SlideShare a Scribd company logo
Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited [email_address]
Topics Covered What is Denial of Service? Categories and types of Denial of Service attacks Direct Denial of Service attacks Single-tier attacks Dual-tier attacks Triple-tier 'distributed' attacks Indirect Denial of Service attacks The LoveBug virus Code Red and Nimda worms Denial of Service prevention strategies and resources
What is Denial of Service? Denial of Service (refered to as DoS for the remainder of this presentation), is a computer or network state which is induced purposefully by an attacker to inhibit that computer or network's ability to function correctly and provide service. DoS attacks are launched on the Internet landscape in network form, where the attacking computer sends crafted network packets (TCP, UDP or ICMP) to the target host.
The Underlying DoS Concept As with any form of 'hack attack', a vulnerability is exploited so that the attacker can change the operating state of a machine. Early Microsoft Windows 95 machines were vulnerable to 'winnuke' and 'ping of death' attacks, where the TCP/IP stack implemented by Microsoft was simple and could not handle large fragmented packets or out-of-bound data correctly. Hackers wrote simple programs that sent crafted out-of-bound and fragmented packets to the target IP address, causing it to crash and display the infamous 'blue screen of death'. Other attack types take advantage of vulnerabilities at network level with the way that the Internet sends data between networks and responds to certain data. .
Direct and Indirect DoS Internet-based network attacks can be categorised in two ways.. Direct DoS attack model, where a specific DoS system is developed and rolled out by an attacker with an aim to take down a specific network or computer. Indirect DoS attack model, where a worm or virus is at large in the wild, which causes DoS and disruption as a result of its spreading.
Direct DoS Attack Systems Over the years, direct DoS attack systems have improved - 1990 - 1997 single-tier DoS attack systems late 1997 dual-tier DoS attack systems 1998 – 2000 triple-tier DoS attack systems An interesting fact is that All  direct DoS attack systems originate and were developed by users of Internet Relay Chat (IRC) networks, in some cases to specifically take down IRC servers (with dual & triple-tier attacks).
Direct Single-tier DoS Attacks Straightforward 'point-to-point' attack Application / system level vulnerabilities abused If no application / system level vulnerabilities exist, brute force is used by attackers with more bandwidth than the victim Examples Ping of Death SYN floods Other malformed packet attacks
 
 
Protecting Against Direct Single-tier DoS Attacks Ensuring all relevant security hotfixes and service packs are installed on your hosts to prevent system level attacks through malformed packets. Deploying a personal IDS or firewall system if you're using a dialup, to identify the sources of attacks and protect in most cases.
Direct Dual-tier DoS Attacks More complex attack model Network level vulnerabilities abused Misconfigured network broadcasts Difficult for victim to trace and identify attacker Examples Smurf
 
Protecting Against Direct Dual-tier DoS Attacks Prevention at the source, ensuring that your networks are not misconfigured to be used as 'smurf amplifiers'. Deploying a network-based IDS to identify DoS attempts and identify the attacker himself by analysing network traffic at the time of the attack. Ensuring you have a contact detail at your ISP in order to quickly block packets from misconfigured networks in the event of a serious attack.
Direct Triple-tier DDoS Attacks Highly complex attack model, known as Distributed Denial of Service (DDoS). DDoS exploits vulnerabilities in the very fabric of the Internet, making it virtually impossible to protect your networks against this level of attack. Extremely dangerous attack type. When Yahoo! Came under attack from a DDoS flood network in the summer of 2000, it saw over 1Gbit of network traffic being sent to it's web farm. Examples TFN2K Stacheldraht Mstream
The Components of a DDoS Flood Network Attacker Often a hacker with good networking and routing knowledge. Master servers Handful of backdoored machines running DDoS master software, controlling and keeping track of available zombie hosts. Often master servers exist on very fast Internet connections, so that they can quickly process and communicate attack details with zombie hosts. Zombie hosts Thousands of backdoored hosts over the world
 
Protecting Against Direct Triple-tier DDoS Attacks Prevention at the source, ensuring that your hosts are not vulnerable to 'point and click' type automated attacks. Deployment of network-based IDS to identify - Master to Zombie DDoS control traffic Zombie to Victim flood attack traffic Ensuring you have a contact detail at your ISP in order to quickly block packets from zombie hosts and networks in the event of a serious attack. Implementation of a security policy defining how your organisation reacts to these threats effectively.
Indirect DoS Attacks Indirect DoS attacks come about when a worm of virus is at large in the wild, which causes DoS and disruption as a result of its spreading. Examples of worms and viruses which have caused indirect DoS in this fashion - The Love Bug Code Red and Code Red II Nimda
DoS Prevention Strategies Create a security policy covering DoS response Prepare for 100% bandwidth consumption, implement back-up lines for data and voice communications in the event of a DoS attack Ensure your Internet-based network security is at a good level to prevent compromises and misuse of your networks and bandwidth Embrace Intrusion Detection Systems (IDS) to identify DoS traffic and even the attacker in most cases Establish good communication channels between you and your ISP to block DoS attacks at Internet-level
DoS Prevention Resources The following sites provide guidance when configuring firewalls, IDS and border routers to prevent DoS attacks from being effective - http://www.nipc.gov NIPC DoS tools http://www.cert.org CERT DoS information http://razor.bindview.com RAZOR 'zombie zapper' http://staff.washington.edu/dittrich/misd/ddos/ Dave Dittrich's DDoS web site
The End Thanks for Listening! Chris McNab Principal Consultant, Matta Security Limited [email_address]

More Related Content

PPTX
Dos n d dos
sadhana21297
 
PPTX
An introduction to denial of service attacks
Rollingsherman
 
PPTX
Denial of service
garishma bhatia
 
PPTX
DoS or DDoS attack
stollen_fusion
 
PPTX
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
 
PPTX
Denial of Service Attack
Dhrumil Panchal
 
PPT
DDoS Attacks
Jignesh Patel
 
PPTX
Denial of service attack
Ahmed Ghazey
 
Dos n d dos
sadhana21297
 
An introduction to denial of service attacks
Rollingsherman
 
Denial of service
garishma bhatia
 
DoS or DDoS attack
stollen_fusion
 
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
 
Denial of Service Attack
Dhrumil Panchal
 
DDoS Attacks
Jignesh Patel
 
Denial of service attack
Ahmed Ghazey
 

What's hot (20)

PDF
12 types of DDoS attacks
Haltdos
 
PPTX
Denial of service attack
Kaustubh Padwad
 
PPTX
DDoS - Distributed Denial of Service
Er. Shiva K. Shrestha
 
PPTX
Destributed denial of service attack ppt
OECLIB Odisha Electronics Control Library
 
PPTX
Dos attack
Manjushree Mashal
 
PPTX
Basics of Denial of Service Attacks
Hansa Nidushan
 
PPT
DDOS Attack
Ahmed Salama
 
PPTX
WannaCry ransomware attack
Abdelhakim Salama
 
PPT
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
PDF
Denial of Service Attack Project
Nadim Ebadi
 
PPTX
An introduction to denial of service attack
Mohammad Reza Mousavinasr
 
PPTX
Ddos attacks
communication-eg
 
PPTX
Cyber Security Case Studies
Moksha Kalyan Ram Abhiramula
 
PPTX
Assingement on dos ddos
kalyan kumar
 
PPTX
Ransomware attack
Amna
 
PPTX
Man in the middle attack (mitm)
Hemal Joshi
 
PPTX
Cyber crime and secuity
Alisha Korpal
 
PPTX
Ddos and mitigation methods.pptx (1)
btpsec
 
PPTX
Intrusion detection system
Sweta Sharma
 
PPTX
Malware & Anti-Malware
Arpit Mittal
 
12 types of DDoS attacks
Haltdos
 
Denial of service attack
Kaustubh Padwad
 
DDoS - Distributed Denial of Service
Er. Shiva K. Shrestha
 
Destributed denial of service attack ppt
OECLIB Odisha Electronics Control Library
 
Dos attack
Manjushree Mashal
 
Basics of Denial of Service Attacks
Hansa Nidushan
 
DDOS Attack
Ahmed Salama
 
WannaCry ransomware attack
Abdelhakim Salama
 
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
Denial of Service Attack Project
Nadim Ebadi
 
An introduction to denial of service attack
Mohammad Reza Mousavinasr
 
Ddos attacks
communication-eg
 
Cyber Security Case Studies
Moksha Kalyan Ram Abhiramula
 
Assingement on dos ddos
kalyan kumar
 
Ransomware attack
Amna
 
Man in the middle attack (mitm)
Hemal Joshi
 
Cyber crime and secuity
Alisha Korpal
 
Ddos and mitigation methods.pptx (1)
btpsec
 
Intrusion detection system
Sweta Sharma
 
Malware & Anti-Malware
Arpit Mittal
 
Ad

Viewers also liked (6)

PPT
Cyberstalking
Trevschic
 
PPTX
IP Spoofing
Akmal Hussain
 
PPTX
Cyberstalking
Dawid Kryniewski
 
PPTX
Spoofing Techniques
Raza_Abidi
 
PPT
Ip Spoofing
arpit.arp
 
PPTX
cyber stalking
Rishabh Kataria
 
Cyberstalking
Trevschic
 
IP Spoofing
Akmal Hussain
 
Cyberstalking
Dawid Kryniewski
 
Spoofing Techniques
Raza_Abidi
 
Ip Spoofing
arpit.arp
 
cyber stalking
Rishabh Kataria
 
Ad

Similar to Denail of Service (20)

PDF
denialofservice.pdfdos attacck basic details with interactive design
perfetbyedshareen
 
PDF
A041201010
ijceronline
 
PPTX
Denial of Service (DoS) and Distributed DoS (DDoS) Attacks
Swarup Saw
 
PDF
International Journal of Computational Science and Information Technology (I...
ijcsity
 
PDF
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Professor Lili Saghafi
 
PPTX
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
PriyadharshiniHemaku
 
PDF
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
ijasa
 
PDF
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
TechApprise
 
PPT
Protecting your business from ddos attacks
Saptha Wanniarachchi
 
PPTX
DDOS ATTACKS
Shaurya Gogia
 
PDF
File000144
Desmond Devendran
 
PDF
Ddos- distributed denial of service
laxmi chandolia
 
PPTX
DDoS attacks
Ch Anas Irshad
 
PPT
DDoS.ppt
EllenSutiyem
 
PPTX
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
Suhail Khan
 
PPT
Module 9 Dos
leminhvuong
 
PDF
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
 
PDF
types and DOS attack & basics of denial of service.pdf
jayaprasanna10
 
PPTX
basicsofdenialofservice-160223110554.pptx
Samir476183
 
PPT
Denial of services : limiting the threat
SensePost
 
denialofservice.pdfdos attacck basic details with interactive design
perfetbyedshareen
 
A041201010
ijceronline
 
Denial of Service (DoS) and Distributed DoS (DDoS) Attacks
Swarup Saw
 
International Journal of Computational Science and Information Technology (I...
ijcsity
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Professor Lili Saghafi
 
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
PriyadharshiniHemaku
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
ijasa
 
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
TechApprise
 
Protecting your business from ddos attacks
Saptha Wanniarachchi
 
DDOS ATTACKS
Shaurya Gogia
 
File000144
Desmond Devendran
 
Ddos- distributed denial of service
laxmi chandolia
 
DDoS attacks
Ch Anas Irshad
 
DDoS.ppt
EllenSutiyem
 
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
Suhail Khan
 
Module 9 Dos
leminhvuong
 
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
 
types and DOS attack & basics of denial of service.pdf
jayaprasanna10
 
basicsofdenialofservice-160223110554.pptx
Samir476183
 
Denial of services : limiting the threat
SensePost
 

More from Ramasubbu .P (20)

PPT
radar
Ramasubbu .P
 
PPT
Press
Ramasubbu .P
 
PPT
Milling 2
Ramasubbu .P
 
PPT
MIlling 1
Ramasubbu .P
 
PPT
Drillings
Ramasubbu .P
 
PPT
Holding
Ramasubbu .P
 
PPT
Saftey
Ramasubbu .P
 
PPT
Harvesting
Ramasubbu .P
 
PPT
Plough
Ramasubbu .P
 
PPT
Tractor PTO
Ramasubbu .P
 
PPT
Tractor Components
Ramasubbu .P
 
PPT
MSAT
Ramasubbu .P
 
PPT
GPS
Ramasubbu .P
 
PPT
RTOS
Ramasubbu .P
 
PPT
Virus
Ramasubbu .P
 
PPT
Hacker
Ramasubbu .P
 
PPT
RAID CONCEPT
Ramasubbu .P
 
PPT
Network Security
Ramasubbu .P
 
PPT
Timer
Ramasubbu .P
 
PPT
Sequential Logic Circuit
Ramasubbu .P
 
Milling 2
Ramasubbu .P
 
MIlling 1
Ramasubbu .P
 
Drillings
Ramasubbu .P
 
Holding
Ramasubbu .P
 
Saftey
Ramasubbu .P
 
Harvesting
Ramasubbu .P
 
Plough
Ramasubbu .P
 
Tractor PTO
Ramasubbu .P
 
Tractor Components
Ramasubbu .P
 
Hacker
Ramasubbu .P
 
RAID CONCEPT
Ramasubbu .P
 
Network Security
Ramasubbu .P
 
Sequential Logic Circuit
Ramasubbu .P
 

Recently uploaded (20)

PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Doc9.....................................
SofiaCollazos
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 

Denail of Service

  • 1. Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited [email_address]
  • 2. Topics Covered What is Denial of Service? Categories and types of Denial of Service attacks Direct Denial of Service attacks Single-tier attacks Dual-tier attacks Triple-tier 'distributed' attacks Indirect Denial of Service attacks The LoveBug virus Code Red and Nimda worms Denial of Service prevention strategies and resources
  • 3. What is Denial of Service? Denial of Service (refered to as DoS for the remainder of this presentation), is a computer or network state which is induced purposefully by an attacker to inhibit that computer or network's ability to function correctly and provide service. DoS attacks are launched on the Internet landscape in network form, where the attacking computer sends crafted network packets (TCP, UDP or ICMP) to the target host.
  • 4. The Underlying DoS Concept As with any form of 'hack attack', a vulnerability is exploited so that the attacker can change the operating state of a machine. Early Microsoft Windows 95 machines were vulnerable to 'winnuke' and 'ping of death' attacks, where the TCP/IP stack implemented by Microsoft was simple and could not handle large fragmented packets or out-of-bound data correctly. Hackers wrote simple programs that sent crafted out-of-bound and fragmented packets to the target IP address, causing it to crash and display the infamous 'blue screen of death'. Other attack types take advantage of vulnerabilities at network level with the way that the Internet sends data between networks and responds to certain data. .
  • 5. Direct and Indirect DoS Internet-based network attacks can be categorised in two ways.. Direct DoS attack model, where a specific DoS system is developed and rolled out by an attacker with an aim to take down a specific network or computer. Indirect DoS attack model, where a worm or virus is at large in the wild, which causes DoS and disruption as a result of its spreading.
  • 6. Direct DoS Attack Systems Over the years, direct DoS attack systems have improved - 1990 - 1997 single-tier DoS attack systems late 1997 dual-tier DoS attack systems 1998 – 2000 triple-tier DoS attack systems An interesting fact is that All direct DoS attack systems originate and were developed by users of Internet Relay Chat (IRC) networks, in some cases to specifically take down IRC servers (with dual & triple-tier attacks).
  • 7. Direct Single-tier DoS Attacks Straightforward 'point-to-point' attack Application / system level vulnerabilities abused If no application / system level vulnerabilities exist, brute force is used by attackers with more bandwidth than the victim Examples Ping of Death SYN floods Other malformed packet attacks
  • 8.  
  • 9.  
  • 10. Protecting Against Direct Single-tier DoS Attacks Ensuring all relevant security hotfixes and service packs are installed on your hosts to prevent system level attacks through malformed packets. Deploying a personal IDS or firewall system if you're using a dialup, to identify the sources of attacks and protect in most cases.
  • 11. Direct Dual-tier DoS Attacks More complex attack model Network level vulnerabilities abused Misconfigured network broadcasts Difficult for victim to trace and identify attacker Examples Smurf
  • 12.  
  • 13. Protecting Against Direct Dual-tier DoS Attacks Prevention at the source, ensuring that your networks are not misconfigured to be used as 'smurf amplifiers'. Deploying a network-based IDS to identify DoS attempts and identify the attacker himself by analysing network traffic at the time of the attack. Ensuring you have a contact detail at your ISP in order to quickly block packets from misconfigured networks in the event of a serious attack.
  • 14. Direct Triple-tier DDoS Attacks Highly complex attack model, known as Distributed Denial of Service (DDoS). DDoS exploits vulnerabilities in the very fabric of the Internet, making it virtually impossible to protect your networks against this level of attack. Extremely dangerous attack type. When Yahoo! Came under attack from a DDoS flood network in the summer of 2000, it saw over 1Gbit of network traffic being sent to it's web farm. Examples TFN2K Stacheldraht Mstream
  • 15. The Components of a DDoS Flood Network Attacker Often a hacker with good networking and routing knowledge. Master servers Handful of backdoored machines running DDoS master software, controlling and keeping track of available zombie hosts. Often master servers exist on very fast Internet connections, so that they can quickly process and communicate attack details with zombie hosts. Zombie hosts Thousands of backdoored hosts over the world
  • 16.  
  • 17. Protecting Against Direct Triple-tier DDoS Attacks Prevention at the source, ensuring that your hosts are not vulnerable to 'point and click' type automated attacks. Deployment of network-based IDS to identify - Master to Zombie DDoS control traffic Zombie to Victim flood attack traffic Ensuring you have a contact detail at your ISP in order to quickly block packets from zombie hosts and networks in the event of a serious attack. Implementation of a security policy defining how your organisation reacts to these threats effectively.
  • 18. Indirect DoS Attacks Indirect DoS attacks come about when a worm of virus is at large in the wild, which causes DoS and disruption as a result of its spreading. Examples of worms and viruses which have caused indirect DoS in this fashion - The Love Bug Code Red and Code Red II Nimda
  • 19. DoS Prevention Strategies Create a security policy covering DoS response Prepare for 100% bandwidth consumption, implement back-up lines for data and voice communications in the event of a DoS attack Ensure your Internet-based network security is at a good level to prevent compromises and misuse of your networks and bandwidth Embrace Intrusion Detection Systems (IDS) to identify DoS traffic and even the attacker in most cases Establish good communication channels between you and your ISP to block DoS attacks at Internet-level
  • 20. DoS Prevention Resources The following sites provide guidance when configuring firewalls, IDS and border routers to prevent DoS attacks from being effective - http://www.nipc.gov NIPC DoS tools http://www.cert.org CERT DoS information http://razor.bindview.com RAZOR 'zombie zapper' http://staff.washington.edu/dittrich/misd/ddos/ Dave Dittrich's DDoS web site
  • 21. The End Thanks for Listening! Chris McNab Principal Consultant, Matta Security Limited [email_address]