SlideShare a Scribd company logo
8
Most read
10
Most read
11
Most read
DoS or DDoS Attack
A red eye to Web Services
Presented by...
Tamal Biswas
Kousik Layek
Tridib Biswas
Module Index
• What is DoS?
• What is DDoS?
• Recent attack on web.
• Methods of attack.
• Performing DoS attacks.
• How do we know an attack is happening?
• What to do if we are experiencing an attack?
• How do we avoid being part of the problem?
• Conclusion.
Denial of Services(DoS)
Its an attack to
make a machine or
network resource
unavailable to its
intended users.
Denial of Services(DoS)
Back
Its an attack to
make a machine or
network resource
unavailable to its
intended users.
Distributed Denial-of-Service attack
Its an attack to make a
machine or network
resource unavailable to its
intended users
by using others computer.
Network
Back
A big-bang of DDoS attack
The internet
around the
whole world was
slowed down on
27th march.
Because that
day DDoS attack
took place with
near about 300
Gbps.
Back
Method of attack
• ICMP flood
• Teardrop attacks
• Permanent denial-of-service attacks
• Reflected / Spoofed attack
• Low-rate Denial-of-Service attacks
• Peer-to-peer attacks
Some best DoS attack method
• ICMP flood:
– Sends packets to all computer hosts rather than a
specific machine.
• Teardrop attacks:
– Fragmented over-sized pay-loads to be send to
the target machine.
• Permanent denial-of-service attacks:
– It may cause replacement of hardware also.
Back
Performing DoS or DDoS Attack
• A wide range of programs are used to launch
DoS-attacks. Some of those are...
Jolt
Bubonic
Targa
Blast
Panther
Crazy Pinger
Some best DoS Attack tools
• Jolt:
– Finds exploit vulnerability in windows networking code.
– Consumes 100% CPU time by sending heavy CPU
consuming packets.
• LaTierra:
– It sends TCP packets to more than one port number.
• Nemsey:
– generates random packets with random port number and
floods victim with it.
Back
How do we know an attack is happening?
• unusually slow network performance (opening
files or accessing websites)
• unavailability of a particular website
• inability to access any website
• dramatic increase in the amount of spam you
receive in your account
A common message after DoS
Back
What to do if we are experiencing an
attack?
• contact your network administrators.
• In case of home computer, consider contacting
your internet service provider (ISP).
• Immediatly get disconnected from internet.
Back
How do we avoid being part of the
problem?
• Install and maintain anti-virus.
• Install a firewall.
• Configure the firewall to restrict incomming
and outgoing traffic.
• Follow good security practices for distributing
your email address.
• Applying email filters may help you manage
unwanted traffic.
Back
Conclusion
• Susceptibility to attacks could be alleviated
with better Internet.
• Don’t leave all the decision making to the
machines.
• Provide ‘intelligent’ support along the path.
• Create “Hardened” networks.
Refferences
• http://en.wikipedia.org/wiki/Denial-of-
service_attack
Thank you...

More Related Content

PPT
DDoS Attack PPT by Nitin Bisht
PPTX
DDoS - Distributed Denial of Service
PPTX
Denial of Service Attacks (DoS/DDoS)
PPTX
PPTX
Basics of Denial of Service Attacks
PPTX
5. Core Banking System
PPTX
Charging in electric vehicles(ev)
PPTX
application of differential equations
DDoS Attack PPT by Nitin Bisht
DDoS - Distributed Denial of Service
Denial of Service Attacks (DoS/DDoS)
Basics of Denial of Service Attacks
5. Core Banking System
Charging in electric vehicles(ev)
application of differential equations

What's hot (20)

PPTX
Denial of Service Attack
PPT
DDoS Attacks
PPTX
Network attacks
PPTX
Intrusion prevention system(ips)
PPTX
Denial of service
PPTX
Dos attack
PPTX
DDoS ATTACKS
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
Ddos attacks
PPT
Intrusion detection system ppt
PPT
IDS and IPS
PPTX
Firewall presentation
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Dos & Ddos Attack. Man in The Middle Attack
PPTX
Cyber Security Introduction.pptx
PPTX
Denial of service attack
PPTX
Password cracking and brute force
PPTX
Detection of phishing websites
PPTX
Vulnerabilities in modern web applications
Denial of Service Attack
DDoS Attacks
Network attacks
Intrusion prevention system(ips)
Denial of service
Dos attack
DDoS ATTACKS
Intrusion Detection Systems and Intrusion Prevention Systems
Ddos attacks
Intrusion detection system ppt
IDS and IPS
Firewall presentation
Cybersecurity Attack Vectors: How to Protect Your Organization
Dos & Ddos Attack. Man in The Middle Attack
Cyber Security Introduction.pptx
Denial of service attack
Password cracking and brute force
Detection of phishing websites
Vulnerabilities in modern web applications
Ad

Similar to DoS or DDoS attack (20)

PPTX
Dos attack
PPTX
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
PDF
denialofservice.pdfdos attacck basic details with interactive design
PDF
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
PPTX
DoS Attack - Incident Handling
PPT
DDOS Attack
PPTX
Session for InfoSecGirls - New age threat management vol 1
PDF
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
PPTX
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
PPTX
Denial of service
PPTX
DrupalCon Vienna 2017 - Anatomy of DDoS
PPTX
3-types of attacks_Types of attacks.pptx
PPTX
DoS/DDoS
PPT
Aleksei zaitchenkov slides about DOS Attacks
PPTX
basicsofdenialofservice-160223110554.pptx
PPT
Dos threats and countermeasures
PDF
types and DOS attack & basics of denial of service.pdf
PPTX
Cyber Security Terms
PDF
Whitepaper on DDoS Mitigation
PPT
Protecting your business from ddos attacks
Dos attack
Unleash the Hammer on Denial-of-Service: Conquer DDos Attacks!
denialofservice.pdfdos attacck basic details with interactive design
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
DoS Attack - Incident Handling
DDOS Attack
Session for InfoSecGirls - New age threat management vol 1
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Distributed denial-of-service (DDoS) attack || Seminar Report @ gestyy.com/...
Denial of service
DrupalCon Vienna 2017 - Anatomy of DDoS
3-types of attacks_Types of attacks.pptx
DoS/DDoS
Aleksei zaitchenkov slides about DOS Attacks
basicsofdenialofservice-160223110554.pptx
Dos threats and countermeasures
types and DOS attack & basics of denial of service.pdf
Cyber Security Terms
Whitepaper on DDoS Mitigation
Protecting your business from ddos attacks
Ad

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
A Presentation on Artificial Intelligence
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation theory and applications.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Per capita expenditure prediction using model stacking based on satellite ima...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MIND Revenue Release Quarter 2 2025 Press Release
A Presentation on Artificial Intelligence
MYSQL Presentation for SQL database connectivity
Programs and apps: productivity, graphics, security and other tools
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
Machine Learning_overview_presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectroscopy.pptx food analysis technology
Encapsulation theory and applications.pdf
Getting Started with Data Integration: FME Form 101
Group 1 Presentation -Planning and Decision Making .pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
“AI and Expert System Decision Support & Business Intelligence Systems”

DoS or DDoS attack

  • 1. DoS or DDoS Attack A red eye to Web Services Presented by... Tamal Biswas Kousik Layek Tridib Biswas
  • 2. Module Index • What is DoS? • What is DDoS? • Recent attack on web. • Methods of attack. • Performing DoS attacks. • How do we know an attack is happening? • What to do if we are experiencing an attack? • How do we avoid being part of the problem? • Conclusion.
  • 3. Denial of Services(DoS) Its an attack to make a machine or network resource unavailable to its intended users.
  • 4. Denial of Services(DoS) Back Its an attack to make a machine or network resource unavailable to its intended users.
  • 5. Distributed Denial-of-Service attack Its an attack to make a machine or network resource unavailable to its intended users by using others computer. Network Back
  • 6. A big-bang of DDoS attack The internet around the whole world was slowed down on 27th march. Because that day DDoS attack took place with near about 300 Gbps. Back
  • 7. Method of attack • ICMP flood • Teardrop attacks • Permanent denial-of-service attacks • Reflected / Spoofed attack • Low-rate Denial-of-Service attacks • Peer-to-peer attacks
  • 8. Some best DoS attack method • ICMP flood: – Sends packets to all computer hosts rather than a specific machine. • Teardrop attacks: – Fragmented over-sized pay-loads to be send to the target machine. • Permanent denial-of-service attacks: – It may cause replacement of hardware also. Back
  • 9. Performing DoS or DDoS Attack • A wide range of programs are used to launch DoS-attacks. Some of those are... Jolt Bubonic Targa Blast Panther Crazy Pinger
  • 10. Some best DoS Attack tools • Jolt: – Finds exploit vulnerability in windows networking code. – Consumes 100% CPU time by sending heavy CPU consuming packets. • LaTierra: – It sends TCP packets to more than one port number. • Nemsey: – generates random packets with random port number and floods victim with it. Back
  • 11. How do we know an attack is happening? • unusually slow network performance (opening files or accessing websites) • unavailability of a particular website • inability to access any website • dramatic increase in the amount of spam you receive in your account
  • 12. A common message after DoS Back
  • 13. What to do if we are experiencing an attack? • contact your network administrators. • In case of home computer, consider contacting your internet service provider (ISP). • Immediatly get disconnected from internet. Back
  • 14. How do we avoid being part of the problem? • Install and maintain anti-virus. • Install a firewall. • Configure the firewall to restrict incomming and outgoing traffic. • Follow good security practices for distributing your email address. • Applying email filters may help you manage unwanted traffic. Back
  • 15. Conclusion • Susceptibility to attacks could be alleviated with better Internet. • Don’t leave all the decision making to the machines. • Provide ‘intelligent’ support along the path. • Create “Hardened” networks.