Download presentation
Presentation is loading. Please wait.
Published byAlexandrina McKinney Modified over 9 years ago
1
Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams
2
Agenda Types of Attack Source of Attacks Prevention History of Attacks Business Aspect
3
TCP Connection Attack (SYN FLOOD) Normal Connection SYN Flood
4
HTTP Get Flood HTTP Post Flood Application Layer Attack
5
Source of Attack Botnets What are they? How are they Created? Notable Botnet Army’s ○ Storm ○ Rbot For-Hire How much does it cost? Rent an Army Threat Level?
6
Prevention Detect the threat Mitigate the threat Distinguish good traffic from bad traffic Block bad traffic while still allowing good traffic through. Protect all points of vulnerability.
7
Prevention Methods Blackholing Overprovision Routers Firewalls Intrusion Detection Systems (IDS) Third Party Protection
8
Blackholing Blocking all traffic the network as far upstream as possible. Traffic is diverted to a “black hole” where it is discarded. Good and bad packets are discarded. Not an efficient solution to a DDoS attack. Attacker’s objective is still fulfilled.
9
Firewalls Not purpose-built for DDoS attacks, but provide some protection. Reside too far downstream in the network. Lack of anomaly detection, can’t recognize when valid protocols are being used in an attack. Cannot perform antispoofing on a packet by packet basis.
10
Third Party Protection DNS based redirect service. Border Gateway Protocol (BGP) based service. Content Delivery Network (CDN) providers.
11
History of Attacks Anonymous Hacktivist Group (Civil Disobedience) Lizard Squad PlayStation 4 Network, Xbox Live, Facebook GitHub Attack Chinese Government, Replaced JS Code to Force reload pages Happening Now Digital Attack Map
13
Business Aspect Costs for Businesses
16
DDoS Attacks Lead to: Software & Hardware Replacements Reduction in Revenue Loss of Consumer Trust Customer Data Theft
17
Questions? Types of Attack Source of Attacks Prevention History of Attacks Business Aspect Demonstration
18
References https://www.youtube.com/watch?v=BzgsT-_GC4Q https://www.youtube.com/watch?v=BzgsT-_GC4Q https://www.youtube.com/watch?v=sUrM7_G_y7A https://www.youtube.com/watch?v=sUrM7_G_y7A http://searchsecurity.techtarget.com/definition/SYN-flooding http://searchsecurity.techtarget.com/definition/SYN-flooding http://us.norton.com/botnet/ http://us.norton.com/botnet/ http://www.webroot.com/blog/2012/06/06/ddos-for-hire- services-offering-to-take-down-your-competitors-web-sites- going-mainstream/ http://www.webroot.com/blog/2012/06/06/ddos-for-hire- services-offering-to-take-down-your-competitors-web-sites- going-mainstream/ https://www.blacklotus.net/learn/about-ddos-attacks/ https://www.blacklotus.net/learn/about-ddos-attacks/ http://www.slate.com/articles/technology/technology/2010/12/in _defense_of_ddos.html http://www.slate.com/articles/technology/technology/2010/12/in _defense_of_ddos.html http://www.cbronline.com/news/cybersecurity/cost-of-ddos- attacks-tops-half-a-billion-dollars-4498766 http://www.cbronline.com/news/cybersecurity/cost-of-ddos- attacks-tops-half-a-billion-dollars-4498766 http://databreachinsurancequote.com/cyber-insurance/cyber- insurance-can-serve-as-an-ideal-ddos-attack-response-plan/ http://databreachinsurancequote.com/cyber-insurance/cyber- insurance-can-serve-as-an-ideal-ddos-attack-response-plan/ http://www.kaspersky.com/about/news/business/2015/A-single- DDoS-attack-can-cost-a-company-more-than-400000-dollar http://www.kaspersky.com/about/news/business/2015/A-single- DDoS-attack-can-cost-a-company-more-than-400000-dollar
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.