Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Categories of DoS/DDoS Attacks
- Volumetric Attacks
- Fragmentation Attacks
- TCP-State-Exhaustion Attacks
- Application Layer Attacks
DoS/DDoS Attack Techniques
- Bandwidth Attacks
- Service Request Floods
- SYN Attack / Flooding
- ICMP Flood Attack
- Peer-to-Peer Attacks
- Permanent Denial-of-Service Attack
- Application Level Flood Attacks
- Distributed Reflection Denial of Service (DRDoS)
Botnet Setup
Scanning Vulnerable Machines
Propagation of Malicious Codes
There are three most commonly used malicious code propagation methods including:
- Central Source Propagation
- Back-Chaining Propagation
- Autonomous propagation
Botnet Trojan
- Blackshades NET
- Cythosia Botnet and Andromeda Bot
- PlugBot
DoS/DDoS Attack Tools
- Pandora DDoS Bot Toolkit
- Derail
- HOIC
- DoS HTTP
- BanglaDos
- AnDOSid (Mobile)
- Low Orbit Ion Cannon (LOIC) (Mobile)
Detection Techniques
- Activity Profiling
- Wavelet Analysis
- Sequential Change-Point Detection
DDoS Attack Countermeasures
- Protect secondary victims
- Detect and neutralize handlers
- Enabling ingress and egress filtering
- Deflect attacks by diverting it to honeypots
- Mitigate attacks by load balancing
- Mitigate attacks disabling unnecessary services
- Using Anti-malware
- Enabling Router Throttling
- Using a Reverse Proxy
- Absorbing the Attack
- Intrusion Detection Systems