DOS ATTACKS.pdf
DOS ATTACKS.pdf
Presented by
K.LAKSHMI PRASANNA 22P85A0506
CONTENTS
➢ TEARDROP
➢ LAND ATTACK
➢ The Land Attack sends packets with identical source and destination
IPs and ports, causing the target to loop responses and crash. Modern
firewalls typically block such malformed packets.
➢ SMURF ATTACK
The Smurf Attack floods a victim with ICMP echo replies by sending
requests to broadcast addresses with a spoofed source IP. Mitigation
includes disabling ICMP broadcast responses and using ingress
filtering.
➢ DISTRIBUTED DOS ATTACK
A DDoS (Distributed Denial of Service) attack overwhelms a target system with massive traffic from
multiple compromised devices, making it unavailable. Since the attack comes from many sources,
blocking a single IP is ineffective, and it's hard to separate real user traffic from attack traffic.
➢ What is a distributed attack?
A DDoS uses a Trojan virus to infect and control many computers, launching coordinated attacks to
overwhelm a target system. These attacks come from multiple sources simultaneously, making them hard to
counter.
Attack tools are readily accessible online, emphasizing the importance of awareness:
• Tribal Flood Network (TFN): Capable of ICMP, SYN, and UDP floods.
• Trinoo: Specializes in UDP flooding attacks.
• Stacheldraht: Combines TFN and Trinoo features with encryption.
• Win Trinoo: A Windows-based variant of Trinoo.
COUNTER MEASURES
➢ Prevention:
• Keep systems updated with the latest patches.
• Use strong antivirus software and tools that detect suspicious activities (IDS).
➢ Network Security:
• Set up routers to block fake or harmful data packets.
• Partner with your internet service provider (ISP) to detect and stop bad traffic before it reaches
you.
➢ Mitigation:
• Spread your website's traffic across multiple servers to avoid overload (load balancing).
• Have extra bandwidth ready to handle sudden traffic surges.
➢ Tools and Best Practices:
• Use monitoring tools like Tripwire (for Unix) and Wtrinscan.exe (for Windows) to check for
vulnerabilities.
➢ CONCLUSION
DDoS attack tools are easily accessible, making any internet host vulnerable. Effective
defense relies on vigilant system administration, including patching, monitoring, and
updating security software. As the internet evolves, so must countermeasures. Both
network-level solutions (e.g., traffic filtering) and individual defenses (e.g., IDS, antivirus,
firewalls) are essential. Cooperation between users, security developers, and network
operators is key to combating DDoS attacks.
THANK YOU