1 / 28

DDoS Attack | DDoS Attack Explained | What Is A DDoS Attack? |

In the presentation on what is a DDoS Attack, we learn how DDoS attacks are growing in number and strength. For our lesson on DDoS Attack Explained, we learn the working of a DDoS attack and its various categories. We also read about the potential aims of launching DDoS Attacks campaigns and some preventive measures that can be taken to safeguard data against such attacks. Finally, we have a demo where we see the effect of a DoS attack on a target system by using virtual machines in this lesson on our Cyber Attacks Explained series.<br>

Simplilearn
Télécharger la présentation

DDoS Attack | DDoS Attack Explained | What Is A DDoS Attack? |

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DDoS Attacks are getting more extreme with hackers getting easy access to botnet farms and compromised devices. Source : Akamai

  2. In 2018, Github was hit with a DDoS attack which clocked in at 1.36 terabits per second and lasted for around 20 minutes. Difference between normal traffic and DDoS traffic Source : Wired

  3. Click here to watch the video

  4. Agenda For the Day What Is a DDoS Attack? How does DDoS Attack Work? Types of DDoS Attacks Aim of DDoS Attacks Prevention of DDoS Attacks Live Demo of DDoS Attack

  5. What Is a DDOS Attack?

  6. What Is a DDOS Attack? • Distributed Denial of Service (DDoS) Attacks • Sending multiple requests from to a web-resource or machine • Saturates the server capability of managing requests • Attack is mostly carried out using a botnet of multiple devices

  7. How Does DDOS Attack Work?

  8. How Does DDOS Attack Work? A hacker must create a network of zombie bots, that can be used to attack the targeted victim when called upon, using malware infusion. Zombie Zombie Zombie

  9. How Does DDOS Attack Work? These bots then flood the target with continuous requests that cause the server system to crash. Data Requests Web Server

  10. Types of DDoS Attacks

  11. Types of DDoS Attacks 1. Volumetric/Network Based Attack These attacks focus on consuming all the bandwidth allocated to a server. A huge volume of requests are sent to the server which warrant a reply from the server and block all the bandwidth for regular users. Examples – UDP floods, ICMP echo requests. Spoofed Echo Request ICMP Echo Reply Hacker Target Server

  12. Types of DDoS Attacks 2. Protocol Based Attack These consume the actual resources of a target by exhausting the firewalls and load balancers kept in place. Layers three and four of the OSI model are compromised. Example – SYN Flooding, Ping of Death. Spoofed SYN Packet X SYN-ACK X SYN-ACK Hacker Target Server

  13. Types of DDoS Attacks 3. Application Based Attack Sophisticated attacks that crash the entire server by targeting application and OS level vulnerabilities. It can stop specific applications from delivering necessary information. Example – HTTP Flooding, BGP Hijacking HTTP POST/GET HTTP POST/GET HTTP POST/GET Botnet Target Server

  14. Aim of DDoS Attacks

  15. Aim of DDoS Attacks 1. Competitive advantage against rival business

  16. Aim of DDoS Attacks 2. Ransom demands for releasing data

  17. Aim of DDoS Attacks 3. Activist behavior for protests and upstaging

  18. Prevention of DDoS Attacks

  19. Prevention of DDoS Attacks Employ load balancers and firewalls

  20. Prevention of DDoS Attacks 2. Detect an attack early and mitigate the damage beyond that point

  21. Prevention of DDoS Attacks 3. Switch to cloud service providers like AWS and Azure

  22. Prevention of DDoS Attacks 4. Allocate more bandwidth to prevent clogging of data.

  23. Prevention of DDoS Attacks 5. Using content delivery networks(CDNs) that have redundant servers

  24. Live Demo of DDoS Attack

  25. Live Demo of DDoS Attack • For now, we have a single device to launch an attack from, making it a DOS attack of sorts. • We will use a virtualized instance Parrot Security OS to launch an attack. • Our target machine is another VM instance running a standard Linux distribution called ‘Linux Lite’. • We will use Wireshark to see how an attack can be detected from the target’s device.

More Related