Sunday 1 November 2015

DoS & DDoS Attacks

Hello, Today I am Telling You about DoS & DDoS Attacks.

Denial of Service Attacks (DoS) & Distributed Denial of Service Attack (DDoS)

(DDoS) Definition
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.

Types of DoS Attacks

The most common type of Denial of Service attack involves flooding the target resource with external communication requests. This overload prevents the resource from responding to legitimate traffic, or slows its response so significantly that it is rendered effectively unavailable.

Resources targeted in a DoS attack can be a specific computer, a port or service on the targeted system, an entire network, a component of a given network any system component. DoS attacks may also target human-system communications (e.g. disabling an alarm or printer), or human-response
systems (e.g. disabling an important technician's phone or laptop).

DoS attacks can also target tangible system resources, such as computational resources (bandwidth, disk space, Processor time); configuration information (routing information, etc.); state information (for example, unsolicited TCP session resetting). Moreover, a DoS attack can be designed to: execute malware that maxes out the processor, preventing usage; trigger errors in machine microcode or sequencing of instructions, forcing the computer into an unstable state; exploit operating system vulnerabilities to sap system resources; crash the operating system altogether.

The overriding similarity in these examples is that, as a result of the successful Denial of Service attack, the system in question does not respond as before, and service is either denied or severly limited.

Difference Between DoS and DDoS Attack

It is important to differentiate between Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks.

In a DoS attack, one computer and one internet connection is used to flood a server with packets, with the aim of overloading the targeted server’s bandwidth and resources.

DDoS attack, uses many devices and multiple Internet connections, often distributed globally into what is referred to as a botnet. A DDoS attack is, therefore, much harder to deflect, simply because there is no single attacker to defend from, as the targeted resource will be flooded with requests from many hundreds and thousands of multiple sources.

Types of DDoS Attacks

DDoS attacks can be divided in three types:
* Volume Based Attacks
Includes UDP floods, ICMP floods, and other spoofed-packet floods. The attack’s goal is to saturate the bandwidth of the attacked site, and magnitude is measured in bits per second (Bps).
* Protocol Attacks
Includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. This type of attack consumes actual server resources, or those of intermediate communication equipment, such as firewalls and load balancers, and is measured in Packets per second.
* Application Layer Attacks
Includes Slowloris, Zeroday DDoS attacks, DDoS attacks that target Apache, Windows or OpenBSD vulnerabilities and more. Comprised of seemingly legitimate and innocent requests, the goal of these attacks is to crash the web server, and the magnitude is measured in Requests per second.

Preventing Denial of Service Attacks

Rapid identification and response can prevent DoS attacks. The first challenge for any DoS protection scheme is to quickly and effectively identify incoming traffic as malicious. Once the flood of traffic is identified as a DoS attack, rather than – for example – a spike in legitimate site traffic, an effective response will generally involve setting up a scalable infrastructure to absorb the attack, until the source is identified and blocked.

A specifically targeted DDoS attack is impossible to prevent, but there are excellent and effective tools that can help mitigate the impact of such an attack.


Don't Forget To Say Thanks!!!

No comments:

Post a Comment