ch7-2025
ch7-2025
Chapter 7
Denial-of-Service Attacks
Information Security
2025 Spring Semester
Younho Lee
Learning Objective
❖Explain denial-of-service attack
❖Understanding flooding attack
❖Describe distributed denial-of-service attacks
❖Explain an application-based bandwidth attack with examples
❖Present an overview of reflector and amplifier attacks
❖Summarize some of the common defences against denial-of-service
attacks
❖Summarize common responses to denial-of-service attacks
Denial of Service (Dos) Attack
❖ The NIST Computer Security Incident Handling Guide defines a DoS
attack as:
▪ Traffic can be handled by higher capacity links on the path, but packets
are discarded as capacity decreases
Request
Will be full
Reply of ping
packets
A B
Classic DoS Attacks (Cont’d)
UDP flood • Uses UDP packets directed to some port number on the target
system
Attacker Advertise
Denial of Service
SYN Spoofing
❖ Attacks the ability of a server to respond to future connection
requests by overflowing the tables used to manage them
→ Legitimate users are denied access to the server
→ An attack on system resources, specifically the network handling
code in the operating system
❖ Slowloris
▪ Attempts to monopolize all handling threads by sending HTTP requests that
never complete
• Do not send ‘terminating new line’ sequence
Server
▪ Eventually consumes Web server’s connection capacity
▪ Utilizes legitimate HTTP traffic
▪ Most of existing signature-based Intrusion Detection and Prevention
cannot recognize Slowloris
Send a chunk of Attacker
request periodically
HTTP Request Packet Format
Refletor and Amplifier Attacks
Reflection Attacks
❖ Purpose
▪ To generate enough volumes of packets to flood the link to the target
system without alerting intermediary
❖ Method
▪ Send packets to a known service on the intermediary with a spoofed source
address of the actual target system
▪ When intermediary responds,
the response is sent to the
target
❖ Defense
▪ Blocking spoofed-source
packets
Amplification Attacks
❖ Similar to reflecting but generates multiple response packets per
each original packet sent
❖ Can be achieved by directing the original request to the broadcast
address
❖ Example
▪ Ping flooding using ICMP each request to broadcast address
Defenses Against Denial of Service Attacks (1/3)
Attack reaction
• After the attack
Defenses Against Denial of Service Attacks (2/3) Block the spoofed
packets going to
the Internet
DoS Attack Prevention ISP
Internet
❖ Block spoofed source addresses
▪ On routers as close to source as possible
▪ Filters may be used to ensure path back to the claimed source address is
the one being used by the current packet
• Filters must be applied to traffic before it leaves the ISP’s network or at the point
of entry to their network