Chapter 4 Denial of Service Attacks

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

Flashcards covering the goals, types, attacks, defenses, tools, and real-world examples of denial of service (DoS) and distributed denial of service (DDoS) attacks.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

What is the primary goal of a denial of service (DoS) attack?

To prevent legitimate users from accessing the target by overwhelming it with requests or data.

2
New cards

How does a DDoS attack differ from a traditional DoS attack?

A DDoS uses multiple compromised machines (a botnet) to flood the target, whereas a DoS typically comes from a single machine.

3
New cards

What is a TCP SYN flood attack?

An attack that exploits the TCP three-way handshake to exhaust server resources by sending many SYN requests, often with spoofed sources.

4
New cards

What are SYN cookies and what do they do?

A defense that delays memory allocation for incomplete handshakes by encoding state in the SYN-ACK cookie, allocating memory only after the final ACK.

5
New cards

What is a micro block in DoS defense?

Allocates a tiny 16-byte record for each SYN, reducing the ability to flood resources, though it mitigates rather than prevents the attack.

6
New cards

What is an RST cookie?

A defense where the server's handling of an incorrect SYN-ACK leads the client to send an RST, helping verify legitimate requests.

7
New cards

What is a Smurf attack?

An ICMP echo request sent to a network broadcast address with a spoofed source IP, causing many hosts to reply to the victim and flood it.

8
New cards

What is a Fraggle attack?

A Smurf-like attack using UDP echo or chargen to a broadcast address to flood the target, with spoofed source IP.

9
New cards

What is DHCP starvation?

Flooding the DHCP server with requests to exhaust its pool of IP addresses and deny new leases.

10
New cards

What is PDoS (phlashing)?

Permanent damage to a device’s firmware or hardware, often requiring reinstall or replacement.

11
New cards

What is a Teardrop attack?

Sending fragmented packets that overlap in a way that prevents proper reassembly, causing the target to crash.

12
New cards

What is a Land attack?

A forged packet with the same source and destination IP, causing confusion and potential crash or reboot.

13
New cards

What is a Challenge Collapsar (CC) attack?

Frequent HTTP requests that require time-consuming database operations, exhausting server resources.

14
New cards

What is a CLDAP reflection attack?

A UDP-based reflection attack that overwhelms the target by sending CLDAP requests that elicit large responses.

15
New cards

What is a memcached amplification attack?

Exploiting memcached to amplify traffic volume, enabling large-scale DDoS attacks.

16
New cards

What is a Yo-Yo attack?

Flooding a cloud-hosted application to trigger autoscaling, then stopping to cause cost increases and repeated scaling.

17
New cards

What is a degradation of service (EDoS) attack?

Short-lived bursts of traffic that slow responses rather than crash the system, degrading service over time.

18
New cards

What is a real-world CC (Challenge Collapsar) attack example?

Frequent HTTP requests that force time-consuming database operations to exhaust server resources.

19
New cards

What is an HTTP POST DoS attack?

Sending HTTP POST requests with extremely slow body transmission, tying up server resources; often used in parallel with others.

20
New cards

What are blackholing and sinkholing in DoS defense?

Blackholing drops malicious traffic by routing it to a nonexistent destination; sinkholing analyzes and drops bad traffic.

21
New cards

Name some common DoS tools mentioned in the chapter.

LOIC, HOIC, XOIC, TFN, TFN2K, Stacheldraht—tools with varying capabilities to launch or coordinate DoS/DDoS attacks.

22
New cards

What is the Ping of Death (PoD)?

Sending a ping with an oversized packet to crash vulnerable systems that cannot handle large TCP/IP packets.

23
New cards

What are key firewall-based defenses against DoS attacks?

Block or heavily restrict ICMP from outside, upstream filtering/scrubbing centers, SPI/NGFW protections, patching, and using proxies.

24
New cards

What was a notable real-world DoS attack against GitHub in 2018?

A massive UDP amplification attack peaking at about 1.3 Tbps against GitHub.

25
New cards

What was a notable DoS incident involving the Boston Globe in 2017?

A large-scale DDoS attack that interrupted bostonglobe.com; mitigated by the ISP using anti-DDoS measures.

26
New cards

What is a UDP flood attack?

Overwhelming a target's ports with User Datagram Protocol packets, causing it to expend resources responding to spoofed requests or queries, leading to service disruption or slowdown.

27
New cards

What is an ICMP flood attack?

Flooding a target with a high volume of ICMP (Internet Control Message Protocol) echo request (ping) packets, overwhelming the network bandwidth or system resources, and preventing legitimate traffic.