SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Assignment: 
DDoS 
Lecturer: 
Ou 
Phannarith 
!កុមទី ៤ 
ជុនសុខជ' 
()ព វសន' 
-៉)ត ចិ2)' 
3ឿង សុភព' 
អង ស9:)ត'
ករវយលុកDDoSមន*+ើន-+បដូចជ3 
-­‐Internet 
Control 
Message 
Protocol 
(ICMP) 
flood 
-­‐(S)SYN 
flood 
-­‐Teardrop 
a:acks 
-­‐Peer-­‐to-­‐peer 
a:acks 
-­‐Asymmetry 
of 
resource 
uAlizaAon 
in 
starvaAon 
a:acks 
-­‐Permanent 
denial-­‐of-­‐service 
a:acks 
-­‐ApplicaAon-­‐level 
floods 
-­‐Nuke 
-­‐HTTP 
POST 
DDOS 
a:ack 
-­‐R-­‐U-­‐Dead-­‐Yet? 
(RUDY) 
-­‐Slow 
Read 
a:ack 
-­‐Distributed 
a:ack 
.........................................................
oeហoeយ,រ.យលុកែដលេបញនិយមបំផុត:;ះគឺ៖ 
denial-­‐of-­‐service 
(DoS) 
ឬក៏ 
distributed 
denial-­‐of-­‐service 
(DDoS) 
.B,រoeធDoeឱFUser 
មិនGច 
Iញយក 
network 
resource 
ឬមិនGចIក់ទងBមួយServerMនឬoeធDoeឱFNetworkNំងមិនGច 
ដំoeណoeរ,រMនែតមPង។
វ"្ើរ(Request) Resourceជ'(ើនដងក្-ង.(លកំណត់ណមួយក្-ង8លបំណង:្ើឱ(=Networkគំង 
ជប?@(ះអសន្(Unavailable) D(លបណ@(លឱ(=Userមិនអច 
ទញResourceពីserverឬNetworkបន។N
ករវយលុកQ(បDDosR(ះអចS(តិបត្ិករUយមនុស(V ពីនក់ ឬ'(ើនជងR(ះ ឬក៏Uយ 
Bots (កុំព(=Yទ័រ(V(ងD(ល](^វបនមនុស(Vមa(ក់b(ប់b(ង Computer Zombie)។
ភគ'(ើនe(f(ើDDosgើម(hីវយលុកWebsiteណមួយក្-ងបំណង:្ើឱ(=អជីវកម្k(ុមហ៊ុន 
ណមួយមនបno(។
a 
new 
generaAon 
of 
DDoS 
a:acks
ករករពរNetworkពីDos Attack& 
Cisco 
Protec>on 
in 
an 
ISP 
Environment. 
Traffic 
Des>ned 
for 
Targeted 
Device 
Is 
Diverted 
to 
Cisco 
Guard 
XTs; 
Clean 
Traffic 
Is 
Returned 
to 
the 
System.
Cisco 
Protec>on 
in 
an 
Enterprise 
Environment. 
Only 
Traffic 
Des>ned 
for 
the 
Targeted 
Device 
Is 
Diverted 
to 
the 
Cisco 
Guard 
XT, 
Which 
Returns 
"Clean" 
Transac>ons 
Back 
to 
the 
System.
Defense.Net 
DDoS 
Frontline 
h:p://www.defense.net/ddos-­‐protecAon-­‐service-­‐frontline.html
សូមអគុណ3

Mais conteúdo relacionado

Destaque

Critical thinking skills_part ii
Critical thinking skills_part iiCritical thinking skills_part ii
Critical thinking skills_part ii
Ratha Chan
 
កិច្ចការរដ្ឋបាល
កិច្ចការរដ្ឋបាលកិច្ចការរដ្ឋបាល
កិច្ចការរដ្ឋបាល
kongsochet
 
HRM lesson
HRM lessonHRM lesson
HRM lesson
Savoeng
 

Destaque (13)

Lesson 6 table
Lesson 6   tableLesson 6   table
Lesson 6 table
 
Presentation
PresentationPresentation
Presentation
 
សំណួរ ចម្លើយស្ដីពី Interpol
សំណួរ ចម្លើយស្ដីពី Interpolសំណួរ ចម្លើយស្ដីពី Interpol
សំណួរ ចម្លើយស្ដីពី Interpol
 
C++ OOP chapter 3
C++ OOP chapter 3C++ OOP chapter 3
C++ OOP chapter 3
 
Analysis Investment Project
Analysis Investment ProjectAnalysis Investment Project
Analysis Investment Project
 
Critical thinking skills_part ii
Critical thinking skills_part iiCritical thinking skills_part ii
Critical thinking skills_part ii
 
Peng Kungkea macroeconomic policies
Peng Kungkea macroeconomic policiesPeng Kungkea macroeconomic policies
Peng Kungkea macroeconomic policies
 
Pmbok 4th edition chapter 1 - Introduction to Project Management
Pmbok 4th edition   chapter 1 - Introduction to Project ManagementPmbok 4th edition   chapter 1 - Introduction to Project Management
Pmbok 4th edition chapter 1 - Introduction to Project Management
 
Studying on X-431 IV and OBD II
Studying on X-431 IV and OBD IIStudying on X-431 IV and OBD II
Studying on X-431 IV and OBD II
 
កិច្ចការរដ្ឋបាល
កិច្ចការរដ្ឋបាលកិច្ចការរដ្ឋបាល
កិច្ចការរដ្ឋបាល
 
HRM lesson
HRM lessonHRM lesson
HRM lesson
 
សារណា
សារណាសារណា
សារណា
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 

Semelhante a P12 r202t8 04-d-dos

Layer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacksLayer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacks
fangjiafu
 
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesCS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
Wei Tsang Ooi
 

Semelhante a P12 r202t8 04-d-dos (20)

Wuala, P2P Online Storage
Wuala, P2P Online StorageWuala, P2P Online Storage
Wuala, P2P Online Storage
 
Layer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacksLayer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacks
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDN
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
Low orbit ion cannon
Low orbit ion cannonLow orbit ion cannon
Low orbit ion cannon
 
Low orbit ion cannon
Low orbit ion cannonLow orbit ion cannon
Low orbit ion cannon
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атаки
 
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
 
Incident response: Advanced Network Forensics
Incident response: Advanced Network ForensicsIncident response: Advanced Network Forensics
Incident response: Advanced Network Forensics
 
Postgresql on NFS - J.Battiato, pgday2016
Postgresql on NFS - J.Battiato, pgday2016Postgresql on NFS - J.Battiato, pgday2016
Postgresql on NFS - J.Battiato, pgday2016
 
Application-engaged Dynamic Orchestration of Optical Network Resources
Application-engaged Dynamic Orchestration of Optical Network ResourcesApplication-engaged Dynamic Orchestration of Optical Network Resources
Application-engaged Dynamic Orchestration of Optical Network Resources
 
6 - OOP - LAN Example
6 - OOP - LAN Example6 - OOP - LAN Example
6 - OOP - LAN Example
 
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesCS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
 
Coscup2021 open source network os for datacenter
Coscup2021  open source network os for datacenterCoscup2021  open source network os for datacenter
Coscup2021 open source network os for datacenter
 
XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...
XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...
XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...
 
NAS Botnet Revealed - Mining Bitcoin
NAS Botnet Revealed - Mining Bitcoin NAS Botnet Revealed - Mining Bitcoin
NAS Botnet Revealed - Mining Bitcoin
 
NS2-tutorial.pdf
NS2-tutorial.pdfNS2-tutorial.pdf
NS2-tutorial.pdf
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDK
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
 

Mais de Phannarith Ou, G-CISO

Mais de Phannarith Ou, G-CISO (20)

3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Reconnaisance
Reconnaisance Reconnaisance
Reconnaisance
 
Case - How to protect your information
Case - How to protect your informationCase - How to protect your information
Case - How to protect your information
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
 
Internet Security Policy - Khmer
Internet Security Policy - Khmer Internet Security Policy - Khmer
Internet Security Policy - Khmer
 
How to Protect Computer From Virus
How to Protect Computer From VirusHow to Protect Computer From Virus
How to Protect Computer From Virus
 
How to Secure Your WiFi
How to Secure Your WiFiHow to Secure Your WiFi
How to Secure Your WiFi
 
Facebook Security in 3 Ways
Facebook Security in 3 Ways Facebook Security in 3 Ways
Facebook Security in 3 Ways
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Exchange Server 2003
Exchange Server 2003Exchange Server 2003
Exchange Server 2003
 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006
 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
 
Secure System Development Proposal
Secure System Development ProposalSecure System Development Proposal
Secure System Development Proposal
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
ូUnderstanding DNS Spoofing
ូUnderstanding DNS SpoofingូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
 
Understanding Malware by BBU Student
Understanding Malware by BBU StudentUnderstanding Malware by BBU Student
Understanding Malware by BBU Student
 
Heartbleed vulnerability
Heartbleed vulnerabilityHeartbleed vulnerability
Heartbleed vulnerability
 
P12 r202t8 05-spam
P12 r202t8 05-spamP12 r202t8 05-spam
P12 r202t8 05-spam
 

P12 r202t8 04-d-dos