) has identified symptoms of a
denial-of-service attack to include:
unusually slow network performance
unavailability of a particular web site
inability to access any web site
dramatic increase in the number of spam emails
received (this type of DoS attack is considered
an e-mail bomb).
SYMPTOMS
29
DDoS Mitigation
30
 DDoS mitigation is a set of techniques or tools
for resisting the impact of DDoS attacks on
networks attached to the Internet by protecting
the target and relay networks.
 DDoS mitigation also requires identifying
incoming traffic to separate human traffic from
human-like bots and hijacked web browsers.
 The process is done by comparing signatures
and examining different attributes of the traffic,
including IP addresses, cookie variations, HTTP
headers, and JavaScript footprints.
DDoS Mitigation
31
DDoS Mitigation
32
 Best practices for DDoS mitigation include
having both anti-DDoS technology and anti-
DDoS emergency response services such
as Incapsula, Akamai, CloudFlare or Radware.
 DDoS mitigation is also available through cloud-
based providers.
 User must install anti-virus.
 User must install firewall.
DDoS Mitigation
33
 Myths:
Enterprises believe they are fully protected
with only cloud based DDoS mitigation.
 Facts:
Cloud based DDoS mitigation only protects
against large, volumetric attacks, and fails
to provide adequate protection against low
and slow application layer attacks
DDoS Myths
34
 Myths:
We will not become a target. Our business is
too small.
 Facts:
DDoS attacks do not discriminate. Any
organization, big or small, is in danger or
experiencing the risks associated with a
DDoS attack.
DDoS Myths
35
 Myths:
My Internet Service Provider (ISP) is protecting
me from DDoS attacks.
 Facts:
ISP’s lack the ability to detect, analyze and
mitigate DDoS attacks and other cyber
threats
DDoS Myths
36
THANK YOU !
37

More Related Content

What's hot

Denial of service
Denial of serviceDenial of service
Denial of service
garishma bhatia
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
Mohammad Reza Mousavinasr
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
hruth
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
Anoop T
 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
OECLIB Odisha Electronics Control Library
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
Jignesh Patel
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
sadhana21297
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
Haltdos
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
APNIC
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
Cybersecurity Education and Research Centre
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
Ahmed Salama
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 

What's hot (20)

Denial of service
Denial of serviceDenial of service
Denial of service
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 

Similar to DDoS Attack PPT by Nitin Bisht

Whitepaper on DDoS Mitigation
Whitepaper on DDoS MitigationWhitepaper on DDoS Mitigation
Whitepaper on DDoS Mitigation
Gaurav Bhatia
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Professor Lili Saghafi
 
Module 8 (denial of service)
Module 8 (denial of service)Module 8 (denial of service)
Module 8 (denial of service)
Wail Hassan
 
A041201010
A041201010A041201010
A041201010
ijceronline
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )
Sharon Lee
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
IJERA Editor
 
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationAn Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
TechApprise
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
Radware
 
L1803046876
L1803046876L1803046876
L1803046876
IOSR Journals
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
cscpconf
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
IJNSA Journal
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
IJNSA Journal
 
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSA SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
IJNSA Journal
 
2016 payment threats trends report
2016 payment threats trends report2016 payment threats trends report
2016 payment threats trends report
Ian Beckett
 
546 220-228
546 220-228546 220-228
546 220-228
idescitation
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalCheryl Goldberg
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
TierPoint
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introductionswang2010
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacks
Saptha Wanniarachchi
 

Similar to DDoS Attack PPT by Nitin Bisht (20)

Whitepaper on DDoS Mitigation
Whitepaper on DDoS MitigationWhitepaper on DDoS Mitigation
Whitepaper on DDoS Mitigation
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
Module 8 (denial of service)
Module 8 (denial of service)Module 8 (denial of service)
Module 8 (denial of service)
 
A041201010
A041201010A041201010
A041201010
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationAn Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
L1803046876
L1803046876L1803046876
L1803046876
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
 
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSA SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
 
2016 payment threats trends report
2016 payment threats trends report2016 payment threats trends report
2016 payment threats trends report
 
Web Attack Survival Guide
Web Attack Survival GuideWeb Attack Survival Guide
Web Attack Survival Guide
 
546 220-228
546 220-228546 220-228
546 220-228
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_Final
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacks
 

Recently uploaded

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 

Recently uploaded (20)

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 

DDoS Attack PPT by Nitin Bisht

  • 1. Distributed Denial of Service Attacks NITIN BISHT 140231 CSE lll 1
  • 2. o Introduction to DDoS o How it Works o Aim of DDoS Attack o Types of DDoS o DDoS Symptoms o DDoS Mitigation o Famous DDoS Attacks Table of Content 2
  • 3.  A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.  In the United States, the people that take part in DDoS attacks are charged with legal offenses at the federal level, both criminally and civilly. Introduction 3
  • 4.  The average DDoS attack is about 50 gbps.  DDoS Duration :- not defined  Targets :- Gaming industries , banks , news websites Introduction 4
  • 5.  In a DoS attack, a hacker uses a single Internet connection to either exploit a software vulnerability or flood a target with fake requests—usually in an attempt to exhaust server resources .  On the other hand, distributed denial of service (DDoS) attacks are launched from multiple connected devices that are distributed across the Internet. DDoS VS DoS 5
  • 6.  In a typical DDoS attack, the hacker begins by exploiting a computer system and making it the DDoS master.  The attack master system identifies other vulnerable systems and gains control over them by either infecting the systems with malware or through bypassing the authentication controls . How DDoS attack works 6
  • 7.  The attacker creates a command-and- control server to command the network of bots, also called a botnet.  The person in control of a botnet is sometimes referred to as the botmaster.  Their main aim is to prevent legitimate users from accessing a system or site. How DDoS attack works 7
  • 10. Common reason for DDoS attacks are: 1.Expression of anger and criticism. 2.Training ground for other attacks. 3.Distraction from other malicious actions. 4.Anticompetitive business practices. 5.Means to extract money. 6.To disrupt operation of private or government enterprise. AIM OF A DDoS ATTACK 10
  • 11. There are broadly 3 types of DDoS attacks :- Network or Volume centric attack – 64% Protocol attacks – 20% Ap Application layer attack - 16% Types of DDoS attacks 11
  • 12.  These attacks use bots and botnets to flood the network layers with a substantial amount of seemingly legitimate traffic.  This consumes an excessive amount of bandwidth within or outside of the network and causes network operations to become extremely slow or to not work at all. Network or Volume Centric 12
  • 13.  These kinds of attacks are more difficult to mitigate than attacks from a single source  Volumetric attacks come in a variety of forms, including: • User Datagram Protocol (UDP) Floods • ICMP floods ( Internet Control Message Protocol) Network or Volume Centric 13
  • 14.  Random ports on a server are flooded with UDP packets, causing the server to repeatedly check for and respond to non-existent applications at the ports.  As a result, the system is unable to respond to legitimate applications. UDP Floods 14
  • 15.  A server is flooded with ICMP echo requests from multiple spoofed IP addresses.  As the targeted server processes and replies to these phony requests, it is eventually overloaded and unable to process valid ICMP echo requests. ICMP Floods 15
  • 16.  The goal of an application layer attack is to exhaust resources by consuming too much.  They target the layer that manages HTTP and SMTP communication.  They target web application packets in order to disrupt the transmission of data between hosts.  They attack on apache ,windows web servor , as they are more vulnerable. Application – layer attack 16
  • 17.  These type of attacks are more sophisticated and are gaining in popularity than other types of DDoS attacks.  For example:- an HTTP Flood – the most common application-layer attack – uses botnets to force a target to expend an excessive amount of resources when responding to a HTTP request Application – layer attack 17
  • 18.  HTTP floods and other application-layer DDoS attacks mimic human-user behavior making them much more difficult to detect than other types of attacks.  Web based email apps, WordPress, Joomla, and forum software are good examples of application specific targets. Application – layer attack 18
  • 19.  Protocol attacks target the connection state tables in firewalls, web application servers, and other infrastructure components.  One of the most common state-exhaustion attacks was the ping of death, in which a 65,536-byte ping packet is defragmented and sent to a target server as fast as possible. Protocol attack 19
  • 20.  Once the target reassembles the large packet, a buffer overload typically occurs.  In the likely scenario that the target attempts to respond to the pings, even more bandwidth is consumed, eventually causing the targeted system to crash. Protocol attack 20
  • 22. • DDoS attacks are the single largest threat to our Internet and the Internet of Things. • The more our world becomes connected and dependent on the Internet, the more opportunities to get exploited by these types of attack. DDoS Attack 22
  • 23.  There was a 180% percent increase in the total number of DDoS attacks in 2016 compared to 2015.  The online gaming sector is currently the most susceptible to attack, accounting for 50% of all DDoS attacks.  Software and technology companies -25%  Internet and telecoms companies - 5% of the total attack. FACTS 23
  • 24.  3 Most Famous DDoS Attacks I. Scientologist Church Gets Hit Hard By Anonymous! II. Hong Kong’s Democracy Movement Attack III.The New Year Attack ! IV.DDoS in India Famous Attack 24
  • 25. • This attack took place on January 8, 2008 . • It was attacked by hacker group Anonymous. • The DDoS attack was meant to be a protest against the Church of Scientology’s philosophies and practices. • The program was able to shut down the Scientologist church website momentarily. • The program that was deployed was used to fight for Wikileaks. Scientologist Church 25
  • 26. • It started in June 2014, in Hong Kong to bring destruction to the Chinese government . This movement is called Occupy Central. • Occupy Central used this DDoS attack against the Chinese government because they wanted a one man one vote system when electing officials to represent political office. • This all led Occupy Central to push their DDoS attack forward and brought down a major political website. Hong Kong’s Democracy Attack 26
  • 27. • It took place on December 31,2015. • New World Hacking took responsibly for this huge DDoS attack. • They were capable of disrupting BBC’s global website, along with Donald Trumps website as well. • The tool that was used to deploy these attacks is called BangStresser. The New Year Attack 27
  • 28. • It took place on November ,2016. • It was one of the biggest attack ever done on an ISP. • The attack was of a huge magnitude of 200 gigabytes per second. • This is the reason behind the recent slowing down of the internet experienced by users around Mumbai. • An FIR was filed against the DDoS attack with the Mumbai police. The DDoS Attack in India 28
  • 29. The United States Computer Emergency Readiness Team(US-CERT) has identified symptoms of a denial-of-service attack to include: unusually slow network performance unavailability of a particular web site inability to access any web site dramatic increase in the number of spam emails received (this type of DoS attack is considered an e-mail bomb). SYMPTOMS 29
  • 31.  DDoS mitigation is a set of techniques or tools for resisting the impact of DDoS attacks on networks attached to the Internet by protecting the target and relay networks.  DDoS mitigation also requires identifying incoming traffic to separate human traffic from human-like bots and hijacked web browsers.  The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and JavaScript footprints. DDoS Mitigation 31
  • 33.  Best practices for DDoS mitigation include having both anti-DDoS technology and anti- DDoS emergency response services such as Incapsula, Akamai, CloudFlare or Radware.  DDoS mitigation is also available through cloud- based providers.  User must install anti-virus.  User must install firewall. DDoS Mitigation 33
  • 34.  Myths: Enterprises believe they are fully protected with only cloud based DDoS mitigation.  Facts: Cloud based DDoS mitigation only protects against large, volumetric attacks, and fails to provide adequate protection against low and slow application layer attacks DDoS Myths 34
  • 35.  Myths: We will not become a target. Our business is too small.  Facts: DDoS attacks do not discriminate. Any organization, big or small, is in danger or experiencing the risks associated with a DDoS attack. DDoS Myths 35
  • 36.  Myths: My Internet Service Provider (ISP) is protecting me from DDoS attacks.  Facts: ISP’s lack the ability to detect, analyze and mitigate DDoS attacks and other cyber threats DDoS Myths 36