Professional Documents
Culture Documents
md 4/10/2019
Denial-of-Service is type of attack on which service offered by a system or a network is denied. Service may
either be denied, reduce the functionality or prevent the access.
Slow performance
Increase in spam email
Unavailability of a resource
Loss of access to a website
Disconnection of a wireless or wired internet connection
Denial of access to any internet services
The attacker send several conncetion request to the server with fake return address, so the server can't find a
user to send the connection approval. The authentication process waits for a certain time to close the session.
The attacker is continuously sending requests which causing a number of open connection on the server that
lead to a denial of service.
Volumetric Attacks
Denial of Service attack performed by sending a high amount of traffic towards the target. Volumetric attack
are focused on overloading the bandwith capability.
Fragmentation Attacks
DoS attacks witch fragment the IP datagram into multiple smaller size packets. It requires to reassembly at the
destination which reuires resources of routers.
Types:
TCP-State-Exhaustion Attacks
TCP-State-Exhaustion Attacks are focused on web servers, firewalls, load balancers and other infrastructure
component to distrupt connections by exhausting their finite number of concurrent connections.
The application level attack overloads the particular service of a website or application.
1/3
10_Denial_of_Services.md 4/10/2019
Bandwith Attacks
Bandwith attack requires multiple sources to generate q request to overload the target. The goal is to
consume the bandwith completely.
Attacker flood the request towards a web service or server until it is overloaded.
The attacker sending a lot of SYN request to tying up a system. The victim waits for the acknowledgement
from the IP address, but there will be no response because the source address is spoofed. This waiting period
ties up a connection "listen to queue", that can tie up for 75 seconds.
Flooding ICMP request without waiting for the response overwhelm the resource of the network device.
Peer-to-Peer Attacks
Exploit bugs in peer-to-peer servers using Direct Connect (DC++). Using one or more malicious hosts in a
peer-to-peer network to perfomr the attack.
Permanent DoS attack is focused on hardware sabotag, cause irreversible damage to the hardware. Affected
hardware require replacement or reinstall the software.
Methods:
Phlashing
Bricking a system : sending fraudulent hardware updates
Attacker finds the fault and flaws in an application or operating system and exploits the vulnerability to gain
controll over a system.
Attacker uses an intermediary victim which redirect the traffic to a secondary victim. Secondary victim
redirects the traffic to the target. The intermediary and secondary victim is used for spoofing the attack.
Botnet
2/3
10_Denial_of_Services.md 4/10/2019
Attacker compromises victims to make bot, which compromise other system to create a botnet. These botnets
are controlled by Command and Controll server owned by the attacke. This server is used to send
instructions to perform the attack.
3/3