SlideShare a Scribd company logo
1 of 9
Milan Petrásek
1st June 2013
DDoS
Distributed Denial of
Service
• What is DDoS
• Types of DDoS attacks
• Example of attack
• How to protect
• Summary
Overview
What is a DDoS Attack?
During a Distributed Denial of Service (DDoS)
attack, compromised hosts (so called bots) coming
from distributed sources overwhelm the target with
illegitimate traffic so that the servers can not respond to
legitimate clients.
target
bots
DDoS types
Modern DDoS attacks are complex:
1. Volumetric and Flood DDoS Attacks
2. State-Exhausting DDoS Attacks
3. Application-Layer DDoS Attacks
DDoS example - SYN Flood
How to protect against DDoS
• It is not easy to try to do it yourself (DIY) –
this is very complex area.
• Better way is cooperate with internet service
provider (ISP) or specialized security
company.
• Firewall is not a solution.
• You need specialized solution for protection
against DDoS attack.
• Internet isn't safe.
• Creating attacks is a business.
• DDoS is big issue on present internet.
• Unfortunately Czech Republic isn't exception -
March (2013) - we were witnesses large DDoS
attack against banks, telcos, media houses etc.
• It is good to be prepared – will be worse
Summary
• Wikipedia
http://en.wikipedia.org/wiki/SYN_flood
http://en.wikipedia.org/wiki/Denial-of-
service_attack
• CSIRT– Recapitulation of march attacks
http://csirt.cz/files/csirt/Rekapitulace-utoky-
20120311.pdf
Sources
Thank you
Questions

More Related Content

What's hot (20)

DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Dos attack
Dos attackDos attack
Dos attack
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Ceh v5 module 04 enumeration
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumeration
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 
Botnets
BotnetsBotnets
Botnets
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Port scanning
Port scanningPort scanning
Port scanning
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 

Viewers also liked

How Internet Works
How Internet WorksHow Internet Works
How Internet WorksUrvi Talaty
 
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...Monica Blanco
 
How internet works
How internet worksHow internet works
How internet worksANurag Kumar
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_worksarun nalam
 
Chapter 29 Domain Name System.ppt
Chapter 29 Domain Name System.pptChapter 29 Domain Name System.ppt
Chapter 29 Domain Name System.pptwebhostingguy
 
E commerce ppt
E commerce pptE commerce ppt
E commerce pptBoje Donie
 
Presentation on dns
Presentation on dnsPresentation on dns
Presentation on dnsAnand Grewal
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Worksftz 420
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name SystemChinmay Joshi
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNSAkshay Tiwari
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name SystemPeter R. Egli
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPTOTHERS
 
E Commerce Presentation
E  Commerce  PresentationE  Commerce  Presentation
E Commerce PresentationTylerjd
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final pptreemalmarri
 

Viewers also liked (20)

How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...
 
how the internet works
how the internet workshow the internet works
how the internet works
 
e commerce ppt
e commerce ppte commerce ppt
e commerce ppt
 
How internet works
How internet worksHow internet works
How internet works
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
 
Chapter 29 Domain Name System.ppt
Chapter 29 Domain Name System.pptChapter 29 Domain Name System.ppt
Chapter 29 Domain Name System.ppt
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
Presentation on dns
Presentation on dnsPresentation on dns
Presentation on dns
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name System
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
E Commerce Presentation
E  Commerce  PresentationE  Commerce  Presentation
E Commerce Presentation
 
Dns ppt
Dns pptDns ppt
Dns ppt
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 

Similar to DDoS

Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Sharon Lee
 
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationAn Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationTechApprise
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin BishtNitin Bisht
 
nitinbisht-170409175645 (2).pdf
nitinbisht-170409175645 (2).pdfnitinbisht-170409175645 (2).pdf
nitinbisht-170409175645 (2).pdfrashidxasan369
 
Things to Consider While Choosing DDoS Protection | DDoS VPS Hosting
Things to Consider While Choosing DDoS Protection | DDoS VPS HostingThings to Consider While Choosing DDoS Protection | DDoS VPS Hosting
Things to Consider While Choosing DDoS Protection | DDoS VPS HostingHostSailor
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalCheryl Goldberg
 
Ddos extortion campaigns
Ddos extortion campaignsDdos extortion campaigns
Ddos extortion campaignsRoel Palmaers
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016TierPoint
 
DDoS Protection For Top 4 Industries | MazeBolt Technologies
DDoS Protection For Top 4 Industries | MazeBolt TechnologiesDDoS Protection For Top 4 Industries | MazeBolt Technologies
DDoS Protection For Top 4 Industries | MazeBolt TechnologiesMazeBolt Technologies
 
Adarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.pptAdarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.pptFridha2
 
Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Waheb Samaraie
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]Radware
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicState of the Internet
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiProfessor Lili Saghafi
 

Similar to DDoS (20)

DDoS.pptx
DDoS.pptxDDoS.pptx
DDoS.pptx
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )
 
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationAn Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
 
A041201010
A041201010A041201010
A041201010
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
nitinbisht-170409175645 (2).pdf
nitinbisht-170409175645 (2).pdfnitinbisht-170409175645 (2).pdf
nitinbisht-170409175645 (2).pdf
 
Things to Consider While Choosing DDoS Protection | DDoS VPS Hosting
Things to Consider While Choosing DDoS Protection | DDoS VPS HostingThings to Consider While Choosing DDoS Protection | DDoS VPS Hosting
Things to Consider While Choosing DDoS Protection | DDoS VPS Hosting
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_Final
 
Ddos extortion campaigns
Ddos extortion campaignsDdos extortion campaigns
Ddos extortion campaigns
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
 
DDoS Protection For Top 4 Industries | MazeBolt Technologies
DDoS Protection For Top 4 Industries | MazeBolt TechnologiesDDoS Protection For Top 4 Industries | MazeBolt Technologies
DDoS Protection For Top 4 Industries | MazeBolt Technologies
 
Adarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.pptAdarsh-PPT-FCF-12-thm.ppt
Adarsh-PPT-FCF-12-thm.ppt
 
DDoS Hurts Everyone
DDoS Hurts EveryoneDDoS Hurts Everyone
DDoS Hurts Everyone
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - Infographic
 
546 220-228
546 220-228546 220-228
546 220-228
 
Stickler_Unit6
Stickler_Unit6Stickler_Unit6
Stickler_Unit6
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 

More from Milan Petrásek

O2 Firewally nové generace
O2 Firewally nové generaceO2 Firewally nové generace
O2 Firewally nové generaceMilan Petrásek
 
Bezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTSBezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTSMilan Petrásek
 
HighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWERHighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWERMilan Petrásek
 
DDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZDDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZMilan Petrásek
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat ManagementMilan Petrásek
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity ManagementMilan Petrásek
 
GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012Milan Petrásek
 
Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.Milan Petrásek
 
Článek z CIO Business World
Článek z CIO Business WorldČlánek z CIO Business World
Článek z CIO Business WorldMilan Petrásek
 

More from Milan Petrásek (14)

O2 Firewally nové generace
O2 Firewally nové generaceO2 Firewally nové generace
O2 Firewally nové generace
 
What is botnet?
What is botnet?What is botnet?
What is botnet?
 
Bezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTSBezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTS
 
HighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWERHighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWER
 
DDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZDDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZ
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
High Frequency Trading
High Frequency TradingHigh Frequency Trading
High Frequency Trading
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012
 
Cloudové služby GTS
Cloudové služby GTSCloudové služby GTS
Cloudové služby GTS
 
Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.
 
Článek z CIO Business World
Článek z CIO Business WorldČlánek z CIO Business World
Článek z CIO Business World
 
GTS Data Storage CZ
GTS Data Storage CZGTS Data Storage CZ
GTS Data Storage CZ
 
TCO for a cloud
TCO for a cloudTCO for a cloud
TCO for a cloud
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

DDoS

  • 1. Milan Petrásek 1st June 2013 DDoS Distributed Denial of Service
  • 2. • What is DDoS • Types of DDoS attacks • Example of attack • How to protect • Summary Overview
  • 3. What is a DDoS Attack? During a Distributed Denial of Service (DDoS) attack, compromised hosts (so called bots) coming from distributed sources overwhelm the target with illegitimate traffic so that the servers can not respond to legitimate clients. target bots
  • 4. DDoS types Modern DDoS attacks are complex: 1. Volumetric and Flood DDoS Attacks 2. State-Exhausting DDoS Attacks 3. Application-Layer DDoS Attacks
  • 5. DDoS example - SYN Flood
  • 6. How to protect against DDoS • It is not easy to try to do it yourself (DIY) – this is very complex area. • Better way is cooperate with internet service provider (ISP) or specialized security company. • Firewall is not a solution. • You need specialized solution for protection against DDoS attack.
  • 7. • Internet isn't safe. • Creating attacks is a business. • DDoS is big issue on present internet. • Unfortunately Czech Republic isn't exception - March (2013) - we were witnesses large DDoS attack against banks, telcos, media houses etc. • It is good to be prepared – will be worse Summary
  • 8. • Wikipedia http://en.wikipedia.org/wiki/SYN_flood http://en.wikipedia.org/wiki/Denial-of- service_attack • CSIRT– Recapitulation of march attacks http://csirt.cz/files/csirt/Rekapitulace-utoky- 20120311.pdf Sources