Uploaded by Team Exodia

dos-attack compress

advertisement
SILIGURI INSTITUTE OF TECHNOLOGY
SEMINAR ON :
DoS attack
(Denial-Of-Service Attack)
BY :
Moinak sutradhar
BACHELOR OF COMPUTER APPLICATIONS
SEMINAR ON :
SOLAR FUELS
SEMINAR GUIDE :
MRS. TUMPA BANNERJEE
ASSISTANT PROFESSOR, BACHELOR OF COMPUTER APPLICATIONS
HIGHLIGHTS :

INTRODUCTION TO DENIAL-OF-SERVICE ATTACK

SCHEMATIC DIAGRAM OF DoS ATTACK.

SYMPTOMS

ATTACK TECHN IQUES

ARCHITECTURE OF DDoS ATTACK

DISTRIBUTED ATTACK

DEFENSE TECHNIQUES

LEGALITY

CONCLUSION
INTRODUCTION :

AN ATTEMPT TO MAKE A MACHINE OR NETWORK RESOURCE UNAVAILABLE.

INTERRUPT OR SUSPEND SERVICES OF A HOST CONNECTED TO THE INTERNET.

TARGET SITES ARE OFTEN HIGH PROFILE WEB-SERVERS SUCH AS BANKS.

IT INVOLVES SIMULTANEOUS MULTI-THREADED ISO LAYER ATTACKS.

IT PERSISTS OVER EXTENDED PERIODS.

A WIDE ARRAY OF PROGRAMS ARE USED TO LAUNCH DoS ATTACK.

IT INVOLVES THE INABILITY TO ACCESS ANY WEBSITE.
SCHEMATIC DIAGRAM :
SYMPTOMS OF DoS ATTACK :

SLOW NETWORK PERFORMANCES.

UNAVAILABILITY OF A PARTICULAR WEBSITE.

INABILITY TO ACCESS ANY WEBSITE.

DISCONNECTION OF A WIRELESS OR A WIRED INTERNET CONNECTION.

LONG TERM DENIAL OF ACCESS TO THE WEB OR INTERNET SERVICES.

DRAMATIC INCREASE IN THE NUMBER OF SPAM MAILS
ATTACK TECHNIQUES :

ADVANCED PERSISTENT DoS (APDoS)

APPLICATION LAYER FLOODS.

DENIAL-OF-SERVICE LEVEL II

DDoS EXTORTION

HTTP POST DoS ATTACK

NUKE

PEER TO PEER ATTACKS
DEFENSE TECHNIQUES:

APPLICATION FRONT END HARDWARE

APPLICATION LEVEL KEY COMPLETION INDICATORS

BLACKHOLING AND SINKHOLING

DDS BASED DEFENSE

FIREWALLS
LEGALITY :

MANY JURISDICTION HAVE LAWS STATING DENIAL-OF-SERVICE AS ILLEGAL.

CONSIDERED A FEDERAL CRIME UNDER COMPUTER FRAUD AND ABUSE ACT.

CAN BE SENTENCED TO A PENALTY OF 10 YEARS IN PRISON.

DoS ATTACK CONSIDERED AS AN EFFECTIVE PART OF CYBER-CRIME.
CONCLUSION :

A MACHINE MAY BECOME A PART OF DDoS ATTACK WITH THE USER’S CONSENT.

EXAMPLE : OPERATION PAYBACK

TOOLS FOR DDoS INCLUDE : PREDATOR’S FACE AND ROLLING THUNDER.

SIMPLE ATTACKS MAY APPEAR WITH A WIDE RANGE OF BLOCKED IP ADDRESSES.

ROUTERS CAN BE OVERWHELMED UNDER DoS ATTACK BY MANUAL SETTINGS.

SYN FLOODS OCCUR WHEN A HOST SENDS A FLOOD OF TCP/SYN PACKETS.

DoS IS A PUNISHABLE OFFENCE UNDER MANY JURISDICTIONS.
I WOULD LIKE TO THANK :

ALL TEACHERS

MY CLASSMATES

AND SPECIALLY, MY SEMINAR GUIDE MRS. TUMPA BANNERJEE, ASSISTANT PROFESSOR,
BACHELOR OF COMPUTER APPLICATIONS.
WHO HAVE SUPPORTED ME IN ALL POSSIBLE WAYS AND HELPED MY SEMINAR TO BE A SUCCESSFUL ONE.
THANK YOU
Download