1 / 14

Denial of Service Attacks

Denial of Service Attacks. Clayton Sullivan. Overview. Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service Detection and Prevention. History. First major attacks start to appear in 2001.

bazyli
Télécharger la présentation

Denial of Service Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Denial of Service Attacks Clayton Sullivan

  2. Overview • Denial of Service Attack History • What is a Denial of Service Attack? • Modes of Attack • Performing a Denial of Service Attack • Distributed Denial of Service • Detection and Prevention

  3. History • First major attacks start to appear in 2001. • Major companies have been hit as well as major Governments • Twitter, Facebook, Google, Amazon, Wal-Mart, Pirate Bay, Irish Government, Iranian Government, Georgian Government

  4. What is a Denial of Service Attack? • It is an attempt to make a computer resource unavailable to its intended users. • Reasons may vary but it is an effort to prevent an internet site or service from functioning efficiently. • Typical Connection • Denial of Service Attack

  5. Attacks • Basic Attack Types • Consumption of computational resources • Bandwidth, disk space, processor time • Disruption of configuration information • Routing information • Disruption of state information • Resetting of TCP sessions • Disruption of physical network components • Obstructing the communication media between the intended users and the victim

  6. Performing a Denial of Service Attack • An attacker sends several authentication messages to a server at once. • These authentication messages have fake return addresses so the server can not find the user to give authentication approval. • The server then waits to close the connection and when it does the attacker can send a new batch of fake requests. • This process is repeated over and over, tying up the service indefinitely.

  7. Performing a Denial of Service Attack

  8. Distributed Denial of Service

  9. Distributed Denial of Service • In a distributed denial of service attack, the attacker takes over machines on the internet and uses them to perform a denial of service attack. • Used in order to generate the necessary traffic in order to bring down the resource.

  10. Prevention and Detection • Denial of service attacks can lead to significant loss of time and resources. • Being able to detect and then prevent denial of service attacks can prevent this loss of time and resources • There are both hardware and software solutions for detection and prevention.

  11. Prevention and Detection • A filter can be implemented that sniffs packet info and looks for suspicious patterns and will deny access if one can be found. • Intrusion Prevention Systems • Firewalls, Switches, Routers

  12. Conclusion • History • Denial of Service Attack • Distributed Denial of Service Attack • Prevention and Detection

  13. Questions?

  14. References • www.wikipedia.org • www.cisco.com • www.cert.org • www.us-cert.gov • news.cnet.com

More Related