Network Attacks Dylan Small
Roadmap History of Network Attacks Current Network Attacks Software Used Blocking Network Attacks Future of Network attacks
History of Network Attacks Previously DDoS attacks were the only method of network attacking DDoS or Distributed Denial of Service attack is when the hacker floods a server with millions of packets and make the server unusable This is a brute force type attack
DDoS Attacks What DDoS attacks aim to do is overload the remote servers’ usage of computational resources, such as bandwidth, memory, disk space, or processor time What this does is make the website or whatever the server is hosting unusable and unable to be accessed by its users The ultimate goal of DDoS attacks is to crash the remote server
https://www.youtube.com/watch?v=OhA9PAfkJ10
Software Used Low Orbit Ion Cannon (LOIC) - An easy to use GUI that makes DDoS attacking easy for anyone All you have to do is type in the target URL, add a message in there if you want and then click “IMMA CHARGIN MAH LAZER”
Protecting against DDoS Attacks https://www.youtube.com/watch?v=AXzZZa1sITw
Protecting against DDoS Attacks Properly configured internet routers and switches can greatly reduce the effectiveness of DDoS attacks Many internet routers have built in Automatic DDoS attack detection, so if DDoS packets are detected they will be discarded and not interfere with regular packets Having complex rules in place in routers and switches greatly decreases effectiveness of DDoS attacks but nothing is completely safe
Passive Attacks Passive Attacks monitor unencrypted traffic and looks for clear-text passwords and sensitive information that can be used in other types of attacks This can include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capturing authentication information such as passwords
Insider Attacks Just like the title says, an insider attack is when someone from the “inside” of the organization attacks the network With the information that is gathered the attacker can eavesdrop, steal, or damage information within the organization
Phishing Attacks Phishing is when attackers create a website that looks like a real website but login information is sent to attackers instead of the real organization
Phishing Attacks How to prevent being “phished” Check the URL in the address bar and make sure it is the real one ie Facebook.com instead of face-book.com Follow Amanda Marshalls emails
Sources http://en.wikipedia.org/wiki/DDoS_mitigation http://www.cisco.com/c/en/us/products/collateral/security/traffic-anomaly-detector-xt-5600a/prod_white_paper0900aecd8011e927.html https://www.google.com/search?q=ddos&rlz=1CAACAJ_enUS634US634&oq=ddos&aqs=chrome.0.69i59j0l5.506j0j4&sourceid=chrome&es_sm=0&ie=UTF-8 http://en.wikipedia.org/wiki/Denial-of-service_attack http://www.digitalattackmap.com/understanding-ddos/ https://www.youtube.com/watch?v=AXzZZa1sITw https://www.youtube.com/watch?v=OhA9PAfkJ10