Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams
Agenda Types of Attack Source of Attacks Prevention History of Attacks Business Aspect
TCP Connection Attack (SYN FLOOD) Normal Connection SYN Flood
HTTP Get Flood HTTP Post Flood Application Layer Attack
Source of Attack Botnets What are they? How are they Created? Notable Botnet Army’s ○ Storm ○ Rbot For-Hire How much does it cost? Rent an Army Threat Level?
Prevention Detect the threat Mitigate the threat Distinguish good traffic from bad traffic Block bad traffic while still allowing good traffic through. Protect all points of vulnerability.
Prevention Methods Blackholing Overprovision Routers Firewalls Intrusion Detection Systems (IDS) Third Party Protection
Blackholing Blocking all traffic the network as far upstream as possible. Traffic is diverted to a “black hole” where it is discarded. Good and bad packets are discarded. Not an efficient solution to a DDoS attack. Attacker’s objective is still fulfilled.
Firewalls Not purpose-built for DDoS attacks, but provide some protection. Reside too far downstream in the network. Lack of anomaly detection, can’t recognize when valid protocols are being used in an attack. Cannot perform antispoofing on a packet by packet basis.
Third Party Protection DNS based redirect service. Border Gateway Protocol (BGP) based service. Content Delivery Network (CDN) providers.
History of Attacks Anonymous Hacktivist Group (Civil Disobedience) Lizard Squad PlayStation 4 Network, Xbox Live, Facebook GitHub Attack Chinese Government, Replaced JS Code to Force reload pages Happening Now Digital Attack Map
Business Aspect Costs for Businesses
DDoS Attacks Lead to: Software & Hardware Replacements Reduction in Revenue Loss of Consumer Trust Customer Data Theft
Questions? Types of Attack Source of Attacks Prevention History of Attacks Business Aspect Demonstration
References services-offering-to-take-down-your-competitors-web-sites- going-mainstream/ services-offering-to-take-down-your-competitors-web-sites- going-mainstream/ _defense_of_ddos.html _defense_of_ddos.html attacks-tops-half-a-billion-dollars attacks-tops-half-a-billion-dollars insurance-can-serve-as-an-ideal-ddos-attack-response-plan/ insurance-can-serve-as-an-ideal-ddos-attack-response-plan/ DDoS-attack-can-cost-a-company-more-than dollar DDoS-attack-can-cost-a-company-more-than dollar