Denial of Service Attacks
Mendel Rosenblum
Denial of Service Attacks (DOS Attacks)
● An attack that causes a service to fail by using up resources
○ Could be an accident (e.g. upload too big of a file) or on purpose
● Example from our Photo App:
○ User uploads photos, comments, user registration until our storage fills.
○ Establish so many connections our web server falls over
● Resource could be at networking layer
○ Use all the bandwidth of the network coming into our website
○ Use all the network sockets
Distributed Denial of Service (DDoS) Attacks
● DOS attack that uses many attacking machines
○ Example: Get control of a million machines and point them at someone's web server
● Botnets - Collection of compromised machines under control
● Has become an extortion business
Web App DOS mitigation
● None perfect - really hard problem
○ Do want to take steps to avoid accidental DOS and make purpose-driven DOS harder
○ Abuse analysis step required
● Resource quotas
○ Track resource consumption per user and provide way of cutting off users
○ Good for catching accidents, less so for malicious attacks
● Make resources cost money
○ Raises the cost or hassle for an attacker
○ Not always possible under business model
● Network layer: Need to push back on attack stream
○ Do things like cut off traffic coming from some part of the internet

More Related Content

PPTX
Security risks
PPT
D dos attack
PPTX
Denial of service attack
PPTX
Denial of service
PPT
Adarsh-PPT-FCF-12-thm.ppt
PPTX
Cyber security & ethical hacking 10
PDF
Cyber security Dos and DDos attack by G VAISHNAVI.pdf
PDF
CYBER SECURITY PRESENTATION BY G VAISHNAVI.pdf
Security risks
D dos attack
Denial of service attack
Denial of service
Adarsh-PPT-FCF-12-thm.ppt
Cyber security & ethical hacking 10
Cyber security Dos and DDos attack by G VAISHNAVI.pdf
CYBER SECURITY PRESENTATION BY G VAISHNAVI.pdf

Similar to DOSAttacks.pdf (20)

PPTX
Denial of Service Attacks (DoS/DDoS)
PPTX
Denial of service
PPTX
Dos n d dos
PDF
denialofservice.pdfdos attacck basic details with interactive design
PPT
DDOS Attack
PPTX
Dos attack
PDF
ECE560 Denial of Service Attacks Fall2020.pdf
PDF
3-JournalofCommunicationsVol.14No.2February2019.pdf
PDF
Distributed Denial Of Service ( Ddos )
PPTX
DDOS ATTACK Presentation .PPT file.pptx
PPTX
Dos.pptx
PPTX
DoS/DDoS
PPTX
Dos attack
PPTX
DDoS - Distributed Denial of Service
PDF
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
PDF
Denial of Service Attack Project
PDF
What are the Denial of Service attacks and what are possible approac.pdf
DOCX
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
PDF
A vivacious approach to detect and prevent d do s attack
PPTX
DoS or DDoS attack
Denial of Service Attacks (DoS/DDoS)
Denial of service
Dos n d dos
denialofservice.pdfdos attacck basic details with interactive design
DDOS Attack
Dos attack
ECE560 Denial of Service Attacks Fall2020.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf
Distributed Denial Of Service ( Ddos )
DDOS ATTACK Presentation .PPT file.pptx
Dos.pptx
DoS/DDoS
Dos attack
DDoS - Distributed Denial of Service
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Denial of Service Attack Project
What are the Denial of Service attacks and what are possible approac.pdf
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
A vivacious approach to detect and prevent d do s attack
DoS or DDoS attack
Ad

More from stephanedjeukam1 (11)

PDF
PDF
Database.pdf
PDF
PDF
CodeInjection.pdf
PDF
Express.pdf
PDF
Input.pdf
PDF
FrontEnd.pdf
PDF
PDF
PDF
0000 Syllabus.pdf
PDF
Events.pdf
Database.pdf
CodeInjection.pdf
Express.pdf
Input.pdf
FrontEnd.pdf
0000 Syllabus.pdf
Events.pdf
Ad

Recently uploaded (20)

DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPTX
Artificial_Intelligence_Basics use in our daily life
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
MY PRESENTATION66666666666666666666.pptx
PDF
Paper The World Game (s) Great Redesign.pdf
PPTX
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
PDF
simpleintnettestmetiaerl for the simple testint
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
Course Overview and Agenda cloud security
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PDF
Containerization lab dddddddddddddddmanual.pdf
PPT
12 Things That Make People Trust a Website Instantly
PPSX
AI AppSec Threats and Defenses 20250822.ppsx
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
Basic understanding of cloud computing one need
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
Artificial_Intelligence_Basics use in our daily life
Alethe Consulting Corporate Profile and Solution Aproach
MY PRESENTATION66666666666666666666.pptx
Paper The World Game (s) Great Redesign.pdf
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
simpleintnettestmetiaerl for the simple testint
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
Layers_of_the_Earth_Grade7.pptx class by
Course Overview and Agenda cloud security
Viva Digitally Software-Defined Wide Area Network.pptx
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Containerization lab dddddddddddddddmanual.pdf
12 Things That Make People Trust a Website Instantly
AI AppSec Threats and Defenses 20250822.ppsx
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Alethe Consulting Corporate Profile and Solution Aproach
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Basic understanding of cloud computing one need

DOSAttacks.pdf

  • 1. Denial of Service Attacks Mendel Rosenblum
  • 2. Denial of Service Attacks (DOS Attacks) ● An attack that causes a service to fail by using up resources ○ Could be an accident (e.g. upload too big of a file) or on purpose ● Example from our Photo App: ○ User uploads photos, comments, user registration until our storage fills. ○ Establish so many connections our web server falls over ● Resource could be at networking layer ○ Use all the bandwidth of the network coming into our website ○ Use all the network sockets
  • 3. Distributed Denial of Service (DDoS) Attacks ● DOS attack that uses many attacking machines ○ Example: Get control of a million machines and point them at someone's web server ● Botnets - Collection of compromised machines under control ● Has become an extortion business
  • 4. Web App DOS mitigation ● None perfect - really hard problem ○ Do want to take steps to avoid accidental DOS and make purpose-driven DOS harder ○ Abuse analysis step required ● Resource quotas ○ Track resource consumption per user and provide way of cutting off users ○ Good for catching accidents, less so for malicious attacks ● Make resources cost money ○ Raises the cost or hassle for an attacker ○ Not always possible under business model ● Network layer: Need to push back on attack stream ○ Do things like cut off traffic coming from some part of the internet