3. A DDoS attack occurs when multiple systems coordinate a
synchronized DoS attack to a single target. The essential difference is
that instead of being attacked from one location, the target is attacked
from many locations at once. The distribution of hosts that defines a
DDoS provide the attacker multiple advantages:
Attacker can force the greater volume of machine to execute a
seriously disruptive attack.
The location of the attack is difficult to detect due to the random
distribution of attacking systems.
It is more difficult to shut down multiple machines than one.
The true attacking party is very difficult to identify, as they are
disguised behind many (mostly compromised) systems
Distributed Denial of Service (DDoS) attack
4. • Modern security technologies have developed
mechanisms to defend against most forms of DoS
attacks, but due to the unique characteristics of DDoS,
it is still regarded as an elevated threat and is of higher
concern to organizations that fear being targeted by
such an attack.
• DDoS attacks are sometimes done to divert the
attention of the target organization. While the target
organization focuses on the DDoS attack, the
cybercriminal may pursue a primary motivation such
as installing malicious software or stealing data.
5.
6. S No. DoS DDoS
1 DoS Stands for Denial of service attack. DDoS Stands for Distributed Denial of service attack.
2 In DoS attack single system targets the victims system. In DDos multiple system attacks the Victims system..
3 Victim PC is loaded from the packet of data sent from a
single location.
Victim PC is loaded from the packet of data sent from
Multiple location.
4 DoS attack is slower as compared to DDoS DDoS attack is faster than DoS Attack
5 Can be blocked easily as only one system is used It is difficult to block this attack as multiple devices are
sending packets and attacking from multiple locations.
6 In DoS Attack only single device is used with DoS Attack
tools
In DDoS attack Bots are used to attack at the same time.
7 DoS Attacks are Easy to trace DDoS Attacks are Difficult to trace.
8 Volume of traffic in DoS attack is less as compared to
DDoS,
DDoS attacks allow the attacker to send massive volumes of
traffic to the victim network
9 Types of DOS Attacks are:
1. Buffer overflow attacks
2. Ping of Death or ICMP flood
3. Teardrop Attack
Types of DDOS Attacks are:
1. Volumetric Attacks
2. Fragmentation Attacks
3. Application Layer Attacks
Difference between DoS and DDoS
8. The Google Attack, 2020
On October 16, 2020, Google’s Threat Analysis Group (TAG) posted a
blog update,
In 2017, our Security Reliability Engineering team measured a record-
breaking UDP amplification attack sourced out of several Chinese ISPs
(ASNs 4134, 4837, 58453, and 9394), which remains the largest
bandwidth attack of which we are aware.
Launched from three Chinese ISPs, the attack on thousands of
Google’s IP addresses lasted for six months :
The attacker used several networks to spoof 167 Mpps (millions of
packets per second) to 180,000 exposed CLDAP, DNS, and SMTP
servers, which would then send large responses to us. This
demonstrates the volumes a well-resourced attacker can achieve. This
was four times larger than the record-breaking 623 Gbps attack from
the Mirai botnet a year earlier.
9. The Six Banks DDoS Attack in 2012
On March 12, 2012, six U.S. banks were targeted by a wave of
DDoS attacks—Bank of America, JPMorgan Chase, U.S.
Bank, Citigroup, Wells Fargo, and PNC Bank. The attacks
were carried out by hundreds of hijacked servers from a botnet
called Brobot with each attack generating over 60 gigabits of
DDoS attack traffic per second.
At the time, these attacks were unique in their persistence.
Rather than trying to execute one attack and then backing down,
the perpetrators barraged their targets with a multitude of attack
methods in order to find one that worked. So, even if a bank was
equipped to deal with a few types of DDoS attacks, they were
helpless against other types of attack.
10. Example of DDoS attack
The AWS DDoS Attack in 2020
Amazon Web Services the 800-pound gorilla of everything cloud
computing, was hit by a gigantic DDoS attack in February 2020.
This was the most extreme recent DDoS attack ever and it
targeted an unidentified AWS customer using a technique called
Connectionless Lightweight Directory Access Protocol
(CLDAP) Reflection. This technique relies on vulnerable third-
party CLDAP servers and amplifies the amount of data sent to
the victim’s IP address by 56 to 70 times. The attack lasted for
three days and peaked at an astounding 2.3 terabytes per
second.