0% found this document useful (0 votes)
7 views20 pages

Week-3

The document discusses Denial of Service (DoS) attacks, which aim to disrupt services to clients by overwhelming systems with requests. It outlines the history of such attacks, including the Morris Worm incident, and categorizes various types of DoS attacks, such as flooding and man-in-the-middle. Additionally, it emphasizes the importance of information security and provides defense strategies, including the use of firewalls and VLANs.

Uploaded by

shen9132
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views20 pages

Week-3

The document discusses Denial of Service (DoS) attacks, which aim to disrupt services to clients by overwhelming systems with requests. It outlines the history of such attacks, including the Morris Worm incident, and categorizes various types of DoS attacks, such as flooding and man-in-the-middle. Additionally, it emphasizes the importance of information security and provides defense strategies, including the use of firewalls and VLANs.

Uploaded by

shen9132
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

DENIAL OF

SERVICE (DoS)
ATTACK
Ms. Carol Kate M. Estacio, LPT
Objectives
Determine the organizations business need for
information security;
Identify why a successful information security
program is the responsibility of both an
organization’s general management and IT
management,
Identify the threats posed to information security
and the more common attacks associated with those
threats
What is “DoS
Attack” Denial-of-
Service Attack?
DoS Attack is a malicious attempt by a single
person or a group of people to cause the
victim, site, or node to deny service to its
client.

DoS – when a single host attack


Ddos (Distributed Denial-of-Service) -
when multiple hosts attack simultaneously
Idea of DoS attacks
Purpose is to shut down a site, not
penetrate it
Purpose may be vandalism, extortion or
social action (includes terrorism) (Sports
betting sites often extorted)
Modification of internal data, change of
programs (includes defacement of web
sites)
History of Morris Worm (Nov. 2,
1988)
 First DDoS attack to cripple large amounts of
network infrastructure.
 Self-replicating, self-propagating
 Exploited software commonality (monoculture)
• Fingerd buffer overflow exploit
• Sendmail root vulnerability
• Weak passwords
History of Morris Worm (Nov. 2,
1988)
 Infected system became “catatonic”
 Took roughly three days to come under
control
 Ultimately infected 10% of internet
computers (6000) and cost $ million to
clean up
Types of DoS Attacks

 Penetration
 Eavesdropping
 Man-In-The-Middle
 Flooding
Penetration-the action or process of making a way through or into something.
Eavesdropping-secretly listen to a conversation.
A man-in-the-middle (MitM) attack is a type of cyber attack in which
the attacker secretly intercepts and relays messages between two
parties who believe they are communicating directly with each other.
DoS Attacks Penetration

 Attacksgets inside your machine


 Can take over machine and do
whatever he wants
 Achieves entry via software flaw(s),
stolen passwords or insider access
DoS Attacks Eavesdropping

 Attacker gains access to same


network
 Listens to traffic going in and out of
your machine
DoS Attacks Man-in-the-Middle

 Attacks listens to output and


controls output
 Can substitute messages in both
directions
DoS Attacks Flooding

Attackers send s and overwhelming number


of messages at your machine; greta
congestion
The congestion may occur in the path before
your machine
 Usually called a Denial of Service (DoS)
attack
How to defend?
Switches can create virtual LANs (VLANs) to isolate network traffic
and separate sensitive data, restricting access to approved devices
or groups of devices.

 Firewalls
 Switches
 Routers
Firewalls block incoming threats based on a set of pre-programmed
rules that also can dictate which users can access specific network
areas.
Most routers come with built-in firewalls, so check your settings to
make sure your router's firewall is turned on.
Most routers come with built-in firewalls, so check your settings to
make sure your router's firewall is turned on.
Malware on
basis of
Actions
Adware (or advertising software) is the term used for various pop-up
advertisements that show up on your computer or mobile device.
 Adware Adware has the potential to become
malicious and harm your device by
slowing it down, hijacking your browser

 Spyware and installing viruses and/or spyware.


Spyware is malicious software that enters a user's
computer, gathers data from the device and user, and
sends it to third parties without their consent.

 Ransomeware Ransomware is a type of malware which


prevents you from accessing your device
and the data stored on it, usually by

 Scareware Scareware
encrypting your files. A criminal group will
is ademand
then
have detected
type of amalware
ransom attack that claims
in exchange for to
a virus or other issue on a device and
decryption.

 Rootkits
directs the user to download or buy malicious
software
A common to resolve
rootkit the problem
definition is a type of malware program tha
enables cyber criminals to gain access to and infiltrate data f

 Zombies
machines without being detected. It covers software toolboxe
designed to infect computers, give the attacker remote contr
remain hidden for a long period of time.
A Zombie is a malicious program that is installed on a device that
transforms it into a “zombie” that attacks other systems. A computer
or other device transformed by zombie malware is first infected by a
OLD
GENERATION
ATTACKS (still
continue these
days)
Theft of Intellectual property
Identity theft
Theft of equipment and information
Sabotage
Information extortion
NEW
GENERATION
ATTACKS/
THREATS
 Technology with weak security
 Social Media Attacks
 Mobile Malware
 Outdated Security Software
Corporate data on Personal devices
 Social Engineering

You might also like