Certified Ethical Hacker (CEH) : Denial-of-Services

0
544

Denial of Service (DoS)

Distributed Denial of Service (DDoS)

Categories of DoS/DDoS Attacks

  • Volumetric Attacks
  • Fragmentation Attacks
  • TCP-State-Exhaustion Attacks
  • Application Layer Attacks

DoS/DDoS Attack Techniques

  • Bandwidth Attacks
  • Service Request Floods
  • SYN Attack / Flooding
  • ICMP Flood Attack
  • Peer-to-Peer Attacks
  • Permanent Denial-of-Service Attack
  • Application Level Flood Attacks
  • Distributed Reflection Denial of Service (DRDoS)

Botnet Setup

Scanning Vulnerable Machines

Propagation of Malicious Codes

There are three most commonly used malicious code propagation methods including:

  • Central Source Propagation
  • Back-Chaining Propagation
  • Autonomous propagation

Botnet Trojan

  • Blackshades NET
  • Cythosia Botnet and Andromeda Bot
  • PlugBot

DoS/DDoS Attack Tools

  • Pandora DDoS Bot Toolkit
  • Derail
  • HOIC
  • DoS HTTP
  • BanglaDos
  • AnDOSid (Mobile)
  • Low Orbit Ion Cannon (LOIC) (Mobile)

Detection Techniques

  • Activity Profiling
  • Wavelet Analysis
  • Sequential Change-Point Detection

DDoS Attack Countermeasures

  • Protect secondary victims
  • Detect and neutralize handlers
  • Enabling ingress and egress filtering
  • Deflect attacks by diverting it to honeypots
  • Mitigate attacks by load balancing
  • Mitigate attacks disabling unnecessary services
  • Using Anti-malware
  • Enabling Router Throttling
  • Using a Reverse Proxy
  • Absorbing the Attack
  • Intrusion Detection Systems

LEAVE A REPLY

Please enter your comment!
Please enter your name here