尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
DESTRIBUTED DENIAL OF
SERVICE ATTACK
CONTENTS
 Introduction of dos
 Introduction of ddos
 Components & architecture
 Classification
 Flood attacks
 Amplifications attacks
 Prototype exploit attacks
 Malformed packet attacks
 DDOS defense problems & classification
 Intrusion prevention
 Intrusion detection
 Intrusion tolerance
 Intrusion response
 Conclusion
 References
INTRODUCTION OF DOS
 A denial-of-service attack (DoS attack) is an attempt
to make a computer resource unavailable to its intended
users.
 Although the means to carry out, motives for, and
targets of a DoS attack may vary, it generally consists of
the concerted efforts of a person, or multiple people to
prevent an Internet site or service from functioning
efficiently or at all, temporarily or indefinitely.
INTRODUCTION OF DDOS
 A distributed denial-of-service (DDoS) attack is one in
which a multitude of compromised systems attack a
single target, thereby causing denial of service for users
of the targeted system.
 The flood of incoming messages to the target system
essentially forces it to shut down, thereby denying
service to the system to legitimate users.
COMPONENTS & ARCHITECTURE
CLASSIFICATION OF DDOS
Classification can be divided in the following categories :-
 Flood attack
 Amplification attack
 TCP SYN attack
 Malformed packet attack
FLOOD ATTACK
In a flood attack, the zombies send large volumes of IP
traffic to a victim system in order to congest the victim
systems band width.
Some of the well-known flood attacks are
 UDP flood attacks
 ICMP flood attacks
UDP ATTACK
 A UDP Flood attack is possible when a large number of
UDP packets is sent to a victim system.
 In a DDoS UDP Flood attack, the UDP packets are sent
to either random or specified ports on the victim system.
 When the victim system receives a UDP packet, it will
determine what application is waiting on the destination
port.
ICMP FLOOD ATTACK
ICMP Flood attacks exploit the Internet Control
Message Protocol (ICMP), which enables users to send
an echo packet to a remote host to check whether it’s
alive.
AMPLIFICATION ATTACK
In amplification attacks the attacker or the agents
exploit the broadcast IP address feature found on most
routers to amplify and reflect the attack and send
messages to a broadcast IP address.
Some well known amplification attacks, are
 Smurf attacks
 Fraggle attacks
SMURF ATTACK
 Smurf attacks send ICMP echo request traffic with a
spoofed source address of the target victim to a number
of IP broadcast addresses.
 Most hosts on an IP network will accept ICMP echo
requests and reply to the source address, in this case,
the target victim.
FRAGGLE ATTACK
 The Fraggle attacks are a similar attack to the Smurf
except that they use UDP echo packets instead of ICMP
echoes.
 Fraggle attacks generate even more bad traffic and can
create even more damaging effects than just a Smurf
attack.
PROTOTYPE EXPLOIT ATTACKS
 Protocol exploit attacks exploit a specific feature or
implementation bug of some protocol installed at the
victim in order to consume excess amounts of its
resources.
 A representative example of protocol exploit attacks is
TCP SYN attacks.
MALFORMED PACKET ATTACK
 Malformed packet attacks rely on incorrectly formed IP
packets that are sent from agents to the victim in order
to crash the victim system.
 The malformed packet attacks can be divided in two
types of attacks: IP address attack and IP packet options
attack.
 In an IP address `attack, the packet contains the same
source and destination IP addresses.
DDOS DEFENSE PROBLEM &
CLASSIFICATION
DDoS attacks are a hard problem to solve. Thus we
have the following four categories :-
 Intrusion Prevention,
 Intrusion Detection,
 Intrusion Tolerance and Mitigation
 intrusion response
CONCLUSION
 DDos attack tools are readily available and any internet host is
targetable as either a zombie or the ultimate DDos focus.
 These attacks can be costly and frustrating and are difficult, if
not impossible to eradicate.
 The best defence is to hinder attackers through vigilant system
administration.
REFERENCE
 www.google.com
 www.wikipedia.com
 www.oeclib.in
Thanks

More Related Content

What's hot

Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
kalyan kumar
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
sadhana21297
 
Denial of service
Denial of serviceDenial of service
Denial of service
garishma bhatia
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
Ramasubbu .P
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
Jignesh Patel
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
Anil Antony
 
Dos attack
Dos attackDos attack
Dos attack
Manjushree Mashal
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
stollen_fusion
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
APNIC
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
leminhvuong
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
Department of Computer Science
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
Pascal Flöschel
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
Gayatri Kapse
 
Session Hijacking
Session HijackingSession Hijacking
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
Ahmed Salama
 
DDoS.pptx
DDoS.pptxDDoS.pptx
Web security
Web securityWeb security
Web security
Padam Banthia
 
Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversCeh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webservers
Vi Tính Hoàng Nam
 
DDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and MitigationDDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and Mitigation
Cloudflare
 

What's hot (20)

Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Dos attack
Dos attackDos attack
Dos attack
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Session Hijacking
Session HijackingSession Hijacking
Session Hijacking
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
DDoS.pptx
DDoS.pptxDDoS.pptx
DDoS.pptx
 
Web security
Web securityWeb security
Web security
 
Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversCeh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webservers
 
DDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and MitigationDDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and Mitigation
 

Similar to Destributed denial of service attack ppt

L1803046876
L1803046876L1803046876
L1803046876
IOSR Journals
 
DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
Zobair Khan
 
A041201010
A041201010A041201010
A041201010
ijceronline
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
HaipengCai1
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
Ameya Vashishth
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptx
dawitTerefe5
 
TOO;S USED IN DOS AND DDOS ATTACK12.pptx
TOO;S USED IN DOS AND DDOS ATTACK12.pptxTOO;S USED IN DOS AND DDOS ATTACK12.pptx
TOO;S USED IN DOS AND DDOS ATTACK12.pptx
nidhidgowda185
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
IJITCA Journal
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
IJITCA Journal
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
Mohammad Reza Mousavinasr
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
HTS Hosting
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
Vihari Piratla
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
KalyanGupta10
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
VishalSb4
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
DivyamNayyar3
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threat
SensePost
 
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationAn Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
TechApprise
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
IJERA Editor
 
DDoS.ppt
DDoS.pptDDoS.ppt
DDoS.ppt
EllenSutiyem
 
D do s
D do sD do s

Similar to Destributed denial of service attack ppt (20)

L1803046876
L1803046876L1803046876
L1803046876
 
DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 
A041201010
A041201010A041201010
A041201010
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
 
UDP Flood Attack.pptx
UDP Flood Attack.pptxUDP Flood Attack.pptx
UDP Flood Attack.pptx
 
TOO;S USED IN DOS AND DDOS ATTACK12.pptx
TOO;S USED IN DOS AND DDOS ATTACK12.pptxTOO;S USED IN DOS AND DDOS ATTACK12.pptx
TOO;S USED IN DOS AND DDOS ATTACK12.pptx
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
 
DoS.ppt
DoS.pptDoS.ppt
DoS.ppt
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threat
 
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and MitigationAn Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
An Ultimate Guide to DDos Attacks: Detection, Prevention and Mitigation
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
DDoS.ppt
DDoS.pptDDoS.ppt
DDoS.ppt
 
D do s
D do sD do s
D do s
 

More from OECLIB Odisha Electronics Control Library

5G technology-ppt
5G technology-ppt5G technology-ppt
Futex ppt
Futex  pptFutex  ppt
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
OECLIB Odisha Electronics Control Library
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
OECLIB Odisha Electronics Control Library
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
OECLIB Odisha Electronics Control Library
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
Steganography ppt
Steganography pptSteganography ppt
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
OECLIB Odisha Electronics Control Library
 
Soa ppt
Soa pptSoa ppt
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
OECLIB Odisha Electronics Control Library
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
OECLIB Odisha Electronics Control Library
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
Wimax ppt
Wimax pptWimax ppt
Wibree ppt
Wibree pptWibree ppt
Wearable Computing
Wearable ComputingWearable Computing
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 

More from OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Recently uploaded

Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical OperationsEnsuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
OnePlan Solutions
 
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service AvailableFemale Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
isha sharman06
 
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
manji sharman06
 
Trailhead Talks_ Journey of an All-Star Ranger .pptx
Trailhead Talks_ Journey of an All-Star Ranger .pptxTrailhead Talks_ Journey of an All-Star Ranger .pptx
Trailhead Talks_ Journey of an All-Star Ranger .pptx
ImtiazBinMohiuddin
 
AI Based Testing - A Comprehensive Guide.pdf
AI Based Testing - A Comprehensive Guide.pdfAI Based Testing - A Comprehensive Guide.pdf
AI Based Testing - A Comprehensive Guide.pdf
kalichargn70th171
 
Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)
wonyong hwang
 
Accelerate your Sitecore development with GenAI
Accelerate your Sitecore development with GenAIAccelerate your Sitecore development with GenAI
Accelerate your Sitecore development with GenAI
Ahmed Okour
 
Photo Copier Xerox Machine annual maintenance contract system.pdf
Photo Copier Xerox Machine annual maintenance contract system.pdfPhoto Copier Xerox Machine annual maintenance contract system.pdf
Photo Copier Xerox Machine annual maintenance contract system.pdf
SERVE WELL CRM NASHIK
 
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
Shane Coughlan
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
Alina Yurenko
 
SAP ECC & S4 HANA PPT COMPARISON MM.pptx
SAP ECC & S4 HANA PPT COMPARISON MM.pptxSAP ECC & S4 HANA PPT COMPARISON MM.pptx
SAP ECC & S4 HANA PPT COMPARISON MM.pptx
aneeshmanikantan2341
 
Hands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion StepsHands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion Steps
servicesNitor
 
NLJUG speaker academy 2024 - session 1, June 2024
NLJUG speaker academy 2024 - session 1, June 2024NLJUG speaker academy 2024 - session 1, June 2024
NLJUG speaker academy 2024 - session 1, June 2024
Bert Jan Schrijver
 
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
meenusingh4354543
 
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA ComplianceSecure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
ICS
 
How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
Zycus
 
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
sapnasaifi408
 
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdfThe Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
kalichargn70th171
 
Introduction to Python and Basic Syntax.pptx
Introduction to Python and Basic Syntax.pptxIntroduction to Python and Basic Syntax.pptx
Introduction to Python and Basic Syntax.pptx
GevitaChinnaiah
 
Enhancing non-Perl bioinformatic applications with Perl
Enhancing non-Perl bioinformatic applications with PerlEnhancing non-Perl bioinformatic applications with Perl
Enhancing non-Perl bioinformatic applications with Perl
Christos Argyropoulos
 

Recently uploaded (20)

Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical OperationsEnsuring Efficiency and Speed with Practical Solutions for Clinical Operations
Ensuring Efficiency and Speed with Practical Solutions for Clinical Operations
 
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service AvailableFemale Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
 
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
 
Trailhead Talks_ Journey of an All-Star Ranger .pptx
Trailhead Talks_ Journey of an All-Star Ranger .pptxTrailhead Talks_ Journey of an All-Star Ranger .pptx
Trailhead Talks_ Journey of an All-Star Ranger .pptx
 
AI Based Testing - A Comprehensive Guide.pdf
AI Based Testing - A Comprehensive Guide.pdfAI Based Testing - A Comprehensive Guide.pdf
AI Based Testing - A Comprehensive Guide.pdf
 
Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)
 
Accelerate your Sitecore development with GenAI
Accelerate your Sitecore development with GenAIAccelerate your Sitecore development with GenAI
Accelerate your Sitecore development with GenAI
 
Photo Copier Xerox Machine annual maintenance contract system.pdf
Photo Copier Xerox Machine annual maintenance contract system.pdfPhoto Copier Xerox Machine annual maintenance contract system.pdf
Photo Copier Xerox Machine annual maintenance contract system.pdf
 
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
 
SAP ECC & S4 HANA PPT COMPARISON MM.pptx
SAP ECC & S4 HANA PPT COMPARISON MM.pptxSAP ECC & S4 HANA PPT COMPARISON MM.pptx
SAP ECC & S4 HANA PPT COMPARISON MM.pptx
 
Hands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion StepsHands-on with Apache Druid: Installation & Data Ingestion Steps
Hands-on with Apache Druid: Installation & Data Ingestion Steps
 
NLJUG speaker academy 2024 - session 1, June 2024
NLJUG speaker academy 2024 - session 1, June 2024NLJUG speaker academy 2024 - session 1, June 2024
NLJUG speaker academy 2024 - session 1, June 2024
 
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
 
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA ComplianceSecure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
 
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
 
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdfThe Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
 
Introduction to Python and Basic Syntax.pptx
Introduction to Python and Basic Syntax.pptxIntroduction to Python and Basic Syntax.pptx
Introduction to Python and Basic Syntax.pptx
 
Enhancing non-Perl bioinformatic applications with Perl
Enhancing non-Perl bioinformatic applications with PerlEnhancing non-Perl bioinformatic applications with Perl
Enhancing non-Perl bioinformatic applications with Perl
 

Destributed denial of service attack ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On DESTRIBUTED DENIAL OF SERVICE ATTACK
  • 2. CONTENTS  Introduction of dos  Introduction of ddos  Components & architecture  Classification  Flood attacks  Amplifications attacks  Prototype exploit attacks  Malformed packet attacks  DDOS defense problems & classification  Intrusion prevention  Intrusion detection  Intrusion tolerance  Intrusion response  Conclusion  References
  • 3. INTRODUCTION OF DOS  A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users.  Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.
  • 4. INTRODUCTION OF DDOS  A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.  The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.
  • 6. CLASSIFICATION OF DDOS Classification can be divided in the following categories :-  Flood attack  Amplification attack  TCP SYN attack  Malformed packet attack
  • 7. FLOOD ATTACK In a flood attack, the zombies send large volumes of IP traffic to a victim system in order to congest the victim systems band width. Some of the well-known flood attacks are  UDP flood attacks  ICMP flood attacks
  • 8. UDP ATTACK  A UDP Flood attack is possible when a large number of UDP packets is sent to a victim system.  In a DDoS UDP Flood attack, the UDP packets are sent to either random or specified ports on the victim system.  When the victim system receives a UDP packet, it will determine what application is waiting on the destination port.
  • 9. ICMP FLOOD ATTACK ICMP Flood attacks exploit the Internet Control Message Protocol (ICMP), which enables users to send an echo packet to a remote host to check whether it’s alive.
  • 10. AMPLIFICATION ATTACK In amplification attacks the attacker or the agents exploit the broadcast IP address feature found on most routers to amplify and reflect the attack and send messages to a broadcast IP address. Some well known amplification attacks, are  Smurf attacks  Fraggle attacks
  • 11. SMURF ATTACK  Smurf attacks send ICMP echo request traffic with a spoofed source address of the target victim to a number of IP broadcast addresses.  Most hosts on an IP network will accept ICMP echo requests and reply to the source address, in this case, the target victim.
  • 12. FRAGGLE ATTACK  The Fraggle attacks are a similar attack to the Smurf except that they use UDP echo packets instead of ICMP echoes.  Fraggle attacks generate even more bad traffic and can create even more damaging effects than just a Smurf attack.
  • 13. PROTOTYPE EXPLOIT ATTACKS  Protocol exploit attacks exploit a specific feature or implementation bug of some protocol installed at the victim in order to consume excess amounts of its resources.  A representative example of protocol exploit attacks is TCP SYN attacks.
  • 14. MALFORMED PACKET ATTACK  Malformed packet attacks rely on incorrectly formed IP packets that are sent from agents to the victim in order to crash the victim system.  The malformed packet attacks can be divided in two types of attacks: IP address attack and IP packet options attack.  In an IP address `attack, the packet contains the same source and destination IP addresses.
  • 15. DDOS DEFENSE PROBLEM & CLASSIFICATION DDoS attacks are a hard problem to solve. Thus we have the following four categories :-  Intrusion Prevention,  Intrusion Detection,  Intrusion Tolerance and Mitigation  intrusion response
  • 16. CONCLUSION  DDos attack tools are readily available and any internet host is targetable as either a zombie or the ultimate DDos focus.  These attacks can be costly and frustrating and are difficult, if not impossible to eradicate.  The best defence is to hinder attackers through vigilant system administration.
  翻译: