-SHAMBHAVI PARADKAR TE COMP 411145.  PORT SCANNING.  DENIAL OF SERVICE(DoS). - DISTRIBUTED DENIAL OF SERVICE(DDoS). REFER Pg.637 & Pg.638.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
System Security Scanning and Discovery Chapter 14.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Port Scanning Yiqian Zhang CS 265 Project. What is Port Scanning? port scanning is equivalent to knocking on the walls to find all the doors and windows.
Web server security Dr Jim Briggs WEBP security1.
Computer Security and Penetration Testing
DENIAL OF SERVICE ATTACK
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Introduction to Honeypot, Botnet, and Security Measurement
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
13.1 Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Security.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
CIS 450 – Network Security Chapter 3 – Information Gathering.
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
--Harish Reddy Vemula Distributed Denial of Service.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Hands on with BackTrack Information gathering, scanning, simple exploits By Edison Carrick.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Linux Networking and Security
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
Ethics of Distributed DoS (Why TFN is Evil) March 2, 2000 Mintcho Petkov Dartmouth College.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
CSE715 Presentation Project Fall 2004 by Michael Alexandrou and Rusty Coleman.
Malicious Software.
Chapter 9 Intruders.
1 ForeScout Technologies Inc. Frontline Defense against Network Attack Tim Riley, Forescout.
Advanced Anti-Virus Techniques
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre.
Outline Securing your system before the IDS and some tools to help you
Port Knocking Benjamin DiYanni.
State Board of Elections Computers
Common Methods Used to Commit Computer Crimes
Backdoor Attacks.
Threats to computers Andrew Cormack UKERNA.
Forensics Week 12.
Red Team Exercise Part 3 Week 4
WJEC GCSE Computer Science
Presentation transcript:

-SHAMBHAVI PARADKAR TE COMP

 PORT SCANNING.  DENIAL OF SERVICE(DoS). - DISTRIBUTED DENIAL OF SERVICE(DDoS). REFER Pg.637 & Pg.638

 The act of systematically scanning a computer's ports.  Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer.  Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.

 There is no way to stop someone from port scanning your computer while you are on the Internet because accessing an Internet server opens a port, which opens a door to your computer.

 It is not an attack, but mean for a cracker to detect system’s vulnerabilities to attack.  It is automated that involves a tool that creates an IP connection to a specific port or range of ports.  There are tools that perform subsets of their functionality.

 1] nmap (from  It is a versatile open source utility for network exploration & security audition.  When pointed at a target,it will determine what services are running including application names & versions.  It can identify the host OS and provides information about defences.  It does not exploit any known bugs.

2] nessus (from  It has a database of their of bugs and their exploits.  It can scan a range of systems, determine the services running on those systems, and attempt to attack all appropriate bugs.  It generates reports about the results.  It does not perform the final step of exploiting the found bugs what a cracker could.

 Since port scanning are detectable they are frequently launched from zombie systems.  Such systems are previously compromised, independent systems that are serving their owners while being used for neferious purposes including denial of services attacks and spam relay.  Zombies make crackers difficult to prosecute since determining the source of attacks & the person that launched is challenging.

 These are aimed at disrupting legitimate use of a system or facility.  It is a type of attack on network that is designed to bring network to the knees by flooding it with useless traffic.  It is impossible to prevent denial of service attacks.

 It is more difficult to prevent & resolve.  These attacks are launched from multiple sites at once, towards a common target typically by zombies.  These attacks are mostly associated with blackmail attempts.  Ex. A successful advertising campaign that generally increases traffic to a site.

 Write a short note on port scanning. Give examples.  Explain on denial of service.