0% found this document useful (0 votes)
17 views

DOS ATTACKS.pdf

Ppt of Dos attacks

Uploaded by

jasmiththakur4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

DOS ATTACKS.pdf

Ppt of Dos attacks

Uploaded by

jasmiththakur4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

KESHAV MEMORIAL COLLEGE OF ENGINEERING

(Approved by AICTE and Affiliated to JNTUH)

Departement of Computer Science and Engineering


A
Seminar Presentation
on
DOS Attack

Presented by
K.LAKSHMI PRASANNA 22P85A0506
CONTENTS

➢ Introduction to DOS Attack


➢ IP Spoofing
➢ Types of DOS Attack
➢ Distributed DOS Attack
➢ Recommended Tool to perform DOS Attack
➢ Counter Measures
➢ Conclusion
➢ INTRODUCTION TO DOS ATTACK
Denial of Service (DoS) attacks are intentional efforts to make a network resource
unavailable to its intended users By exploiting system vulnerabilities or overwhelming resources.
DoS attacks have become a widespread threat due to their simplicity and effectiveness. Hackers
use these attacks to gain recognition, disrupt services, and exploit vulnerabilities for personal or
financial gain.

➢ Attack methods include :

• Exploiting TCP/IP protocol weaknesses.


• Using IPv4 vulnerabilities.
• Brute force attacks to consume system resources.
IMPACT
• Affects targeted systems and surrounding network infrastructure.
• Can disrupt entire regions due to poorly configured equipment.
➢ IP SPOOFING
IP spoofing is a cyberattack technique where attackers forge source IP addresses to
disguise malicious traffic as coming from trusted sources. It is commonly used in
DDoS attacks like Smurf and SYN floods or for session hijacking by exploiting
protocol vulnerabilities. This tactic conceals the attacker's identity and bypasses
authentication measures. Mitigation includes ingress/egress filtering, deep packet
inspection, and firewalls with anti-spoofing features. Properly configured modern
security solutions can significantly reduce the risk of IP spoofing attacks.
TYPES OF DOS ATTACK
➢ PING OF DEATH

The Ping of Death attack sends oversized ICMP packets exceeding


65,535 bytes to exploit buffer overflows, causing system crashes or
reboots. Modern systems now mitigate this by block in over size
packets.

➢ TEARDROP

The Teardrop Attack exploits vulnerabilities in IP packet reassembly


by sending overlapping fragments, causing system crashes or freezes.
Modern systems have patches to prevent this issue.
➢ SYN FLOODING ATTACK
➢ The SYN Flood attack overwhelms servers by sending numerous
incomplete TCP handshake requests, exhausting resources and
blocking legitimate connections. Mitigation includes using SYN
cookies and reducing connection timeouts.

➢ LAND ATTACK

➢ The Land Attack sends packets with identical source and destination
IPs and ports, causing the target to loop responses and crash. Modern
firewalls typically block such malformed packets.
➢ SMURF ATTACK
The Smurf Attack floods a victim with ICMP echo replies by sending
requests to broadcast addresses with a spoofed source IP. Mitigation
includes disabling ICMP broadcast responses and using ingress
filtering.
➢ DISTRIBUTED DOS ATTACK
A DDoS (Distributed Denial of Service) attack overwhelms a target system with massive traffic from
multiple compromised devices, making it unavailable. Since the attack comes from many sources,
blocking a single IP is ineffective, and it's hard to separate real user traffic from attack traffic.
➢ What is a distributed attack?
A DDoS uses a Trojan virus to infect and control many computers, launching coordinated attacks to
overwhelm a target system. These attacks come from multiple sources simultaneously, making them hard to
counter.

➢ What are application layer 7 DDoS attacks?


Layer 7 (Application Layer) attacks target specific web application functions, like login pages or shopping carts,
causing disruptions. These attacks are hard to detect because they mimic normal user behavior and adapt
quickly.
➢ RECOMMENDED TOOLS TO PERFORM DDOS ATTACK

Attack tools are readily accessible online, emphasizing the importance of awareness:

• Tribal Flood Network (TFN): Capable of ICMP, SYN, and UDP floods.
• Trinoo: Specializes in UDP flooding attacks.
• Stacheldraht: Combines TFN and Trinoo features with encryption.
• Win Trinoo: A Windows-based variant of Trinoo.
COUNTER MEASURES

➢ Prevention:
• Keep systems updated with the latest patches.
• Use strong antivirus software and tools that detect suspicious activities (IDS).
➢ Network Security:
• Set up routers to block fake or harmful data packets.
• Partner with your internet service provider (ISP) to detect and stop bad traffic before it reaches
you.
➢ Mitigation:
• Spread your website's traffic across multiple servers to avoid overload (load balancing).
• Have extra bandwidth ready to handle sudden traffic surges.
➢ Tools and Best Practices:
• Use monitoring tools like Tripwire (for Unix) and Wtrinscan.exe (for Windows) to check for
vulnerabilities.
➢ CONCLUSION
DDoS attack tools are easily accessible, making any internet host vulnerable. Effective
defense relies on vigilant system administration, including patching, monitoring, and
updating security software. As the internet evolves, so must countermeasures. Both
network-level solutions (e.g., traffic filtering) and individual defenses (e.g., IDS, antivirus,
firewalls) are essential. Cooperation between users, security developers, and network
operators is key to combating DDoS attacks.
THANK YOU

You might also like