SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
E N T E R P R I S E I T
S E C U R I T Y
WEB APPLICATION FIREWALL & DDOS
MITIGATION SOLUTION
12 TYPES OF DDOS ATTACK
www.haltdos.com
What is a
DDoS attack?
DDoS (Distributed Denial of Service) attack is a type of a cyber-
attack where an attacker use multiple compromised systems to
flood a network/web application with illegitimate traffic and
make it unavailable for the legitimate users who are trying to
access it.
During a DDoS attack, the incoming traffic which is
responsible for flooding the victim is originated
from many different sources. This efficiently
makes it impossible to stop the attack simply by
blocking a single IP address and thus, it is very
difficult to distinguish between legitimate user
traffic and attack traffic when it is spread across
too many points of origin which causes a denial of
service.
How DDoS
Attacks Work?
In today’s online businesses, DDoS attacks hold for a major concern. 
According to the report presented by Akamai - Q3 2017 Security Report, it was
concluded that there’s a 179.66% increase in the total number of DDoS
attacks since the last 3 years. 
Overview
Businesses from all over the world have suffered numerous high profile cyber incidents over the
past few years; with attacks on Github on Feb 2018 and several attacks on ISPs and Banks all over
the world showed us that even a single DDoS attack can have the potential to bring down any
business to its knees.
DDoS attacks have grown greater and urbane over the years, whether be it flooding a target with a
simple ping command based ICMP echo request or complex multi-vector attacks. In this
document, we shall overview the different types of DDoS attacks.
1. Application Level Attacks 
Application level attacks occur when an attacker attacks a specific application
or a website that is poorly coded in order to exploit its weakness. As a result,
the entire server gets exhausted and becomes unavailable to the legitimate
requests. Websites and applications with security loopholes also fall under the
susceptibility for hackers intending to steal information. These loopholes can
also be exploited with the help of a simple targeted attack that targets the
database. For example WordPress and Joomla are applications that can
exhaust a server’s resources.
2. Zero Day (0day) DDoS
Zero Day DDoS attacks are the attacks that are unidentified yet they exploit
new vulnerabilities. These attacks are not traceable and have undefined
defensive mechanisms.  
3. Ping Flood
Ping Flood is an application specific type of DDoS attack that is an evolved
version of Internet Control Message Protocol (ICMP) flood. In this type of DDoS
attack the attacker sends multiple spoofed ping packets to the server through
a large set of source IP. The purpose of the attacker is to flood the target with
ping packets until it goes offline.
It is designed in such a way that it consumes all the resources and bandwidth
which are available in the network until it is completely exhausted and finally
shuts down. It is not very easily detectable as it closely resembles the
legitimate traffic.
4. IP Null Attack
The IP packets contain IPv4 headers that enclose all the information about the
transport protocol which is being used in the protocol field.  In IP Null attack,
the attacker sends packets containing null value (zero) in this field and these
packets can neglect security measures which are designed to scan TCP, IP and
ICMP. As a result, when the server which is targeted will try to process these
packets, it will exhaust its resources and will reboot.
5. NTP Flood
NTP is an abbreviation used for Network Time Protocol. It is basically an
internet protocol which is used to synchronize the clocks of computers to
some time-reference. NTP Flood attack occurs when an attacker sends small
packets containing a spoofed IP of the target to internet enabled devices
running NTP. These spoofed requests then sends UDP floods as responses
from these devices to the target. When the target tries to identify this flood of
requests, all its resources gets exhausted and either it goes offline or will
reboot.
6. ICMP Flood
In an Internet Control Message Protocol (ICMP) Flood Attack occurs when an
attacker sends highly-spoofed ICMP packets in huge amount to flood a
network. As a result, all the resources and available bandwidth are consumed
and the network gets exhausted and it goes offline. ICMP floods can
overpower a network with packets containing random or fixed source IP
addresses. This attack can be viewed as a Network-Level volumetric attack
and thus can be defeated by L3/L4 Packet Filtering. 
7. SYN Flood
SYN flood attack occurs when an attacker sends a succession of SYN requests
to a targeted system. All the server resources are consumed and the system
thus becomes unresponsive to legitimate traffic. By flooding multiple TCP
ports on the target system with SYN (synchronize) messages, a SYN-flood
DDoS attack takes advantage of the TCP (Transmission Control Protocol) three-
way handshake process in order to initiate a connection between the source
system and the target system, thus making the system unresponsive to
legitimate traffic.
8. UDP Flood Attack
UDP stands for User Datagram Protocol that sends short packets of data,
called datagrams. UDP flood attack occurs when the attacker tries to flood the
target server with large number of spoofed data packets. As a result, all the
available bandwidth is consumed and exhausted. Thus, IP server gets down.
It is harder for defensive mechanisms to identify a UDP Flood attack since it is
an end to end process of communication between client and host.
9. UDP Fragmented Floods
The activity generated by the UDP fragmented flood attacks is similar to the
UDP flood attack, with a difference that in this case the attacker sends the
fragmented data packets to the target server. The target server then tries to
put these unrelated and fake fragmented UDP data packets together and
eventually fails to do so. As a result, all the available resources get exhausted
and this may lead to server reboot.
10. DNS Flood Attack
DNS Flood Attack occurs when the attacker sends a large amount of spoofed
DNS requests that are exact replica of the real DNS requests from a very large
set of source IP. Hence, it is not possible for the target server to differentiate
between the real and the fake DNS requests. In order to serve all the requests,
the server exhausts all its resources. As a result, the attack consumes all the
available bandwidth until it is completely drained out.
11. SIP Flood Attack 
Session Initiation Protocol (SIP) is a commonly used signaling protocol which is
used to support voice communication, video communication and other
multimedia applications. SIP Flood Attack occurs when an attacker sends
multiple INVITE requests without waiting for responses from the UAS or the
proxy with an aim to exhaust their respective resources.
12. Slowloris Attack
In this type of attack first of all the TCP connection is established, then as the
multiple requests comes at regular intervals, all the connections are eventually
consumed that restrict other servers to connect until some of the connections
are released. Thus at this point of time, hackers with limited traffic resources
successfully mount a Slowloris attack.
info@haltdos.com
To learn more visit our website - www.haltdos.com
FREE TRIAL
S T A R T Y O U R
https://app.haltdos.com
W E B A P P L I C A T I O N
F I R E W A L L & D D O S
P R O T E C T I O N
Understand the current web application threat
landscape, know why traditional network security
solutions fail to provide a complete protection against
today’s emerging threats and why your organization
needs a web application firewall to mitigate IT risks.
Sign up at haltdos.com

Mais conteúdo relacionado

Mais procurados

Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Kaustubh Padwad
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
joycruiser
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
Rollingsherman
 

Mais procurados (20)

Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Dos attack
Dos attackDos attack
Dos attack
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
Denial Of Service Attack
Denial Of Service AttackDenial Of Service Attack
Denial Of Service Attack
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDN
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Sql injection
Sql injectionSql injection
Sql injection
 

Semelhante a 12 types of DDoS attacks

A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
IJNSA Journal
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
swang2010
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
madlynplamondon
 

Semelhante a 12 types of DDoS attacks (20)

DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 
L1803046876
L1803046876L1803046876
L1803046876
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
 
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdfMS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
114331707
114331707114331707
114331707
 
Whitepaper on DDoS Mitigation
Whitepaper on DDoS MitigationWhitepaper on DDoS Mitigation
Whitepaper on DDoS Mitigation
 
A041201010
A041201010A041201010
A041201010
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERSENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
 
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux servers
 
Dos.pptx
Dos.pptxDos.pptx
Dos.pptx
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
IRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS Attacks
 

Mais de Haltdos

Mais de Haltdos (9)

9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time 9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Infographic on overview of Ransomware attacks
Infographic on overview of Ransomware attacksInfographic on overview of Ransomware attacks
Infographic on overview of Ransomware attacks
 
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAINFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are important
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
 
India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"
India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"
India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"
 
DDoS Mitigation Techniques for Your Enterprise IT Network
DDoS Mitigation Techniques for Your Enterprise IT NetworkDDoS Mitigation Techniques for Your Enterprise IT Network
DDoS Mitigation Techniques for Your Enterprise IT Network
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection Solution
 

Último

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 

Último (20)

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

12 types of DDoS attacks

  • 1. E N T E R P R I S E I T S E C U R I T Y WEB APPLICATION FIREWALL & DDOS MITIGATION SOLUTION 12 TYPES OF DDOS ATTACK www.haltdos.com
  • 2. What is a DDoS attack? DDoS (Distributed Denial of Service) attack is a type of a cyber- attack where an attacker use multiple compromised systems to flood a network/web application with illegitimate traffic and make it unavailable for the legitimate users who are trying to access it.
  • 3. During a DDoS attack, the incoming traffic which is responsible for flooding the victim is originated from many different sources. This efficiently makes it impossible to stop the attack simply by blocking a single IP address and thus, it is very difficult to distinguish between legitimate user traffic and attack traffic when it is spread across too many points of origin which causes a denial of service. How DDoS Attacks Work?
  • 4. In today’s online businesses, DDoS attacks hold for a major concern.  According to the report presented by Akamai - Q3 2017 Security Report, it was concluded that there’s a 179.66% increase in the total number of DDoS attacks since the last 3 years.  Overview
  • 5. Businesses from all over the world have suffered numerous high profile cyber incidents over the past few years; with attacks on Github on Feb 2018 and several attacks on ISPs and Banks all over the world showed us that even a single DDoS attack can have the potential to bring down any business to its knees. DDoS attacks have grown greater and urbane over the years, whether be it flooding a target with a simple ping command based ICMP echo request or complex multi-vector attacks. In this document, we shall overview the different types of DDoS attacks.
  • 6. 1. Application Level Attacks  Application level attacks occur when an attacker attacks a specific application or a website that is poorly coded in order to exploit its weakness. As a result, the entire server gets exhausted and becomes unavailable to the legitimate requests. Websites and applications with security loopholes also fall under the susceptibility for hackers intending to steal information. These loopholes can also be exploited with the help of a simple targeted attack that targets the database. For example WordPress and Joomla are applications that can exhaust a server’s resources.
  • 7. 2. Zero Day (0day) DDoS Zero Day DDoS attacks are the attacks that are unidentified yet they exploit new vulnerabilities. These attacks are not traceable and have undefined defensive mechanisms.  
  • 8. 3. Ping Flood Ping Flood is an application specific type of DDoS attack that is an evolved version of Internet Control Message Protocol (ICMP) flood. In this type of DDoS attack the attacker sends multiple spoofed ping packets to the server through a large set of source IP. The purpose of the attacker is to flood the target with ping packets until it goes offline. It is designed in such a way that it consumes all the resources and bandwidth which are available in the network until it is completely exhausted and finally shuts down. It is not very easily detectable as it closely resembles the legitimate traffic.
  • 9. 4. IP Null Attack The IP packets contain IPv4 headers that enclose all the information about the transport protocol which is being used in the protocol field.  In IP Null attack, the attacker sends packets containing null value (zero) in this field and these packets can neglect security measures which are designed to scan TCP, IP and ICMP. As a result, when the server which is targeted will try to process these packets, it will exhaust its resources and will reboot.
  • 10. 5. NTP Flood NTP is an abbreviation used for Network Time Protocol. It is basically an internet protocol which is used to synchronize the clocks of computers to some time-reference. NTP Flood attack occurs when an attacker sends small packets containing a spoofed IP of the target to internet enabled devices running NTP. These spoofed requests then sends UDP floods as responses from these devices to the target. When the target tries to identify this flood of requests, all its resources gets exhausted and either it goes offline or will reboot.
  • 11. 6. ICMP Flood In an Internet Control Message Protocol (ICMP) Flood Attack occurs when an attacker sends highly-spoofed ICMP packets in huge amount to flood a network. As a result, all the resources and available bandwidth are consumed and the network gets exhausted and it goes offline. ICMP floods can overpower a network with packets containing random or fixed source IP addresses. This attack can be viewed as a Network-Level volumetric attack and thus can be defeated by L3/L4 Packet Filtering. 
  • 12. 7. SYN Flood SYN flood attack occurs when an attacker sends a succession of SYN requests to a targeted system. All the server resources are consumed and the system thus becomes unresponsive to legitimate traffic. By flooding multiple TCP ports on the target system with SYN (synchronize) messages, a SYN-flood DDoS attack takes advantage of the TCP (Transmission Control Protocol) three- way handshake process in order to initiate a connection between the source system and the target system, thus making the system unresponsive to legitimate traffic.
  • 13. 8. UDP Flood Attack UDP stands for User Datagram Protocol that sends short packets of data, called datagrams. UDP flood attack occurs when the attacker tries to flood the target server with large number of spoofed data packets. As a result, all the available bandwidth is consumed and exhausted. Thus, IP server gets down. It is harder for defensive mechanisms to identify a UDP Flood attack since it is an end to end process of communication between client and host.
  • 14. 9. UDP Fragmented Floods The activity generated by the UDP fragmented flood attacks is similar to the UDP flood attack, with a difference that in this case the attacker sends the fragmented data packets to the target server. The target server then tries to put these unrelated and fake fragmented UDP data packets together and eventually fails to do so. As a result, all the available resources get exhausted and this may lead to server reboot.
  • 15. 10. DNS Flood Attack DNS Flood Attack occurs when the attacker sends a large amount of spoofed DNS requests that are exact replica of the real DNS requests from a very large set of source IP. Hence, it is not possible for the target server to differentiate between the real and the fake DNS requests. In order to serve all the requests, the server exhausts all its resources. As a result, the attack consumes all the available bandwidth until it is completely drained out.
  • 16. 11. SIP Flood Attack  Session Initiation Protocol (SIP) is a commonly used signaling protocol which is used to support voice communication, video communication and other multimedia applications. SIP Flood Attack occurs when an attacker sends multiple INVITE requests without waiting for responses from the UAS or the proxy with an aim to exhaust their respective resources.
  • 17. 12. Slowloris Attack In this type of attack first of all the TCP connection is established, then as the multiple requests comes at regular intervals, all the connections are eventually consumed that restrict other servers to connect until some of the connections are released. Thus at this point of time, hackers with limited traffic resources successfully mount a Slowloris attack.
  • 18. info@haltdos.com To learn more visit our website - www.haltdos.com FREE TRIAL S T A R T Y O U R https://app.haltdos.com W E B A P P L I C A T I O N F I R E W A L L & D D O S P R O T E C T I O N Understand the current web application threat landscape, know why traditional network security solutions fail to provide a complete protection against today’s emerging threats and why your organization needs a web application firewall to mitigate IT risks. Sign up at haltdos.com