1 / 6

DDoS Attack

DDoS Attack. China hit with largest DDoS in History. http:// blogs.wsj.com / chinarealtime /2013/08/26/ chinese -internet-hit-by-attack-over-weekend/. What is a DDoS Attack. Denial-of-service attack? DoS Overload Server TCP 3-Handshake register Distributed Denial of Service DDoS

cato
Télécharger la présentation

DDoS Attack

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DDoS Attack China hit with largest DDoS in History http://blogs.wsj.com/chinarealtime/2013/08/26/chinese-internet-hit-by-attack-over-weekend/

  2. What is a DDoS Attack • Denial-of-service attack? DoS • Overload Server • TCP 3-Handshake • register • Distributed Denial of Service DDoS • rootkit • Brobot • Automated toolkit • Hijacks computer via

  3. China Internet Network Information System • .cnccTLD (country code top level domain) • Targeted registry • Malware & viruses containing botnets • Thousands of domains affected • Upwards of four hours

  4. How Do You Know Attack is Happening • Unusually slow network performance • Opening files or accessing websites • Unavailability of a particular website • Inability to access any website • Dramatic increase in the amount of spam you receive in your account

  5. Who is at risk? • Banks • Internet Providers • Mobile Devices • Any large Distributed Computing System

  6. Defend Against DDoS Attack • Tight lips sink company defenses • Be ready for real-time defense adjustments • Don't rely only on perimeter defenses -- Mitigate • Firewall • Intrusion prevention systems • Fight application-layerattacks in-line • Specific application attacks stealthier • Deep-packet inspection at application layer • Collaborate • Banks, telecommunication services, service providers • Have your playbook ready • Watch out for secondary attacks Authored by George V. Hulme Security & Risk Organization http://www.csoonline.com/article/734936/7-essentials-for-defending-against-ddos-attacks?page=2

More Related