You are on page 1of 3

10_Denial_of_Services.

md 4/10/2019

Denial-of-Service is type of attack on which service offered by a system or a network is denied. Service may
either be denied, reduce the functionality or prevent the access.

Symptoms of DoS attack:

Slow performance
Increase in spam email
Unavailability of a resource
Loss of access to a website
Disconnection of a wireless or wired internet connection
Denial of access to any internet services

Distributed Denial of Service (DDoS)

In DDoS, multiple compromised systems are involved to attack a target.

The attacker send several conncetion request to the server with fake return address, so the server can't find a
user to send the connection approval. The authentication process waits for a certain time to close the session.
The attacker is continuously sending requests which causing a number of open connection on the server that
lead to a denial of service.

Categories of DoS/DDoS Attacks

Volumetric Attacks

Denial of Service attack performed by sending a high amount of traffic towards the target. Volumetric attack
are focused on overloading the bandwith capability.

Fragmentation Attacks

DoS attacks witch fragment the IP datagram into multiple smaller size packets. It requires to reassembly at the
destination which reuires resources of routers.

Types:

UDP and ICMP fragmentation attacks


TCP fragmentation attacks

TCP-State-Exhaustion Attacks

TCP-State-Exhaustion Attacks are focused on web servers, firewalls, load balancers and other infrastructure
component to distrupt connections by exhausting their finite number of concurrent connections.

Most common state-exhaustion attack is ping of death.

Application Layer Attacks / Layer 7 DDoS

The application level attack overloads the particular service of a website or application.

1/3
10_Denial_of_Services.md 4/10/2019

DoD/DDoS Attack Techniques

Bandwith Attacks

Bandwith attack requires multiple sources to generate q request to overload the target. The goal is to
consume the bandwith completely.

Zombie servers or Botnets used to perform this type of attack.

Service Request Floods

Attacker flood the request towards a web service or server until it is overloaded.

SYN Attack / Flooding

The attacker sending a lot of SYN request to tying up a system. The victim waits for the acknowledgement
from the IP address, but there will be no response because the source address is spoofed. This waiting period
ties up a connection "listen to queue", that can tie up for 75 seconds.

ICMP Flood Attack

Flooding ICMP request without waiting for the response overwhelm the resource of the network device.

Peer-to-Peer Attacks

Exploit bugs in peer-to-peer servers using Direct Connect (DC++). Using one or more malicious hosts in a
peer-to-peer network to perfomr the attack.

Permanent DoS Attack (PDoS)

Permanent DoS attack is focused on hardware sabotag, cause irreversible damage to the hardware. Affected
hardware require replacement or reinstall the software.

Methods:

Phlashing
Bricking a system : sending fraudulent hardware updates

Application Level Flood Attacks

Attacker finds the fault and flaws in an application or operating system and exploits the vulnerability to gain
controll over a system.

Distributed Reflection Denial of Service (DRDoS)

Attacker uses an intermediary victim which redirect the traffic to a secondary victim. Secondary victim
redirects the traffic to the target. The intermediary and secondary victim is used for spoofing the attack.

Botnet

2/3
10_Denial_of_Services.md 4/10/2019

Attacker compromises victims to make bot, which compromise other system to create a botnet. These botnets
are controlled by Command and Controll server owned by the attacke. This server is used to send
instructions to perform the attack.

3/3

You might also like