Download presentation
Presentation is loading. Please wait.
Published byEric Hill Modified over 9 years ago
1
1 A0953355 曾天財 指導教授:梁明章 教授
2
Types of Attacks Penetration Eavesdropping Man-in-the-Middle Flooding 2
3
Penetration Attacker gets inside your machine Can take over machine and do whatever he wants Achieves entry via software flaw(s), stolen passwords or insider access 3
4
Eavesdropping Attacker gains access to same network Listens to traffic going in and out of your machine 4
5
Man-in-the-Middle Attacker listens to output and controls output Can substitute messages in both directions 5
6
Flooding Attack Attacker sends an overwhelming number of messages at your machine; great congestion Usually called a Denial of Service (DoS) attack, because that’s the effect Usually involves a large number of machines, hence Distributed Denial of Service (DDoS) attack 6
7
What is a DDoS attack? 7 “Distributed denial-of-service attack” Attempt to make a computer resource unavailable, usually by flooding the target with internet traffic from many different sources
8
DDoS Attacks 8 Some History First DDoS attacks were mainly directed toward to disrupting IRC servers. TimeLine 1996 SYN flood Worked with minimum bandwidth
9
DDoS Attacks 9 1997 Vulnerability in Microsoft Windows TCP/IP Stack Tools were teardrop, boink, bonk Smurf Attack Bounce packets off misconfigured network Lagging Just sending a lot of packets
10
DDoS Attacks 10 1998 - 99 Targa Multiple attacks in one tool Attackers would work together to bring down systems Big increase in ability to attack computer systems this year.
11
DDoS Attacks 11 2000 Many huge sites are taken down Big losses in profit. 2001 DNS Attacks Microsoft
12
DDoS Attacks 12 2002 Root DNS servers are attacked No serious damage because of the length of the attack. 2003 - 2004 Attacking smaller sites and even some extortion attempts. Bot networks
13
DDoS Attacks 13 Current Hackers beginning to attack Linux/Unix machines Many web servers are based on those operating systems Web servers have a lot of bandwidth and having control of the server would mean a lot of attack power Spam Screensavers Attacks spammers
14
謝謝 ~~ 14
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.