You are on page 1of 11

CASE STUDY ON

DDoS ATTACKS
By Aria Ibnat
TABLE OF CONTENTS

Intro to the Dyn Overview of the


DDoS Attack
01 04 GitHub DDoS Attack

Attack Methodology Attack Methodology


and Techniques
02 05 and Techniques

Results after the Results after the


Dyn Attack 03 06 GitHub Attack
Introduction

In the realm of cybersecurity, Distributed Denial of Service (DDoS) attacks have emerged as
a formidable threat, capable of disrupting online services and causing widespread chaos. This
case study delves into two significant DDoS attacks that left a lasting impact on the digital
landscape: the Dyn attack of 2016 and the GitHub incident of 2018. These high-profile events
serve as stark reminders of the evolving tactics employed by malicious actors and the critical
importance of robust cybersecurity measures in today's interconnected world. By exploring
the intricacies and consequences of these attacks, we can gain valuable insights into the ever-
present need for vigilance and resilience in the face of the growing DDoS menace.
The Dyn DDoS Incident
Dyn is a major DNS (Domain Name System) service
provider responsible for translating human-readable
domain names into IP addresses, ensuring the proper
functioning of numerous websites and online services.

• Revealed a critical internet infrastructure vulnerability

October 21
• Caused a widespread service disruption affecting popular websites,
services, and even IoT devices.

• Served as a wake-up call for organizations to enhance their

2016 cybersecurity measures

• Prompted greater collaboration among internet service providers,


security experts, and organizations to collectively address DDoS
threats and protect against similar incidents in the future.
THE METHODOLOGY AND TECHNIQUE

Mirai BotNet DNS Reflection Attacks Multi-Vector Attack


Mirai botnet, infected compromised It was used to amplify the Combined various DDoS techniques
Internet of Things (IoT) devices, assault by sending a load of and strategy for Dyn's security
turning them into a massive network queries. The victims respond teams as it required addressing
of bots under the control of the to those cauising a volume of multiple attack vectors
attackers. traffic. simultaneously.
THE OUTCOMES

• Disruption of Major Websites and Services

• Multiple Attack Waves

• Geographic Impact

• DNS Vulnerabilities Detection

• Attribution and Legal Actions

• Increased Awareness
GitHub DDoS Incident
On February 28, 2018, the GitHub DDoS Attack emerged as a
significant cybersecurity incident that targeted the world's largest
platform for software development and collaboration. This attack
highlighted the evolving tactics employed by cybercriminals to
disrupt critical online infrastructure.

• Underscored the vulnerability of essential development tools and


services to DDoS threats.

• Generated a massive influx of traffic, reaching up to 1.3 terabits per


second.

• Highlighted the significance of rapid incident response and


preparedness in safeguarding online services.

• Encouraged greater collaboration within the tech industry to address


DDoS threats.
THE TECHNIQUE AND METHODOLOGY

DDoS Technique Amplification Reflection Attacks


The attack primarily used a Distributed The attackers employed amplification The methodology included reflection
Denial of Service (DDoS) technique, techniques by sending small requests to attacks, where the attackers exploited
involving a massive botnet of compromised vulnerable servers, which generated insecure network protocols to bounce
computers to flood GitHub's servers with much larger responses. This magnified attack traffic through intermediary
traffic. This overwhelming volume of the volume of traffic directed at GitHub, servers. This obscured the source of the
requests aimed to disrupt GitHub's services. making it more challenging to handle. attack, complicating efforts to trace and
block the malicious traffic.
THE AFTERMATH

• Increased awareness of DDoS threats

• Improved security measures

• Impact on service reliability

• Enhanced user experience

• Lessons for other organizations

• Legal actions and investigations


CONCLUSION

The Dyn (2016) and GitHub (2018) DDoS attacks represent pivotal moments in the
ongoing battle against cyber threats. These incidents showcased the vulnerabilities of our
increasingly interconnected world and emphasized the critical role of cybersecurity in
maintaining the stability of online services. As we reflect on these case studies, it is evident
that DDoS attacks continue to evolve in scale and complexity, necessitating constant
innovation in defense strategies. The lessons learned from these attacks underscore the
imperative of collaborative efforts between organizations, governments, and individuals to
fortify our digital infrastructure. In an era where our daily lives are inexorably linked to the
digital realm, these case studies serve as a stark reminder of the need for ongoing
vigilance, adaptability, and resilience in the face of an ever-evolving threat landscape.
THANK
YOU—THE END

You might also like