You are on page 1of 13

IET PRESENTATION

GOVERNMENT
BHARUCH

ENGINEERING

COLLEGE ,

PRESENTED BY : 140140111092
140140111093
140140111094
140140111097

CONTENTS
What is a Denial of Service Attack?
What is a Distributed Denial of Service
Attack?
Why Are They Difficult to Protect Against?
Types of Denial of Service Attacks
Tools for Running Denial of Service Attacks
Preventing Denial of Service Attacks

What is a Denial Of Service Attack?


An attack that is specifically designed to prevent the
normal functioning of a system, and thereby to prevent
lawful access to that system and its data by its
authorized users. DOS can be caused by the destruction
or modification of data, by bringing down the system, or
by overloading the system's servers to the extent that
service to authorized users is delayed or prevented.
DoS goals
Flooding a network
Disrupting connections between two specific
machines
Preventing a service access to a specific entity or to
all individuals

Main aim to stop the victims machine from doing its


required job
Server unable to provide service to legitimate clients
Damage done varies from minor inconvenience to major
financial losses

What is a Distributed Denial of


Service Attack?
Use of Several to Thousands of machines to initiate
a Denial of Service attack.
Yahoo!,eBay, and Amazon were struck with DDoS in
February 2000.
Most go Unreported.
Most common form of attack on the Internet today.
Recent Study showed more than 12000 DoS (DDoS)
attacks during a 3 week period.
Actual number is probably higher

Costs of a Ddos Attacks

Problem: Need an automatic way of


classifying DoS attacks into these two
classes: single- and multi-source.
Because: Different types of attacks
(single- or multi-source) are handled
differently.
Classification is not easy. For instance,
packets can be spoofed by attacker.

Why Are They Difficult To Protect Against ?

Threats are always there.


Trade offs between Security and
Functionality
Resources used to Protect against
DDOS are
Costly
Time Consuming
Restrictive

Preventing Denial of Service Attacks


Nothing can be done to entirely prevent
DOS.
To minimize the dangers ,
Effective Design
Bandwidth Limitations
Run the least amount of services
Allow only necessary traffic
Block IP addresses

Demonstration of Minimizing Your


Computers Vulnerability
Antivirus
Layered Security
Distributed Resources
Bandwidth Throttling
Physical Security

Types of Attacks
Bandwidth Consumption: All available
bandwidth used by the attacker .
Resource Consumption: Resources like web
server, print or mail server flooded with
useless requests e.g., mail bomb
Network Connectivity: The attacker forces the
server to stop communicating on the network .

Selective Targeting

Windows end-users are increasingly targeted because

less technically sophisticated


less protected
slow response to security alerts/events
well-known netblocks
widespread broadband connectivity
increase in home networking
exploit technology base is maturing

THANK YOU

You might also like