SlideShare a Scribd company logo
1 of 13
DOS (Denial Of Service)
Explained :
A denial of service (DoS) attack is an incident
in which a user or organization is deprived of
the services of a resource they would normally
expect to have.
 In a distributed denial-of-service, large
numbers of compromised systems (sometimes
called a botnet) attack a single target.
The DDoS names range from mildly
amusing to disturbing:
Ping of Death - bots create huge electronic packets
and sends them on to victims
Mailbomb - bots send a massive amount of e-mail,
crashing e-mail servers
Smurf Attack - bots send Internet Control Message
Protocol (ICMP) messages to reflectors
Teardrop - bots send pieces of an illegitimate
packet; the victim system tries to recombine the
pieces into a packet and crashes as a result
SCENARIO :
Typical connection “Denial Of Service”Attack
Explained :
The cracker sends the command to initiate the attack to
his zombie army.
 Each computer within the army sends an electronic
connection request to an innocent computer called a
reflector.
 When the reflector receives the request, it looks like it
originates not from the zombies, but from the ultimate
victim of the attack.
 The reflectors send information to the victim system,
and eventually the system's performance suffers or it
shuts down completely as it is inundated with multiple
unsolicited responses from several computers at once.
Securing your network fromthe inside out -- learn how to stop DDoS
attacks
 Although a DoS attack does not usually result in the theft of
information or other security loss, it can cost the target person or
company a great deal of time and money.
 Typically, the loss of service is the inability of a particular network
service, such as e-mail, to be available or the temporary loss of all
network connectivity and services.
 A denial of service attack can also destroy programming and files in
affected computer systems.
 In some cases, DoS attacks have forced Web sites accessed by
millions of people to temporarily cease operation.
Buffer Overflow Attacks
 The most common kind of DoS attack is simply to send more
traffic to a network address than the programmers who
planned its data buffers anticipated someone might send. The
attacker may be aware that the target system has a weakness
that can be exploited or the attacker may simply try the attack
in case it might work. A few of the better-known attacks based
on the buffer characteristics of a program or system include:
 Sending e-mail messages that have attachments with 256-
character file names to Netscape and Microsoft mail programs
 Sending oversized Internet Control Message Protocol
(ICMP) packets (this is also known as the Packet Internet or
Inter-Network Groper (PING) of death)
 Sending to a user of the Pine e-mail program a message with a
"From" address larger than 256 characters
SYN Attack
 When a session is initiated between the Transport Control Program
(TCP) client and server in a network, a very small buffer space
exists to handle the usually rapid "hand-shaking" exchange of
messages that sets up the session.
 The session-establishing packets include a SYN field that
identifies the sequence in the message exchange.
 An attacker can send a number of connection requests very rapidly
and then fail to respond to the reply.
 This leaves the first packet in the buffer so that other, legitimate
connection requests can't be accommodated.
 Although the packet in the buffer is dropped after a certain period
of time without a reply, the effect of many of these bogus
connection requests is to make it difficult for legitimate requests
for a session to get established.
 In general, this problem depends on the operating system providing
correct settings or allowing the network administrator to tune the
size of the buffer and the timeout period.
Teardrop Attack :
• This type of denial of service attack exploits the way
that the Internet Protocol (IP) requires a packet that is
too large for the next router to handle be divided into
fragments.
• The fragment packet identifies an offset to the
beginning of the first packet that enables the entire
packet to be reassembled by the receiving system.
• In the teardrop attack, the attacker's IP puts a confusing
offset value in the second or later fragment.
• If the receiving operating system does not have a plan
for this situation, it can cause the system to crash.
Smurf Attack
In this attack, the perpetrator sends an IP ping (or
"echo my message back to me") request to a receiving
site The ping packet specifies that it be broadcast to a
number of hosts within the receiving site's local
network.
 The packet also indicates that the request is from
another site, the target site that is to receive the denial
of service(Sending a packet with someone else's return
address in it is called spoofing the return address.)
 The result will be lots of ping replies flooding back to
the innocent, spoofed host.
If the flood is great enough, the spoofed host will no
longer be able to receive or distinguish real traffic.
Viruses
Computer viruses, which replicate across a network
in various ways, can be viewed as denial-of-service
attacks where the victim is not usually specifically
targeted but simply a host unlucky enough to get the
virus.
Depending on the particular virus, the denial of
service can be hardly noticeable ranging all the way
through disastrous.
Blocking of DOS Attack

More Related Content

More from Teja Babu

Buffer overflow explained
Buffer overflow explainedBuffer overflow explained
Buffer overflow explainedTeja Babu
 
introduction to computer
introduction to computerintroduction to computer
introduction to computerTeja Babu
 
french wines
french wines french wines
french wines Teja Babu
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Teja Babu
 
role of students in developing Nation
role of students in developing Nation role of students in developing Nation
role of students in developing Nation Teja Babu
 

More from Teja Babu (9)

Buffer overflow explained
Buffer overflow explainedBuffer overflow explained
Buffer overflow explained
 
Linux
Linux Linux
Linux
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
 
french wines
french wines french wines
french wines
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cisco ios
Cisco iosCisco ios
Cisco ios
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
role of students in developing Nation
role of students in developing Nation role of students in developing Nation
role of students in developing Nation
 
MANET
MANETMANET
MANET
 

Recently uploaded

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Dos (denial of service) ,stop DDoS attacks , types of Dos attack

  • 1. DOS (Denial Of Service)
  • 2. Explained : A denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have.  In a distributed denial-of-service, large numbers of compromised systems (sometimes called a botnet) attack a single target.
  • 3. The DDoS names range from mildly amusing to disturbing: Ping of Death - bots create huge electronic packets and sends them on to victims Mailbomb - bots send a massive amount of e-mail, crashing e-mail servers Smurf Attack - bots send Internet Control Message Protocol (ICMP) messages to reflectors Teardrop - bots send pieces of an illegitimate packet; the victim system tries to recombine the pieces into a packet and crashes as a result
  • 5. Typical connection “Denial Of Service”Attack
  • 6. Explained : The cracker sends the command to initiate the attack to his zombie army.  Each computer within the army sends an electronic connection request to an innocent computer called a reflector.  When the reflector receives the request, it looks like it originates not from the zombies, but from the ultimate victim of the attack.  The reflectors send information to the victim system, and eventually the system's performance suffers or it shuts down completely as it is inundated with multiple unsolicited responses from several computers at once.
  • 7. Securing your network fromthe inside out -- learn how to stop DDoS attacks  Although a DoS attack does not usually result in the theft of information or other security loss, it can cost the target person or company a great deal of time and money.  Typically, the loss of service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services.  A denial of service attack can also destroy programming and files in affected computer systems.  In some cases, DoS attacks have forced Web sites accessed by millions of people to temporarily cease operation.
  • 8. Buffer Overflow Attacks  The most common kind of DoS attack is simply to send more traffic to a network address than the programmers who planned its data buffers anticipated someone might send. The attacker may be aware that the target system has a weakness that can be exploited or the attacker may simply try the attack in case it might work. A few of the better-known attacks based on the buffer characteristics of a program or system include:  Sending e-mail messages that have attachments with 256- character file names to Netscape and Microsoft mail programs  Sending oversized Internet Control Message Protocol (ICMP) packets (this is also known as the Packet Internet or Inter-Network Groper (PING) of death)  Sending to a user of the Pine e-mail program a message with a "From" address larger than 256 characters
  • 9. SYN Attack  When a session is initiated between the Transport Control Program (TCP) client and server in a network, a very small buffer space exists to handle the usually rapid "hand-shaking" exchange of messages that sets up the session.  The session-establishing packets include a SYN field that identifies the sequence in the message exchange.  An attacker can send a number of connection requests very rapidly and then fail to respond to the reply.  This leaves the first packet in the buffer so that other, legitimate connection requests can't be accommodated.  Although the packet in the buffer is dropped after a certain period of time without a reply, the effect of many of these bogus connection requests is to make it difficult for legitimate requests for a session to get established.  In general, this problem depends on the operating system providing correct settings or allowing the network administrator to tune the size of the buffer and the timeout period.
  • 10. Teardrop Attack : • This type of denial of service attack exploits the way that the Internet Protocol (IP) requires a packet that is too large for the next router to handle be divided into fragments. • The fragment packet identifies an offset to the beginning of the first packet that enables the entire packet to be reassembled by the receiving system. • In the teardrop attack, the attacker's IP puts a confusing offset value in the second or later fragment. • If the receiving operating system does not have a plan for this situation, it can cause the system to crash.
  • 11. Smurf Attack In this attack, the perpetrator sends an IP ping (or "echo my message back to me") request to a receiving site The ping packet specifies that it be broadcast to a number of hosts within the receiving site's local network.  The packet also indicates that the request is from another site, the target site that is to receive the denial of service(Sending a packet with someone else's return address in it is called spoofing the return address.)  The result will be lots of ping replies flooding back to the innocent, spoofed host. If the flood is great enough, the spoofed host will no longer be able to receive or distinguish real traffic.
  • 12. Viruses Computer viruses, which replicate across a network in various ways, can be viewed as denial-of-service attacks where the victim is not usually specifically targeted but simply a host unlucky enough to get the virus. Depending on the particular virus, the denial of service can be hardly noticeable ranging all the way through disastrous.
  • 13. Blocking of DOS Attack