2007 9 DDOS

61 %
39 %
Information about 2007 9 DDOS

Published on October 7, 2007

Author: JJMiller

Source: authorstream.com

DDoS Attacks And Their Progression:  DDoS Attacks And Their Progression Group 9 Ben Dumford Travis Nauman Doug Showell Denial of Service Attacks:  Denial of Service Attacks What is a Denial of Service Attack? The goal is to disrupt some legitimate activity. Means of a DoS Attack Consume Resources - Resources include Bandwidth, CPU time, etc. Malformed Packets Disrupt Physical Network What is a DDoS attack?:  What is a DDoS attack? “Distributed denial-of-service attack” Attempt to make a computer resource unavailable, usually by flooding the target with internet traffic from many different sources Compromised “zombie” systems IRC Bot Net:  IRC Bot Net Internet Relay Chat bot network Hundreds or even thousands of IRC bots Install on host computers all over the internet Execute commands from the attacker Zombie Botnets:  Zombie Botnets Virus, worm, or trojan gets installed on host systems through various methods. These PC’s become agents of a DDoS attack known as zombies. DDoS tools Trinoo TFN, TFN2k Stacheldraht MyDoom DRDoS Attack:  DRDoS Attack “Distributed reflected denial of service attack” Send requests to a large number of computers using spoofed source IP address Only considered a DDoS attack if many hosts send out signals to many subnets Unintentional DDoS Attack:  Unintentional DDoS Attack Usually caused by a sudden spike in popularity “Slashdot effect” or “Digg effect” Packet Flooding :  Packet Flooding Most DDoS schemes involve the consumption of bandwidth or network resources via packet flooding. ICMP Packets UDP Packets TCP Packets TCP SYN Packets Multiple Packet Attacks Latest: DNS Look-ups How to Tell If You Are Under Attack:  How to Tell If You Are Under Attack Unusually slow network performance Unavailability of a particular website Inability to access any website Dramatic increase in the amount of spam you receive in your email account. Source: U.S. Computer Emergency Readiness Team. Part of Department of Homeland Security Defense Against Becoming a Zombie:  Defense Against Becoming a Zombie Unfortunately, defending against DDoS attacks is not dependent on the security of your own network but of the whole internet. Antivirus Software Firewalls (Zombies hate fire!) Egress Filtering IDS Strong E-mail Policy and Spam Blockers Defense Against Flooding:  Defense Against Flooding System Monitoring to Detect Attacks/Analyze Packets Packet Filtering Rate Limiting Delayed Binding Get to Know Your ISP - Blackhole Filtering Plan in Advance DDoS Attacks:  DDoS Attacks Some History First DDoS attacks were mainly directed toward to disrupting IRC servers. TimeLine 1996 SYN flood Worked with minimum bandwidth DDoS Attacks:  DDoS Attacks 1997 Vulnerability in Microsoft Windows TCP/IP Stack Tools were teardrop, boink, bonk Smurf Attack Bounce packets off misconfigured network Lagging Just sending a lot of packets DDoS Attacks:  DDoS Attacks 1998 - 99 Targa Multiple attacks in one tool Attackers would work together to bring down systems Big increase in ability to attack computer systems this year. DDoS Attacks:  DDoS Attacks 2000 Many huge sites are taken down Big losses in profit. 2001 DNS Attacks Microsoft DDoS Attacks:  DDoS Attacks 2002 Root DNS servers are attacked No serious damage because of the length of the attack. 2003 - 2004 Attacking smaller sites and even some extortion attempts. Bot networks DDoS Attacks:  DDoS Attacks Current Hackers beginning to attack Linux/Unix machines Many web servers are based on those operating systems Web servers have a lot of bandwidth and having control of the server would mean a lot of attack power Spam Screensavers Attacks spammers Conclusion:  Conclusion Stopping DDoS attacks depends on the whole internet community. Protect your machine from malware that could be used in these attacks. Security against DDoS is an ongoing race between hackers and security experts.

Add a comment

Related presentations

Related pages

Denial of Service – Wikipedia

Wird die Überlastung von einer größeren Anzahl anderer Systeme verursacht, so wird von Distributed Denial of Service (DDoS) gesprochen. Absichtlich ...
Read more

Oldschool Runescape 2007 DDoS Tool Comes with IP Grabber ...

Oldschool Runescape 2007 DDoS Tool Comes with IP Grabber] Free Download
Read more

Estonia vs. Russia The DDOS War

Estonia vs. Russia The DDOS War Birmingham InfraGard June 2007 Meeting. InfraGard Sharing •This presentation may be shared freely. ... 9/11/2007 4:58:07 ...
Read more

2007 cyberattacks on Estonia - Wikipedia, the free ...

2007 cyberattacks on Estonia. Cyberattacks on Estonia were a series of cyber attacks that began 27 April ... Massive DDoS attacks target Estonia; Russia ...
Read more

RuneSape 2007 oldschool runescape booter works both in RS3 ...

RuneSape 2007 oldschool runescape booter works both ... 07 scape 2007 booter old school 2013DDOS, DDoS, ... 13 12 11 10 9 8 7 6 5 4 ...
Read more

DDoS | Know Your Meme

Distributed Denial of Service (DDoS) is a method of cyberattack that usually involves temporarily blocking access to a website or server by ...
Read more

Packet Flooding DDoS Attacks - cymru.com

Packet Flooding DDoS Attacks John Kristoff ... Team Cymru 9 2001-ish: DoS @ DePaul. ... Feb 2007 DNS Attacks.
Read more

Distributed Denial of Service (DDoS) Attacks/tools

Distributed Denial of Service (DDoS) Attacks/tools. What's new in DDoS? ... Arbor Networks Security Blog, June 9, 2007 ICANN Fact Sheet: ...
Read more


Collaborative Detection of DDoS Attacks over Multiple Network Domains Yu Chen, Member, IEEE, Kai Hwang, Fellow, IEEE Computer Society, and Wei-Shinn Ku ...
Read more