3
Most read
4
Most read
5
Most read
DOS ATTACK
Deny legitimate use
Contents
• WHAT IS DOS ATTACK
• TYPES
• PREVENTION
Introduction
DOS is an attack used to deny legitimate users access to a resource such as
accessing a website, network, emails, etc. or making it extremely slow.
DoS is the acronym for Denial of Service. This type of attack is usually
implemented by hitting the target resource such as a web server with too many
requests at the same time.
This results in the server failing to respond to all the requests. The effect of this
can either be crashing the servers or slowing them down.
TYPES OF DOS ATTACK
•DoS– this type of attack is performed by a single host
•Distributed DoS– this type of attack is performed by a number of compromised
machines that all target the same victim. It floods the network with data packets
DoS Protection: Prevent an attack
An organization can adopt the following policy to protect itself against
Denial of Service attacks.
•Attacks such as SYN flooding take advantage of bugs in the operating
system. Installing security patches can help reduce the chances of such
attacks.
•Intrusion detection systems can also be used to identify and even stop
illegal activities
•Firewalls can be used to stop simple DoS attacks by blocking all traffic
coming from an attacker by identifying his IP.
•Routers can be configured via the Access Control List to limit access to the
network and drop suspected illegal traffic.

More Related Content

PPT
DDoS Attack PPT by Nitin Bisht
PPTX
Denial of Service Attack
PPTX
Basics of Denial of Service Attacks
PPTX
Denial of Service Attacks (DoS/DDoS)
PPTX
Denial of service
PPTX
DDoS ATTACKS
PPTX
Dos n d dos
PPT
DDOS Attack
DDoS Attack PPT by Nitin Bisht
Denial of Service Attack
Basics of Denial of Service Attacks
Denial of Service Attacks (DoS/DDoS)
Denial of service
DDoS ATTACKS
Dos n d dos
DDOS Attack

What's hot (20)

PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PDF
Overview of the Cyber Kill Chain [TM]
PPTX
Intrusion prevention system(ips)
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Cyber kill chain
PPTX
Different Types of Phishing Attacks
PPTX
VAPT PRESENTATION full.pptx
PDF
Cross site scripting
PPTX
Types of cyber attacks
PPTX
Network security
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPT
All about Hacking
PPTX
Denial of service attack
PPTX
Cia security model
PPTX
DoS or DDoS attack
PPTX
System hacking
 
PPTX
Web application attacks
PDF
Network Security Fundamentals
PPTX
PPTX
Cyber Security Introduction.pptx
Intrusion Detection Systems and Intrusion Prevention Systems
Overview of the Cyber Kill Chain [TM]
Intrusion prevention system(ips)
Network security (vulnerabilities, threats, and attacks)
Cyber kill chain
Different Types of Phishing Attacks
VAPT PRESENTATION full.pptx
Cross site scripting
Types of cyber attacks
Network security
VAPT - Vulnerability Assessment & Penetration Testing
All about Hacking
Denial of service attack
Cia security model
DoS or DDoS attack
System hacking
 
Web application attacks
Network Security Fundamentals
Cyber Security Introduction.pptx
Ad

Similar to Dos attack (20)

PPTX
Dos attack basic
PPTX
Security risks
PPT
D dos attack
PPTX
Denial of service
PPTX
DDOS ATTACK Presentation .PPT file.pptx
PDF
Cyber security Dos and DDos attack by G VAISHNAVI.pdf
PDF
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
PPTX
Dos attack
PPTX
basicsofdenialofservice-160223110554.pptx
PPTX
Denial of service attack
PDF
types and DOS attack & basics of denial of service.pdf
PDF
CYBER SECURITY PRESENTATION BY G VAISHNAVI.pdf
PDF
DOSAttacks.pdf
PPTX
Cyber security & ethical hacking 10
PDF
Comparative Analysis of Different Denial of Service Attacks
PDF
PDF
cloud computing final year project
DOCX
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
PPT
Adarsh-PPT-FCF-12-thm.ppt
PPT
Dos attack basic
Security risks
D dos attack
Denial of service
DDOS ATTACK Presentation .PPT file.pptx
Cyber security Dos and DDos attack by G VAISHNAVI.pdf
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
Dos attack
basicsofdenialofservice-160223110554.pptx
Denial of service attack
types and DOS attack & basics of denial of service.pdf
CYBER SECURITY PRESENTATION BY G VAISHNAVI.pdf
DOSAttacks.pdf
Cyber security & ethical hacking 10
Comparative Analysis of Different Denial of Service Attacks
cloud computing final year project
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
Adarsh-PPT-FCF-12-thm.ppt
Ad

More from Manjushree Mashal (16)

PPTX
Career in cyber security
PPTX
Cyber security
PPTX
Cyber security
PPTX
Cyber attack
PPTX
Sql injection
PPTX
Xss attack
PPTX
Network packet analysis -capture and Analysis
PPTX
Network attacks
PPTX
Network forensic
ODP
TCP/IP FRAME FORMAT
PPTX
Diabetic Retinopathy Analysis using Fundus Image
DOCX
Manjushree_EC_fresher_2016
PPTX
Tvws ppt 1
PPTX
Leaf chlorophyll concentration using random forest
PPT
Vlsi design and fabrication ppt
PPTX
underwater communication skills for the new way of devine(2)
Career in cyber security
Cyber security
Cyber security
Cyber attack
Sql injection
Xss attack
Network packet analysis -capture and Analysis
Network attacks
Network forensic
TCP/IP FRAME FORMAT
Diabetic Retinopathy Analysis using Fundus Image
Manjushree_EC_fresher_2016
Tvws ppt 1
Leaf chlorophyll concentration using random forest
Vlsi design and fabrication ppt
underwater communication skills for the new way of devine(2)

Recently uploaded (20)

PDF
Soil Improvement Techniques Note - Rabbi
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PPTX
mechattonicsand iotwith sensor and actuator
PPTX
ai_satellite_crop_management_20250815030350.pptx
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
Introduction to Power System StabilityPS
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PDF
Java Basics-Introduction and program control
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPTX
Information Storage and Retrieval Techniques Unit III
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PPT
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PPTX
PRASUNET_20240614003_231416_0000[1].pptx
PPTX
Software Engineering and software moduleing
PPTX
Feature types and data preprocessing steps
PDF
Applications of Equal_Area_Criterion.pdf
Soil Improvement Techniques Note - Rabbi
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
mechattonicsand iotwith sensor and actuator
ai_satellite_crop_management_20250815030350.pptx
Exploratory_Data_Analysis_Fundamentals.pdf
Introduction to Power System StabilityPS
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
Java Basics-Introduction and program control
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Information Storage and Retrieval Techniques Unit III
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
distributed database system" (DDBS) is often used to refer to both the distri...
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PRASUNET_20240614003_231416_0000[1].pptx
Software Engineering and software moduleing
Feature types and data preprocessing steps
Applications of Equal_Area_Criterion.pdf

Dos attack

  • 2. Contents • WHAT IS DOS ATTACK • TYPES • PREVENTION
  • 3. Introduction DOS is an attack used to deny legitimate users access to a resource such as accessing a website, network, emails, etc. or making it extremely slow. DoS is the acronym for Denial of Service. This type of attack is usually implemented by hitting the target resource such as a web server with too many requests at the same time. This results in the server failing to respond to all the requests. The effect of this can either be crashing the servers or slowing them down.
  • 4. TYPES OF DOS ATTACK •DoS– this type of attack is performed by a single host •Distributed DoS– this type of attack is performed by a number of compromised machines that all target the same victim. It floods the network with data packets
  • 5. DoS Protection: Prevent an attack An organization can adopt the following policy to protect itself against Denial of Service attacks. •Attacks such as SYN flooding take advantage of bugs in the operating system. Installing security patches can help reduce the chances of such attacks. •Intrusion detection systems can also be used to identify and even stop illegal activities •Firewalls can be used to stop simple DoS attacks by blocking all traffic coming from an attacker by identifying his IP. •Routers can be configured via the Access Control List to limit access to the network and drop suspected illegal traffic.