The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)

Nicolae Sfetcu
Nicolae SfetcuFreelancer em MultiMedia

In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by cyber criminals to launch MitM (Man-in-the-Middle) attacks, DoS attacks, observing traffic in a computer network, etc. Hackers can affect the functioning of devices on an organization’s local network (server, router, switch, etc.) by sending thousands of packets per second to the target device. CAM Overflow is an attack where a hacker aims to overcrowd the CAM table of a switch with MAC addresses, and TCP SYN Flood is an attack that can be launched against a server in the computer network. INTELLIGENCE INFO, Vol. 1, Nr. 1, Septembrie 2022, pp. 125-130 ISSN 2821 – 8159, ISSN – L 2821 – 8159, DOI: 10.58679/II52272 URL: https://www.intelligenceinfo.org/the-impact-of-dos-denial-of-service-cyberattacks-on-a-local-area-network-lan/

INTELLIGENCE INFO
ISSN 2821 - 8159, ISSN – L 2821 – 8159, Volumul 1, Numărul 1, Septembrie 2022
The impact of DoS (Denial of Service) cyberattacks on a
Local Area Network (LAN)
Darius-Antoniu Ferenț
Pentru a cita acest articol: Ferenț, Darius-Antoniu (2022), The impact of DoS (Denial of Service)
cyberattacks on a Local Area Network (LAN), Intelligence Info, 1:1, 124-129, DOI:
10.58679/II52272, https://www.intelligenceinfo.org/the-impact-of-dos-denial-of-service-
cyberattacks-on-a-local-area-network-lan/
Publicat online: 10.08.2022
ABONARE
© 2022 Darius-Antoniu Ferenț. Responsabilitatea conținutului, interpretărilor și opiniilor
exprimate revine exclusiv autorilor.
INTELLIGENCE INFO
2
The impact of DoS (Denial of Service) cyberattacks on a
Local Area Network (LAN)
Darius-Antoniu Ferenț
Abstract
In this paper I will highlight a modus operandi of hackers launching Denial of Service
(DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks
can be performed, using Kali Linux, a Linux distribution used by cyber criminals to launch MitM
(Man-in-the-Middle) attacks, DoS attacks, observing traffic in a computer network, etc. Hackers
can affect the functioning of devices on an organization’s local network (server, router, switch,
etc.) by sending thousands of packets per second to the target device. CAM Overflow is an attack
where a hacker aims to overcrowd the CAM table of a switch with MAC addresses, and TCP SYN
Flood is an attack that can be launched against a server in the computer network.
Keywords: cyberattack, Denial of service (DoS), botnet, Local Area Network (LAN),
cyber criminals, CAM Overflow.
Rezumat
În cadrul acestui articol voi evidenția un modus operandi al hackerilor care lansează atacuri
cibernetice de tip Denial of Service (DoS). Voi arăta teoretic cum pot fi realizate atacurile CAM
Overflow și TCP SYN Flood, utilizând Kali Linux, o distribuție de Linux utilizată de criminalii
cibernetici pentru a putea lansa atacuri de tip MitM (Man-in-the-Middle), atacuri DoS, observarea
traficului dintr-o rețea de calculatoare etc. Hackerii pot afecta funcționarea dispozitivelor din
rețeaua locală a unei organizații (server, router, switch etc.) prin trimiterea a mii de
pachete/secundă către dispozitivul țintă. CAM Overflow este un atac prin care un hacker urmărește
să supra-aglomereze tabela CAM a unui switch cu adrese MAC, iar TCP SYN Flood este un atac
care poate fi lansat împotriva unui server din rețeaua de calculatoare.
THE IMPACT OF DOS (DENIAL OF SERVICE) CYBERATTACKS ON A LOCAL AREA NETWORK (LAN)
3
Cuvinte cheie: atac cibernetic, Denial of service (DoS), botnet, Local Area Network
(LAN), criminali cibernetici, CAM Overflow.
INTELLIGENCE INFO, Volumul 1, Numărul 1, Septembrie 2022, pp. 124-129
ISSN 2821 - 8159, ISSN – L 2821 – 8159, DOI: 10.58679/II52272
URL: https://www.intelligenceinfo.org/the-impact-of-dos-denial-of-service-cyberattacks-on-a-
local-area-network-lan/
© 2022 Darius-Antoniu Ferenț. Responsabilitatea conținutului, interpretărilor și opiniilor
exprimate revine exclusiv autorilor.
INTELLIGENCE INFO
4
A network is a collection of interconnected devices (computers, routers, switches, etc.) that
exchange information via protocols. Network equipment such as switches, routers, servers, access
points and modems play an important role in the networks’ operation.
The size of a network can be determined by the number of computers integrated within the
network, as well as by the geographical extent of the network. Networks are therefore divided into:
Local area networks (known as LAN), Metropolitan area networks (MAN), Wide area networks
(WAN). A LAN is a private network inside a building. A LAN works in people's homes, schools,
offices, factories. A university campus network is also a LAN. Within a company or business, a
larger LAN can be created by connecting switches together. A large LAN network can be
organised into two smaller local area networks which leads to efficiency because such a network
is easier to manage.
Wide area networks cover the area of a country or a continent. The Internet is considered
a wide area network (planetary network), "consecrated by the phrase network of networks"
(Pătrașcu 2018, p.24). The Internet is used globally and is particularly important in all sectors of
human life. A wide area network is used to connect smaller, LAN-like networks so that computer
users in location A can communicate with users and computers in location B.
"Denial of Service (DoS) is a cyberattack aimed at blocking and making the resources of an IT&C
system or network unavailable, by flooding the victim's system with an overwhelming
amount of traffic or service requests to overload the web server, computer or network."
(Ferenț 2022, p.43).
In order to emphasize the hackers’ modus operandi, we will show how two Denial of
Service (DoS) cyberattacks can theoretically be carried out and the impact they have on an IT&C
system. To perform the CAM Overflow and TCP SYN Flood attacks we will use Kali Linux, a
Linux distribution used by Black-Hat Hackers and White-Hat Hackers. The tools in Kali Linux
are grouped into 14 categories, depending on what action or cyberattack a hacker wants to initiate.
For example, Kali Linux has tools for scanning vulnerabilities in a computer network (Nmap,
Nessus). A wide range of cyberattacks can also be launched using the Kali Linux toolkit: MitM
attacks, Spoofing, DoS, web attacks, password cracking attacks, network traffic observation, etc.
CAM Overflow is a Denial of Service cyberattack that targets the overpopulation of a
switch's CAM table. A switch is a network device that connects multiple devices (laptops,
computers, servers) in a local area network (LAN). A switch sends data from one computing device
to another based on the source and destination MAC addresses. Based on the source MAC address,
THE IMPACT OF DOS (DENIAL OF SERVICE) CYBERATTACKS ON A LOCAL AREA NETWORK (LAN)
5
a switch remembers the port a device is on, and based on the destination MAC address, the switch
sends traffic to a port. This information is stored by the switch in the CAM (Content Addressable
Memory) table, which is limited. Depending on the model, a switch may hold several thousand
MAC addresses. In order to illustrate a CAM Overflow cyberattack, we will design a local network
in which we have two switches (SW1 and SW2), a router and three computers (C1, C2 and C3).
In our example, the hacker controls computer C2. Taking advantage of the fact that SW1
will learn the source MAC address on port Gi0/1, the hacker will send thousands of random source
MACs per second from the C2 computing device, using Kali Linux. At that time, SW1 will retain
all the source MACs received in the CAM table. If the CAM table fills up, SW1 will not retain any
more MAC addresses. Note that the switch will not get blocked. When computer C1 wants to send
information to computer C3, the switch will not know on which port to send that information,
because other MAC addresses have appeared in the CAM table, so it will send traffic to all ports
available to it (including computer C2 which is controlled by the attacker). For example, if the user
at C1 is communicating with the user at computer C3 and there is an unencrypted connection
between the two devices, when the switch sends the traffic to C2, the attacker can use the
Wireshark tool in Kali Linux to listen for that traffic.
INTELLIGENCE INFO
6
To avoid CAM Overflow attacks, it is recommended to use a set of port rules (Port
Security). The solution is to limit the number of MAC addresses that can be learned on a port. If
we observe that the C2 device sends a lot of MAC addresses in a short time, we set a limit. For
example, on port Gi0/1 a maximum of two MAC addresses can be accessed simultaneously. If the
C2 device sends more MAC addresses than the set limit, the Gi0/1 port will shut down.
For example, a malicious person in an institution wants to disconnect computer C2 and
connect a new switch (SW3) to the network and three laptops to its ports. In this case, Port Security
ensures that if more than two MAC addresses are sent on Gi0/1, that port shuts down.
Denial of Service (DoS) cyberattacks can also be launched using Metasploit, a complex
tool in Kali Linux. By sending a very large number of packets in a very short time, cyber criminals
can disrupt the operation of a server (e.g. mail server), router or computer equipment in the
computer network of a firm, company or institution. The attacker can use the Metasploit tool to
launch a TCP SYN Flood attack on a server in the network.
The TCP SYN cyberattack can be carried out due to the exchange of messages at the
beginning of the Transmission Control Protocol (TCP). When a client sends a request (SYN) to a
server, announcing its intention to start a conversation, the server designates an entry in the table
of half-open connections and sends back an acceptance message (SYN-ACK), announcing its
readiness. The client must respond with an ACK packet in order to start the communication. An
attacker might never send this acknowledgement, causing the connection table to fill up, further
legitimate requests thus being blocked (Nicolăescu 2011, p.29). In short, the hacker initiates many
TCP connections to a server without completing the normal message exchange.
The users of computing devices (computer, laptop, smartphone, tablet, etc.) who do not use
a firewall program and do not regularly update their anti-virus/anti-malware software, put their
own computing equipment at risk of being infected with malware and integrated into a botnet, with
which the hacker can launch DDoS (Distributed Denial of Services) attacks. Also, to prevent their
computing devices from being infected with malware, users should fix security holes and software
bugs in their operating systems by automatically or manually applying available updates.
After infecting hundreds or thousands of IT&C devices, a hacker can launch a DDoS attack
to disrupt an entire network. These attacks are not easy to counteract, as a botnet can contain
computers/devices distributed in different parts of the world (Ferenț 2022, p.44). The use of a
firewall is very important for a firm, institution or a company because, by filtering traffic and
THE IMPACT OF DOS (DENIAL OF SERVICE) CYBERATTACKS ON A LOCAL AREA NETWORK (LAN)
7
checking whether a downloaded file is safe or malicious, it may prevent DoS attacks, and turning
network computers into zombies. A computer/laptop that has not been compromised by a malware
infection cannot be turned into a bot. If the firewall notices a very large number of packets coming
from a particular source, it will defensively remove them all. However, if the hacker uses the
spoofing technique, the firewall is put in difficulty, as it cannot differentiate secure (legitimate)
packets from malicious ones, coming from the same sources (Budiu 2001). At the same time,
smartphones and tablets can be used to send spam emails or launch DDoS attacks, as these devices
connect into the so-called zombie networks (Goodman 2016, p.201).
Bibliography
Budiu, Mihai (2001). „Atacuri distribuite în Internet” [Shared attacks on the Internet],
available at: https://www.cs.cmu.edu/~mihaib/articole/ddos/ddos-html.html.
Ferenț, Darius-Antoniu (2022). Ghid de securitate cibernetică [Cybersecurity guide],
Cluj-Napoca, Casa Cărții de Știință Publishing House.
Goodman, Marc (2016). X-Cyber: viitorul începe azi [The future starts today],
Bucharest, Rao Publishing House.
Nicolăescu, Nicu-Sebastian (2011). Teză de doctorat: Contribuții privind monitorizarea
securității rețelelor de calculatoare [PhD Thesis: Contributions on network security
monitoring], Bucharest, The Technical Military Academy.
Tanenbaum, Andrew, Wetherall, David (2011). Computer Networks, 5th
edition, Pretince
Hall Publishing House.
Pătrașcu, Petrișor (2018). „Infrastructurile cibernetice specifice sectorului tehnologiei
informației” [Cyber infrastructures specific to the IT sector], Buletinul Universității Naționale de
Apărare Carol I [Bulletin of Carol I National Defense University], available at:
https://revista.unap.ro/index.php//revista/article/view/428/418.

Recomendados

Drdos por
DrdosDrdos
DrdosMarc Manthey
876 visualizações23 slides
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM por
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISMDISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISMijcseit
11 visualizações11 slides
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM por
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM ijcseit
14 visualizações11 slides
Impact of Flash Crowd Attack in Online Retail Applications por
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsIJEACS
22 visualizações6 slides
cloud computing final year project por
cloud computing final year projectcloud computing final year project
cloud computing final year projectAmeya Vashishth
693 visualizações32 slides
DoS/DDoS por
DoS/DDoSDoS/DDoS
DoS/DDoSVihari Piratla
1.2K visualizações24 slides

Mais conteúdo relacionado

Similar a The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)

internet architecture.pdf por
internet architecture.pdfinternet architecture.pdf
internet architecture.pdfqhawengcongo
11 visualizações10 slides
Computer network por
Computer networkComputer network
Computer networksamiksha padgilwar
2.3K visualizações47 slides
Computer network por
Computer networkComputer network
Computer networksamiksha padgilwar
489 visualizações47 slides
Increasing network efficiency by preventing attacks at access layer por
Increasing network efficiency by preventing attacks at access layerIncreasing network efficiency by preventing attacks at access layer
Increasing network efficiency by preventing attacks at access layereSAT Publishing House
340 visualizações5 slides
Internet Security Issues por
Internet Security IssuesInternet Security Issues
Internet Security Issuesanides
954 visualizações6 slides
Arun prjct dox por
Arun prjct doxArun prjct dox
Arun prjct doxBaig Mirza
1K visualizações45 slides

Similar a The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)(20)

internet architecture.pdf por qhawengcongo
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
qhawengcongo11 visualizações
Computer network por samiksha padgilwar
Computer networkComputer network
Computer network
samiksha padgilwar2.3K visualizações
Computer network por samiksha padgilwar
Computer networkComputer network
Computer network
samiksha padgilwar489 visualizações
Increasing network efficiency by preventing attacks at access layer por eSAT Publishing House
Increasing network efficiency by preventing attacks at access layerIncreasing network efficiency by preventing attacks at access layer
Increasing network efficiency by preventing attacks at access layer
eSAT Publishing House340 visualizações
Internet Security Issues por anides
Internet Security IssuesInternet Security Issues
Internet Security Issues
anides954 visualizações
Arun prjct dox por Baig Mirza
Arun prjct doxArun prjct dox
Arun prjct dox
Baig Mirza1K visualizações
Using The Command, Arp -S por Melissa Grant
Using The Command, Arp -SUsing The Command, Arp -S
Using The Command, Arp -S
Melissa Grant2 visualizações
20320140501016 por IAEME Publication
2032014050101620320140501016
20320140501016
IAEME Publication330 visualizações
A Survey: DDOS Attack on Internet of Things por IJERD Editor
A Survey: DDOS Attack on Internet of ThingsA Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of Things
IJERD Editor758 visualizações
Aw36294299 por IJERA Editor
Aw36294299Aw36294299
Aw36294299
IJERA Editor323 visualizações
The Robust system for antivenin DDOS by Rioter Puddle Expertise por AM Publications
The Robust system for antivenin DDOS by Rioter Puddle ExpertiseThe Robust system for antivenin DDOS by Rioter Puddle Expertise
The Robust system for antivenin DDOS by Rioter Puddle Expertise
AM Publications279 visualizações
L1803046876 por IOSR Journals
L1803046876L1803046876
L1803046876
IOSR Journals157 visualizações
Detection of application layer ddos attack using hidden semi markov model (20... por Mumbai Academisc
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...
Mumbai Academisc962 visualizações
IRJET- A Novel Survey on DOS Attacks por IRJET Journal
IRJET- A Novel Survey on DOS AttacksIRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS Attacks
IRJET Journal18 visualizações
DDoS.ppt por EllenSutiyem
DDoS.pptDDoS.ppt
DDoS.ppt
EllenSutiyem3 visualizações
Internet Traffic Monitoring and Analysis por Information Technology
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
Information Technology8K visualizações
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho... por IJNSA Journal
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
IJNSA Journal15 visualizações
Quantifying the impact of flood attack on por ijcsa
Quantifying the impact of flood attack onQuantifying the impact of flood attack on
Quantifying the impact of flood attack on
ijcsa251 visualizações
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM por cscpconf
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
cscpconf137 visualizações

Mais de Nicolae Sfetcu

Intelligence Info, Volumul 2, Numărul 2, Iunie 2023 - Rezumate por
Intelligence Info, Volumul 2, Numărul 2, Iunie 2023 - RezumateIntelligence Info, Volumul 2, Numărul 2, Iunie 2023 - Rezumate
Intelligence Info, Volumul 2, Numărul 2, Iunie 2023 - RezumateNicolae Sfetcu
2 visualizações19 slides
Tratatul de la Lisabona – un nou tip de securitate europeană por
Tratatul de la Lisabona – un nou tip de securitate europeanăTratatul de la Lisabona – un nou tip de securitate europeană
Tratatul de la Lisabona – un nou tip de securitate europeanăNicolae Sfetcu
3 visualizações15 slides
Biopolitica și geopolitica por
Biopolitica și geopoliticaBiopolitica și geopolitica
Biopolitica și geopoliticaNicolae Sfetcu
3 visualizações13 slides
Dance Music por
Dance MusicDance Music
Dance MusicNicolae Sfetcu
5 visualizações238 slides
Puncte de vedere privind activitatea Serviciului Special de Informații după 2... por
Puncte de vedere privind activitatea Serviciului Special de Informații după 2...Puncte de vedere privind activitatea Serviciului Special de Informații după 2...
Puncte de vedere privind activitatea Serviciului Special de Informații după 2...Nicolae Sfetcu
4 visualizações18 slides
Actul de la 23 august 1944 în România por
Actul de la 23 august 1944 în RomâniaActul de la 23 august 1944 în România
Actul de la 23 august 1944 în RomâniaNicolae Sfetcu
3 visualizações9 slides

Mais de Nicolae Sfetcu(20)

Intelligence Info, Volumul 2, Numărul 2, Iunie 2023 - Rezumate por Nicolae Sfetcu
Intelligence Info, Volumul 2, Numărul 2, Iunie 2023 - RezumateIntelligence Info, Volumul 2, Numărul 2, Iunie 2023 - Rezumate
Intelligence Info, Volumul 2, Numărul 2, Iunie 2023 - Rezumate
Nicolae Sfetcu2 visualizações
Tratatul de la Lisabona – un nou tip de securitate europeană por Nicolae Sfetcu
Tratatul de la Lisabona – un nou tip de securitate europeanăTratatul de la Lisabona – un nou tip de securitate europeană
Tratatul de la Lisabona – un nou tip de securitate europeană
Nicolae Sfetcu3 visualizações
Biopolitica și geopolitica por Nicolae Sfetcu
Biopolitica și geopoliticaBiopolitica și geopolitica
Biopolitica și geopolitica
Nicolae Sfetcu3 visualizações
Dance Music por Nicolae Sfetcu
Dance MusicDance Music
Dance Music
Nicolae Sfetcu5 visualizações
Puncte de vedere privind activitatea Serviciului Special de Informații după 2... por Nicolae Sfetcu
Puncte de vedere privind activitatea Serviciului Special de Informații după 2...Puncte de vedere privind activitatea Serviciului Special de Informații după 2...
Puncte de vedere privind activitatea Serviciului Special de Informații după 2...
Nicolae Sfetcu4 visualizações
Actul de la 23 august 1944 în România por Nicolae Sfetcu
Actul de la 23 august 1944 în RomâniaActul de la 23 august 1944 în România
Actul de la 23 august 1944 în România
Nicolae Sfetcu3 visualizações
Mărturii importante despre momentul 23 august 1944 por Nicolae Sfetcu
Mărturii importante despre momentul 23 august 1944Mărturii importante despre momentul 23 august 1944
Mărturii importante despre momentul 23 august 1944
Nicolae Sfetcu2 visualizações
Analistul în „intelligence” și rolul său de „filtru al informațiilor” por Nicolae Sfetcu
Analistul în „intelligence” și rolul său de „filtru al informațiilor”Analistul în „intelligence” și rolul său de „filtru al informațiilor”
Analistul în „intelligence” și rolul său de „filtru al informațiilor”
Nicolae Sfetcu9 visualizações
Cunoașterea Științifică, Volumul 2, Numărul 2, Iunie 2023 por Nicolae Sfetcu
Cunoașterea Științifică, Volumul 2, Numărul 2, Iunie 2023Cunoașterea Științifică, Volumul 2, Numărul 2, Iunie 2023
Cunoașterea Științifică, Volumul 2, Numărul 2, Iunie 2023
Nicolae Sfetcu4 visualizações
IT & C, Volumul 2, Numărul 1, Martie 2023 por Nicolae Sfetcu
IT & C, Volumul 2, Numărul 1, Martie 2023IT & C, Volumul 2, Numărul 1, Martie 2023
IT & C, Volumul 2, Numărul 1, Martie 2023
Nicolae Sfetcu2 visualizações
Puncte de vedere privind tipologia serviciilor de intelligence din unele stat... por Nicolae Sfetcu
Puncte de vedere privind tipologia serviciilor de intelligence din unele stat...Puncte de vedere privind tipologia serviciilor de intelligence din unele stat...
Puncte de vedere privind tipologia serviciilor de intelligence din unele stat...
Nicolae Sfetcu3 visualizações
Intelligence Info, Volumul 2, Numărul 1, Martie 2023 - Rezumate por Nicolae Sfetcu
Intelligence Info, Volumul 2, Numărul 1, Martie 2023 - RezumateIntelligence Info, Volumul 2, Numărul 1, Martie 2023 - Rezumate
Intelligence Info, Volumul 2, Numărul 1, Martie 2023 - Rezumate
Nicolae Sfetcu4 visualizações
Considerații privind educația și formarea analiștilor de intelligence într-o ... por Nicolae Sfetcu
Considerații privind educația și formarea analiștilor de intelligence într-o ...Considerații privind educația și formarea analiștilor de intelligence într-o ...
Considerații privind educația și formarea analiștilor de intelligence într-o ...
Nicolae Sfetcu5 visualizações
Metodologii moderne în analiza intelligence por Nicolae Sfetcu
Metodologii moderne în analiza intelligenceMetodologii moderne în analiza intelligence
Metodologii moderne în analiza intelligence
Nicolae Sfetcu4 visualizações
Organizarea, structurile şi transformările unei organizații de intelligence por Nicolae Sfetcu
Organizarea, structurile şi transformările unei organizații de intelligenceOrganizarea, structurile şi transformările unei organizații de intelligence
Organizarea, structurile şi transformările unei organizații de intelligence
Nicolae Sfetcu4 visualizações
Republica lui Platon por Nicolae Sfetcu
Republica lui PlatonRepublica lui Platon
Republica lui Platon
Nicolae Sfetcu3 visualizações
Învățarea automată a regulilor de asociere în mineritul datelor (data mining) por Nicolae Sfetcu
Învățarea automată a regulilor de asociere în mineritul datelor (data mining)Învățarea automată a regulilor de asociere în mineritul datelor (data mining)
Învățarea automată a regulilor de asociere în mineritul datelor (data mining)
Nicolae Sfetcu5 visualizações
Variabile în dezvoltarea WordPress por Nicolae Sfetcu
Variabile în dezvoltarea WordPressVariabile în dezvoltarea WordPress
Variabile în dezvoltarea WordPress
Nicolae Sfetcu3 visualizações
Anomalii ale relativității generale por Nicolae Sfetcu
Anomalii ale relativității generaleAnomalii ale relativității generale
Anomalii ale relativității generale
Nicolae Sfetcu5 visualizações
Viitorul științei – Știința științelor por Nicolae Sfetcu
Viitorul științei – Știința științelorViitorul științei – Știința științelor
Viitorul științei – Știința științelor
Nicolae Sfetcu4 visualizações

Último

ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... por
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
18 visualizações49 slides
Info Session November 2023.pdf por
Info Session November 2023.pdfInfo Session November 2023.pdf
Info Session November 2023.pdfAleksandraKoprivica4
12 visualizações15 slides
Future of Indian ConsumerTech por
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
21 visualizações68 slides
Case Study Copenhagen Energy and Business Central.pdf por
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdfAitana
16 visualizações3 slides
PRODUCT LISTING.pptx por
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptxangelicacueva6
14 visualizações1 slide
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
31 visualizações35 slides

Último(20)

ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... por Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Jasper Oosterveld18 visualizações
Info Session November 2023.pdf por AleksandraKoprivica4
Info Session November 2023.pdfInfo Session November 2023.pdf
Info Session November 2023.pdf
AleksandraKoprivica412 visualizações
Case Study Copenhagen Energy and Business Central.pdf por Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 visualizações
PRODUCT LISTING.pptx por angelicacueva6
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptx
angelicacueva614 visualizações
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum31 visualizações
handbook for web 3 adoption.pdf por Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 visualizações
Special_edition_innovator_2023.pdf por WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 visualizações
Uni Systems for Power Platform.pptx por Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.56 visualizações
PRODUCT PRESENTATION.pptx por angelicacueva6
PRODUCT PRESENTATION.pptxPRODUCT PRESENTATION.pptx
PRODUCT PRESENTATION.pptx
angelicacueva614 visualizações
virtual reality.pptx por G036GaikwadSnehal
virtual reality.pptxvirtual reality.pptx
virtual reality.pptx
G036GaikwadSnehal11 visualizações
Data Integrity for Banking and Financial Services por Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely21 visualizações
Network Source of Truth and Infrastructure as Code revisited por Network Automation Forum
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisited
Network Automation Forum26 visualizações
The details of description: Techniques, tips, and tangents on alternative tex... por BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada127 visualizações
HTTP headers that make your website go faster - devs.gent November 2023 por Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp55 visualizações
Attacking IoT Devices from a Web Perspective - Linux Day por Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri16 visualizações
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining52 visualizações
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker37 visualizações

The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)

  • 1. INTELLIGENCE INFO ISSN 2821 - 8159, ISSN – L 2821 – 8159, Volumul 1, Numărul 1, Septembrie 2022 The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN) Darius-Antoniu Ferenț Pentru a cita acest articol: Ferenț, Darius-Antoniu (2022), The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN), Intelligence Info, 1:1, 124-129, DOI: 10.58679/II52272, https://www.intelligenceinfo.org/the-impact-of-dos-denial-of-service- cyberattacks-on-a-local-area-network-lan/ Publicat online: 10.08.2022 ABONARE © 2022 Darius-Antoniu Ferenț. Responsabilitatea conținutului, interpretărilor și opiniilor exprimate revine exclusiv autorilor.
  • 2. INTELLIGENCE INFO 2 The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN) Darius-Antoniu Ferenț Abstract In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by cyber criminals to launch MitM (Man-in-the-Middle) attacks, DoS attacks, observing traffic in a computer network, etc. Hackers can affect the functioning of devices on an organization’s local network (server, router, switch, etc.) by sending thousands of packets per second to the target device. CAM Overflow is an attack where a hacker aims to overcrowd the CAM table of a switch with MAC addresses, and TCP SYN Flood is an attack that can be launched against a server in the computer network. Keywords: cyberattack, Denial of service (DoS), botnet, Local Area Network (LAN), cyber criminals, CAM Overflow. Rezumat În cadrul acestui articol voi evidenția un modus operandi al hackerilor care lansează atacuri cibernetice de tip Denial of Service (DoS). Voi arăta teoretic cum pot fi realizate atacurile CAM Overflow și TCP SYN Flood, utilizând Kali Linux, o distribuție de Linux utilizată de criminalii cibernetici pentru a putea lansa atacuri de tip MitM (Man-in-the-Middle), atacuri DoS, observarea traficului dintr-o rețea de calculatoare etc. Hackerii pot afecta funcționarea dispozitivelor din rețeaua locală a unei organizații (server, router, switch etc.) prin trimiterea a mii de pachete/secundă către dispozitivul țintă. CAM Overflow este un atac prin care un hacker urmărește să supra-aglomereze tabela CAM a unui switch cu adrese MAC, iar TCP SYN Flood este un atac care poate fi lansat împotriva unui server din rețeaua de calculatoare.
  • 3. THE IMPACT OF DOS (DENIAL OF SERVICE) CYBERATTACKS ON A LOCAL AREA NETWORK (LAN) 3 Cuvinte cheie: atac cibernetic, Denial of service (DoS), botnet, Local Area Network (LAN), criminali cibernetici, CAM Overflow. INTELLIGENCE INFO, Volumul 1, Numărul 1, Septembrie 2022, pp. 124-129 ISSN 2821 - 8159, ISSN – L 2821 – 8159, DOI: 10.58679/II52272 URL: https://www.intelligenceinfo.org/the-impact-of-dos-denial-of-service-cyberattacks-on-a- local-area-network-lan/ © 2022 Darius-Antoniu Ferenț. Responsabilitatea conținutului, interpretărilor și opiniilor exprimate revine exclusiv autorilor.
  • 4. INTELLIGENCE INFO 4 A network is a collection of interconnected devices (computers, routers, switches, etc.) that exchange information via protocols. Network equipment such as switches, routers, servers, access points and modems play an important role in the networks’ operation. The size of a network can be determined by the number of computers integrated within the network, as well as by the geographical extent of the network. Networks are therefore divided into: Local area networks (known as LAN), Metropolitan area networks (MAN), Wide area networks (WAN). A LAN is a private network inside a building. A LAN works in people's homes, schools, offices, factories. A university campus network is also a LAN. Within a company or business, a larger LAN can be created by connecting switches together. A large LAN network can be organised into two smaller local area networks which leads to efficiency because such a network is easier to manage. Wide area networks cover the area of a country or a continent. The Internet is considered a wide area network (planetary network), "consecrated by the phrase network of networks" (Pătrașcu 2018, p.24). The Internet is used globally and is particularly important in all sectors of human life. A wide area network is used to connect smaller, LAN-like networks so that computer users in location A can communicate with users and computers in location B. "Denial of Service (DoS) is a cyberattack aimed at blocking and making the resources of an IT&C system or network unavailable, by flooding the victim's system with an overwhelming amount of traffic or service requests to overload the web server, computer or network." (Ferenț 2022, p.43). In order to emphasize the hackers’ modus operandi, we will show how two Denial of Service (DoS) cyberattacks can theoretically be carried out and the impact they have on an IT&C system. To perform the CAM Overflow and TCP SYN Flood attacks we will use Kali Linux, a Linux distribution used by Black-Hat Hackers and White-Hat Hackers. The tools in Kali Linux are grouped into 14 categories, depending on what action or cyberattack a hacker wants to initiate. For example, Kali Linux has tools for scanning vulnerabilities in a computer network (Nmap, Nessus). A wide range of cyberattacks can also be launched using the Kali Linux toolkit: MitM attacks, Spoofing, DoS, web attacks, password cracking attacks, network traffic observation, etc. CAM Overflow is a Denial of Service cyberattack that targets the overpopulation of a switch's CAM table. A switch is a network device that connects multiple devices (laptops, computers, servers) in a local area network (LAN). A switch sends data from one computing device to another based on the source and destination MAC addresses. Based on the source MAC address,
  • 5. THE IMPACT OF DOS (DENIAL OF SERVICE) CYBERATTACKS ON A LOCAL AREA NETWORK (LAN) 5 a switch remembers the port a device is on, and based on the destination MAC address, the switch sends traffic to a port. This information is stored by the switch in the CAM (Content Addressable Memory) table, which is limited. Depending on the model, a switch may hold several thousand MAC addresses. In order to illustrate a CAM Overflow cyberattack, we will design a local network in which we have two switches (SW1 and SW2), a router and three computers (C1, C2 and C3). In our example, the hacker controls computer C2. Taking advantage of the fact that SW1 will learn the source MAC address on port Gi0/1, the hacker will send thousands of random source MACs per second from the C2 computing device, using Kali Linux. At that time, SW1 will retain all the source MACs received in the CAM table. If the CAM table fills up, SW1 will not retain any more MAC addresses. Note that the switch will not get blocked. When computer C1 wants to send information to computer C3, the switch will not know on which port to send that information, because other MAC addresses have appeared in the CAM table, so it will send traffic to all ports available to it (including computer C2 which is controlled by the attacker). For example, if the user at C1 is communicating with the user at computer C3 and there is an unencrypted connection between the two devices, when the switch sends the traffic to C2, the attacker can use the Wireshark tool in Kali Linux to listen for that traffic.
  • 6. INTELLIGENCE INFO 6 To avoid CAM Overflow attacks, it is recommended to use a set of port rules (Port Security). The solution is to limit the number of MAC addresses that can be learned on a port. If we observe that the C2 device sends a lot of MAC addresses in a short time, we set a limit. For example, on port Gi0/1 a maximum of two MAC addresses can be accessed simultaneously. If the C2 device sends more MAC addresses than the set limit, the Gi0/1 port will shut down. For example, a malicious person in an institution wants to disconnect computer C2 and connect a new switch (SW3) to the network and three laptops to its ports. In this case, Port Security ensures that if more than two MAC addresses are sent on Gi0/1, that port shuts down. Denial of Service (DoS) cyberattacks can also be launched using Metasploit, a complex tool in Kali Linux. By sending a very large number of packets in a very short time, cyber criminals can disrupt the operation of a server (e.g. mail server), router or computer equipment in the computer network of a firm, company or institution. The attacker can use the Metasploit tool to launch a TCP SYN Flood attack on a server in the network. The TCP SYN cyberattack can be carried out due to the exchange of messages at the beginning of the Transmission Control Protocol (TCP). When a client sends a request (SYN) to a server, announcing its intention to start a conversation, the server designates an entry in the table of half-open connections and sends back an acceptance message (SYN-ACK), announcing its readiness. The client must respond with an ACK packet in order to start the communication. An attacker might never send this acknowledgement, causing the connection table to fill up, further legitimate requests thus being blocked (Nicolăescu 2011, p.29). In short, the hacker initiates many TCP connections to a server without completing the normal message exchange. The users of computing devices (computer, laptop, smartphone, tablet, etc.) who do not use a firewall program and do not regularly update their anti-virus/anti-malware software, put their own computing equipment at risk of being infected with malware and integrated into a botnet, with which the hacker can launch DDoS (Distributed Denial of Services) attacks. Also, to prevent their computing devices from being infected with malware, users should fix security holes and software bugs in their operating systems by automatically or manually applying available updates. After infecting hundreds or thousands of IT&C devices, a hacker can launch a DDoS attack to disrupt an entire network. These attacks are not easy to counteract, as a botnet can contain computers/devices distributed in different parts of the world (Ferenț 2022, p.44). The use of a firewall is very important for a firm, institution or a company because, by filtering traffic and
  • 7. THE IMPACT OF DOS (DENIAL OF SERVICE) CYBERATTACKS ON A LOCAL AREA NETWORK (LAN) 7 checking whether a downloaded file is safe or malicious, it may prevent DoS attacks, and turning network computers into zombies. A computer/laptop that has not been compromised by a malware infection cannot be turned into a bot. If the firewall notices a very large number of packets coming from a particular source, it will defensively remove them all. However, if the hacker uses the spoofing technique, the firewall is put in difficulty, as it cannot differentiate secure (legitimate) packets from malicious ones, coming from the same sources (Budiu 2001). At the same time, smartphones and tablets can be used to send spam emails or launch DDoS attacks, as these devices connect into the so-called zombie networks (Goodman 2016, p.201). Bibliography Budiu, Mihai (2001). „Atacuri distribuite în Internet” [Shared attacks on the Internet], available at: https://www.cs.cmu.edu/~mihaib/articole/ddos/ddos-html.html. Ferenț, Darius-Antoniu (2022). Ghid de securitate cibernetică [Cybersecurity guide], Cluj-Napoca, Casa Cărții de Știință Publishing House. Goodman, Marc (2016). X-Cyber: viitorul începe azi [The future starts today], Bucharest, Rao Publishing House. Nicolăescu, Nicu-Sebastian (2011). Teză de doctorat: Contribuții privind monitorizarea securității rețelelor de calculatoare [PhD Thesis: Contributions on network security monitoring], Bucharest, The Technical Military Academy. Tanenbaum, Andrew, Wetherall, David (2011). Computer Networks, 5th edition, Pretince Hall Publishing House. Pătrașcu, Petrișor (2018). „Infrastructurile cibernetice specifice sectorului tehnologiei informației” [Cyber infrastructures specific to the IT sector], Buletinul Universității Naționale de Apărare Carol I [Bulletin of Carol I National Defense University], available at: https://revista.unap.ro/index.php//revista/article/view/428/418.