0% found this document useful (0 votes)
52 views

CS04 DDoS Attacks

The document discusses denial of service (DoS) and distributed denial of service (DDoS) attacks. It provides an overview of different types of DoS attacks such as SYN flood attacks, Smurf attacks, and DDoS attacks. The document also describes weaknesses of DoS attacks and outlines specific defenses organizations can take including keeping systems updated with the latest patches and having a policy restricting downloads without IT approval.

Uploaded by

Lowe Birds
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

CS04 DDoS Attacks

The document discusses denial of service (DoS) and distributed denial of service (DDoS) attacks. It provides an overview of different types of DoS attacks such as SYN flood attacks, Smurf attacks, and DDoS attacks. The document also describes weaknesses of DoS attacks and outlines specific defenses organizations can take including keeping systems updated with the latest patches and having a policy restricting downloads without IT approval.

Uploaded by

Lowe Birds
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

9/1/2022

LEARNING OUTCOMES
• Understand how denial of service attacks are accomplished
• Know how certain denial of service attacks work, such as SYN

DDOS ATTACKS •
flood, Smurf, and distributed denial of service attacks
Take specific measures to protect against denial of service
attacks
Pengantar Keamanan Siber
#04 • Know how to defend against specific denial of service attacks

1 2

DOS VS
DOS ATTACK
DDOS

3 4

DOS VS DDOS

LOW ORBIT ION CANNON

5 6

1
9/1/2022

XOIC
DOS WEAKNESSES

OTHER Tribal Flood Network


The weakness in any DoS attack, from the attacker’s point of view,
is that the flood of packets must be sustained. As soon as the

TOOLS (TFN) packets stop being sent, the target system is back up. A DoS/DDoS
attack, however, is very often used in conjunction with another form
of attack, such as disabling one side of a connection in TCP
hijacking or preventing authentication or logging between servers.
Stacheldraht

7 8

SPECIFIC DOS ATTACKS (1) SPECIFIC DOS ATTACKS (2)


• TCP SYN Flood Attacks • UDP Flood
• Micro Blocks • ICMP Flood
• SYN Cookies • The Ping of Death
• RST Cookies • Teardrop Attacks
• Stack Tweaking • DHCP Starvation
• Smurf IP Attacks • etc

9 10

REAL WORLD EXAMPLES HOW TO DEFEND (MINIMUM)


• Boston Globe Attack on November 8, 2017 • Always use virus-scanning software and keep it updated.
• Find others in the news • Always keep operating system and software patches updated.
• Have an organizational policy stating that employees cannot
download anything onto their machines unless the download has
been cleared by the IT staff.

11 12

You might also like