DDoS Attacks
DDoS Attacks
- Ayush (802332018)
- Abhinav (802332002)
- Nikhil (802332045)
Table of Contents
1. Introduction to DDoS Attacks
2. DoS vs DDoS
3. Working
4. Signs of a DDoS Attack
5. Types & Techniques
6. Preventive Measures
7. Detection Strategies
8. Mitigation Strategies
9. Case Studies
10. Conclusion
Introduction
● Distributed Denial of Service (DDoS) attacks are malicious attempts to disrupt
the normal functioning of a network, server, or website by overwhelming it
with an excessive amount of traffic.
● Unlike traditional DoS attacks that originate from a single source, DDoS
attacks involve multiple compromised devices. These devices simultaneously
flood the target with traffic.
Need:
● Understanding DDoS attacks helps organizations defend against them
effectively
DoS vs DDoS Attack
Working
1. Botnets and Bots:
● A botnet consists of compromised computers and devices (including IoT
devices) infected with malware.
● Each individual device in the botnet is called a bot or zombie.
● The attacker remotely controls these bots.
2. Attack Execution:
● The attacker directs the botnet to flood the target’s IP address with requests
and traffic.
● Legitimate users are pushed out, resulting in a denial-of-service.
● The target’s services become slow or entirely unavailable.
3. Exploiting Normal Behavior:
● Attackers flood a website or server with excessive internet traffic, overwhelming its capacity and
causing it to crash.
2. UDP Flood:
● Attackers send a flood of random data packets to the target, overloading its ability to process them
effectively.
● Attackers send multiple connection requests to the target server but don't complete the handshake
process, tying up resources and preventing legitimate connections.
4. Application Layer Attacks:
5. Reflection/Amplification Attacks:
6. Slowloris Attack:
● Implement rate limiting and traffic shaping policies to control the volume of incoming
traffic and prevent overwhelming network resources during DDoS attacks.
● Deploy systems for anomaly detection and traffic analysis to identify patterns
indicative of DDoS attacks, allowing for early detection and proactive response.
● Ensure that network infrastructure and server resources are adequately provisioned
to handle sudden spikes in traffic, allowing for scalability and resilience against
DDoS attacks.
6. Regular Security Audits and Updates:
2) A configuration screen will open. Fill in the columns to send notification emails to selected
personnel.
2) TTL times out:
● TTL is short for Time to Live—the time a packet is set to exist in a network before a router repudiates it. You can automate ping
alerts, and several service providers do that. This way, your website will be monitored around the clock. Ping time is the
duration taken by small datasets to be transmitted from a device to a server.
● This works on the principle that DDoS or DoS attacks consume undue bandwidth, so the ping time will be too long or time out
altogether.
2. Rate Limiting: Limit the rate of incoming traffic to prevent servers from being overwhelmed. This can involve
throttling connections from suspicious sources or implementing rate-limiting policies based on source IP
addresses or other criteria.
3. Content Delivery Networks (CDNs): Utilize CDNs to distribute traffic across multiple servers and data
centers. CDNs have built-in DDoS protection mechanisms that can absorb and mitigate large-scale attacks.
4. Cloud-based DDoS Protection Services: Engage the services of cloud-based DDoS protection providers
that specialize in mitigating DDoS attacks. These services typically employ a combination of traffic scrubbing, load
balancing, and rate limiting to mitigate attacks in real-time.
Case Studies
● To mitigate the impact of DDoS attacks, a multi-layered approach to prevention and response is essential. This includes
implementing traffic filtering and rate limiting, utilizing anomaly detection systems, leveraging content delivery networks
(CDNs) and web application firewalls (WAFs), maintaining scalable infrastructure, employing traffic scrubbing services,
managing IP reputation lists, establishing an incident response plan, implementing network segmentation, and continuously
monitoring and analyzing network traffic.
● By deploying these preventive measures and having robust response strategies in place, organizations can reduce their
susceptibility to DDoS attacks and minimize the potential damage caused by such incidents. However, as attackers
continually evolve their tactics and techniques, ongoing vigilance and adaptation are necessary to effectively defend against
this persistent threat.
THANK YOU!