Download presentation
Presentation is loading. Please wait.
1
Network Attacks Dylan Small
2
Roadmap History of Network Attacks Current Network Attacks
Software Used Blocking Network Attacks Future of Network attacks
3
History of Network Attacks
Previously DDoS attacks were the only method of network attacking DDoS or Distributed Denial of Service attack is when the hacker floods a server with millions of packets and make the server unusable This is a brute force type attack
4
DDoS Attacks What DDoS attacks aim to do is overload the remote servers’ usage of computational resources, such as bandwidth, memory, disk space, or processor time What this does is make the website or whatever the server is hosting unusable and unable to be accessed by its users The ultimate goal of DDoS attacks is to crash the remote server
6
Software Used Low Orbit Ion Cannon (LOIC) - An easy to use GUI that makes DDoS attacking easy for anyone All you have to do is type in the target URL, add a message in there if you want and then click “IMMA CHARGIN MAH LAZER”
7
Protecting against DDoS Attacks
8
Protecting against DDoS Attacks
Properly configured internet routers and switches can greatly reduce the effectiveness of DDoS attacks Many internet routers have built in Automatic DDoS attack detection, so if DDoS packets are detected they will be discarded and not interfere with regular packets Having complex rules in place in routers and switches greatly decreases effectiveness of DDoS attacks but nothing is completely safe
9
Passive Attacks Passive Attacks monitor unencrypted traffic and looks for clear-text passwords and sensitive information that can be used in other types of attacks This can include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capturing authentication information such as passwords
10
Insider Attacks Just like the title says, an insider attack is when someone from the “inside” of the organization attacks the network With the information that is gathered the attacker can eavesdrop, steal, or damage information within the organization
11
Phishing Attacks Phishing is when attackers create a website that looks like a real website but login information is sent to attackers instead of the real organization
12
Phishing Attacks How to prevent being “phished”
Check the URL in the address bar and make sure it is the real one ie Facebook.com instead of face-book.com Follow Amanda Marshalls s
13
Sources http://en.wikipedia.org/wiki/DDoS_mitigation
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.