270 likes | 292 Views
In the presentation on what is a DDoS Attack, we learn how DDoS attacks are growing in number and strength. For our lesson on DDoS Attack Explained, we learn the working of a DDoS attack and its various categories. We also read about the potential aims of launching DDoS Attacks campaigns and some preventive measures that can be taken to safeguard data against such attacks. Finally, we have a demo where we see the effect of a DoS attack on a target system by using virtual machines in this lesson on our Cyber Attacks Explained series.<br>
E N D
DDoS Attacks are getting more extreme with hackers getting easy access to botnet farms and compromised devices. Source : Akamai
In 2018, Github was hit with a DDoS attack which clocked in at 1.36 terabits per second and lasted for around 20 minutes. Difference between normal traffic and DDoS traffic Source : Wired
Agenda For the Day What Is a DDoS Attack? How does DDoS Attack Work? Types of DDoS Attacks Aim of DDoS Attacks Prevention of DDoS Attacks Live Demo of DDoS Attack
What Is a DDOS Attack? • Distributed Denial of Service (DDoS) Attacks • Sending multiple requests from to a web-resource or machine • Saturates the server capability of managing requests • Attack is mostly carried out using a botnet of multiple devices
How Does DDOS Attack Work? A hacker must create a network of zombie bots, that can be used to attack the targeted victim when called upon, using malware infusion. Zombie Zombie Zombie
How Does DDOS Attack Work? These bots then flood the target with continuous requests that cause the server system to crash. Data Requests Web Server
Types of DDoS Attacks 1. Volumetric/Network Based Attack These attacks focus on consuming all the bandwidth allocated to a server. A huge volume of requests are sent to the server which warrant a reply from the server and block all the bandwidth for regular users. Examples – UDP floods, ICMP echo requests. Spoofed Echo Request ICMP Echo Reply Hacker Target Server
Types of DDoS Attacks 2. Protocol Based Attack These consume the actual resources of a target by exhausting the firewalls and load balancers kept in place. Layers three and four of the OSI model are compromised. Example – SYN Flooding, Ping of Death. Spoofed SYN Packet X SYN-ACK X SYN-ACK Hacker Target Server
Types of DDoS Attacks 3. Application Based Attack Sophisticated attacks that crash the entire server by targeting application and OS level vulnerabilities. It can stop specific applications from delivering necessary information. Example – HTTP Flooding, BGP Hijacking HTTP POST/GET HTTP POST/GET HTTP POST/GET Botnet Target Server
Aim of DDoS Attacks 1. Competitive advantage against rival business
Aim of DDoS Attacks 2. Ransom demands for releasing data
Aim of DDoS Attacks 3. Activist behavior for protests and upstaging
Prevention of DDoS Attacks Employ load balancers and firewalls
Prevention of DDoS Attacks 2. Detect an attack early and mitigate the damage beyond that point
Prevention of DDoS Attacks 3. Switch to cloud service providers like AWS and Azure
Prevention of DDoS Attacks 4. Allocate more bandwidth to prevent clogging of data.
Prevention of DDoS Attacks 5. Using content delivery networks(CDNs) that have redundant servers
Live Demo of DDoS Attack • For now, we have a single device to launch an attack from, making it a DOS attack of sorts. • We will use a virtualized instance Parrot Security OS to launch an attack. • Our target machine is another VM instance running a standard Linux distribution called ‘Linux Lite’. • We will use Wireshark to see how an attack can be detected from the target’s device.