Sie sind auf Seite 1von 11

SILIGURI INSTITUTE OF TECHNOLOGY

SEMINAR ON :

DoS attack SEMINAR ON :


SOLAR FUELS

(Denial-Of-Service Attack)

BY :
Moinak sutradhar
BACHELOR OF COMPUTER APPLICATIONS
SEMINAR GUIDE :
MRS. TUMPA BANNERJEE
ASSISTANT PROFESSOR, BACHELOR OF COMPUTER APPLICATIONS

HIGHLIGHTS :
 INTRODUCTION TO DENIAL-OF-SERVICE ATTACK
 SCHEMATIC DIAGRAM OF DoS ATTACK.
 SYMPTOMS
 ATTACK TECHN IQUES
 ARCHITECTURE OF DDoS ATTACK
 DISTRIBUTED ATTACK
 DEFENSE TECHNIQUES
 LEGALITY
 CONCLUSION
INTRODUCTION :

 AN ATTEMPT TO MAKE A MACHINE OR NETWORK RESOURCE UNAVAILABLE.


 INTERRUPT OR SUSPEND SERVICES OF A HOST CONNECTED TO THE INTERNET.
 TARGET SITES ARE OFTEN HIGH PROFILE WEB-SERVERS SUCH AS BANKS.
 IT INVOLVES SIMULTANEOUS MULTI-THREADED ISO LAYER ATTACKS.
 IT PERSISTS OVER EXTENDED PERIODS.
 A WIDE ARRAY OF PROGRAMS ARE USED TO LAUNCH DoS ATTACK.
 IT INVOLVES THE INABILITY TO ACCESS ANY WEBSITE.
SCHEMATIC DIAGRAM :
SYMPTOMS OF DoS ATTACK :

 SLOW NETWORK PERFORMANCES.


 UNAVAILABILITY OF A PARTICULAR WEBSITE.
 INABILITY TO ACCESS ANY WEBSITE.
 DISCONNECTION OF A WIRELESS OR A WIRED INTERNET CONNECTION.
 LONG TERM DENIAL OF ACCESS TO THE WEB OR INTERNET SERVICES.
 DRAMATIC INCREASE IN THE NUMBER OF SPAM MAILS
ATTACK TECHNIQUES :

 ADVANCED PERSISTENT DoS (APDoS)


 APPLICATION LAYER FLOODS.
 DENIAL-OF-SERVICE LEVEL II
 DDoS EXTORTION
 HTTP POST DoS ATTACK
 NUKE
 PEER TO PEER ATTACKS
DEFENSE TECHNIQUES:

 APPLICATION FRONT END HARDWARE

 APPLICATION LEVEL KEY COMPLETION INDICATORS

 BLACKHOLING AND SINKHOLING

 DDS BASED DEFENSE

 FIREWALLS
LEGALITY :

 MANY JURISDICTION HAVE LAWS STATING DENIAL-OF-SERVICE AS ILLEGAL.

 CONSIDERED A FEDERAL CRIME UNDER COMPUTER FRAUD AND ABUSE ACT.

 CAN BE SENTENCED TO A PENALTY OF 10 YEARS IN PRISON.

 DoS ATTACK CONSIDERED AS AN EFFECTIVE PART OF CYBER-CRIME.


CONCLUSION :
 A MACHINE MAY BECOME A PART OF DDoS ATTACK WITH THE USER’S CONSENT.
 EXAMPLE : OPERATION PAYBACK
 TOOLS FOR DDoS INCLUDE : PREDATOR’S FACE AND ROLLING THUNDER.
 SIMPLE ATTACKS MAY APPEAR WITH A WIDE RANGE OF BLOCKED IP ADDRESSES.
 ROUTERS CAN BE OVERWHELMED UNDER DoS ATTACK BY MANUAL SETTINGS.
 SYN FLOODS OCCUR WHEN A HOST SENDS A FLOOD OF TCP/SYN PACKETS.
 DoS IS A PUNISHABLE OFFENCE UNDER MANY JURISDICTIONS.
I WOULD LIKE TO THANK :

 ALL TEACHERS

 MY CLASSMATES

 AND SPECIALLY, MY SEMINAR GUIDE MRS. TUMPA BANNERJEE, ASSISTANT PROFESSOR,


BACHELOR OF COMPUTER APPLICATIONS.

WHO HAVE SUPPORTED ME IN ALL POSSIBLE WAYS AND HELPED MY SEMINAR TO BE A SUCCESSFUL ONE.

THANK YOU

Das könnte Ihnen auch gefallen