17. Denial of Service

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Flashcard 1
Q: What is a Denial-of-Service (DoS) attack

A: A DoS attack is an attempt to make a machine or network resource unavailable to its intended users by overwhelming it with excessive traffic or exploiting vulnerabilities.

2
New cards

Flashcard 2
Q: What are the primary security goals related to DoS attacks

A: The key goals include ensuring availability, maintaining network integrity, and protecting systems from being overwhelmed by malicious traffic.

3
New cards

Flashcard 3
Q: What is source address spoofing in the context of DoS attacks

A: It is a technique where attackers forge the source IP address in packets to hide their identity or redirect responses, complicating traceability and mitigation.

4
New cards

Flashcard 4
Q: What is the TCP handshake, and why is it important

A: The TCP handshake is a three-step process (SYN, SYN-ACK, ACK) used to establish a reliable connection between two devices; understanding it is crucial for grasping how SYN-based attacks work.

5
New cards

Flashcard 5
Q: What is SYN spoofing

A: SYN spoofing involves sending numerous TCP SYN packets with forged source addresses, creating many half-open connections that can exhaust server resources.

6
New cards

Flashcard 6
Q: How do SYN spoofing attacks affect a target system

A: They can significantly slow down or completely deny legitimate access by filling the connection queue with incomplete sessions, leading to resource exhaustion.

7
New cards

Flashcard 7
Q: What are flooding attacks

A: Flooding attacks overwhelm a target with a high volume of traffic—such as ICMP, UDP, or TCP requests—disrupting its ability to process legitimate traffic.

8
New cards

Flashcard 8
Q: What is an ICMP flooding attack

A: It is a DoS attack that bombards the target with ICMP (ping) packets, causing network congestion and overloading the system.

9
New cards

Flashcard 9
Q: What is a UDP flooding attack

A: This attack floods the target with UDP packets, forcing it to process or drop the excessive traffic, which can lead to service degradation or failure.

10
New cards

Flashcard 10
Q: What is a TCP SYN flooding attack

A: A TCP SYN flood involves sending a massive number of SYN requests to a target server, exhausting its resources by keeping numerous half-open connections active.

11
New cards

Flashcard 11
Q: What is the difference between single-source and multiple-source (DDoS) attacks

A: Single-source attacks originate from one system, whereas Distributed Denial-of-Service (DDoS) attacks use multiple compromised systems (botnets) to launch a coordinated assault, making mitigation more challenging.

12
New cards

Flashcard 12
Q: What are the key characteristics of flooding attacks

A: Flooding attacks are characterized by extremely high traffic volume, rapid resource exhaustion, and a lack of valid responses from the target.

13
New cards

Flashcard 13
Q: What distinguishes a Distributed Denial-of-Service (DDoS) attack from a DoS attack

A: A DDoS attack uses many sources (often via botnets) to flood the target, making it harder to block the attack because traffic comes from diverse, often geographically dispersed, origins.

14
New cards

Flashcard 14
Q: How do botnets facilitate DDoS attacks

A: Botnets are networks of compromised devices that attackers control remotely, using them collectively to send massive amounts of traffic toward a target.

15
New cards

Flashcard 15
Q: What is meant by the DDoS attack command structure

A: It refers to the hierarchical setup, typically involving a command and control (C&C) server, that coordinates the actions of a botnet during an attack.

16
New cards

Flashcard 16
Q: What are application-based bandwidth attacks

A: These attacks target the application layer by sending what appear to be legitimate requests, consuming server bandwidth and resources to deny service.

17
New cards

Flashcard 17
Q: What is a SIP flood attack

A: A SIP flood attack targets VoIP systems by overwhelming SIP servers with excessive signaling messages, disrupting voice communications.

18
New cards

Flashcard 18
Q: How does a SIP flood attack impact services

A: It can disrupt or disable voice services by overloading the SIP infrastructure, making it difficult for legitimate calls to be processed.

19
New cards

Flashcard 19
Q: What is an HTTP flood attack

A: An HTTP flood attack overwhelms a web server with numerous HTTP requests, potentially exhausting server resources and denying access to genuine users.

20
New cards

Flashcard 20
Q: What is a recursive HTTP flood

A: It is an attack where each HTTP request triggers additional requests, further amplifying the traffic and the attack’s impact on the target server.

21
New cards

Flashcard 21
Q: What is a Slowloris attack

A: A Slowloris attack holds many connections open by sending partial HTTP requests, thereby exhausting the server’s connection pool without flooding it with complete requests.

22
New cards

Flashcard 22
Q: What are the characteristics of a Slowloris attack

A: It maintains open connections with incomplete requests, slowly consuming server resources and making it unavailable for legitimate users.

23
New cards

Flashcard 23
Q: What are reflector attacks

A: Reflector attacks exploit third-party servers by sending requests with the victim’s IP address, causing the servers to send responses to the target, thus masking the attack’s origin.

24
New cards

Flashcard 24
Q: How do reflector attacks work

A: Attackers send requests to legitimate services using spoofed source addresses, resulting in those services unintentionally directing their responses toward the victim.

25
New cards

Flashcard 25
Q: What are the advantages of reflector attacks for attackers

A: They hide the attacker’s identity and can amplify the attack by leveraging the responses from multiple third-party servers.

26
New cards

Flashcard 26
Q: What is an amplification attack

A: An amplification attack exploits a protocol or service to generate a disproportionately large response from a small request, thereby increasing the attack traffic aimed at the target.

27
New cards

Flashcard 27
Q: How do DNS amplification attacks work

A: By sending small DNS queries with a spoofed source IP (the victim’s), attackers cause DNS servers to send large responses to the target, overwhelming its network.

28
New cards

Flashcard 28
Q: What are the consequences of DNS amplification attacks

A: They can flood a target with traffic, leading to severe network congestion and service disruption.

29
New cards

Flashcard 29
Q: What are NTP amplification attacks

A: Similar to DNS amplification, these attacks abuse vulnerabilities in Network Time Protocol servers to generate large responses that overwhelm the target system.

30
New cards

Flashcard 30
Q: What key characteristics define amplification attacks

A: They feature a high amplification factor, reliance on reflection, and the exploitation of UDP-based services that do not require a connection handshake.

31
New cards

Flashcard 31
Q: What are some common defenses against DoS attacks

A: Defenses include filtering spoofed packets, employing SYN cookies, implementing selective packet drops, using load balancing, and performing traffic analysis.

32
New cards

Flashcard 32
Q: How do SYN cookies defend against SYN flooding attacks

A: SYN cookies encode the connection state in the TCP sequence number and only allocate resources after a legitimate connection is confirmed, mitigating resource exhaustion.

33
New cards

Flashcard 33
Q: What is selective packet drop

A: It is a technique to reduce attack impact by identifying and dropping suspicious packets based on predefined criteria, such as abnormal source addresses or traffic patterns.

34
New cards

Flashcard 34
Q: How can reflection and amplification attacks be mitigated

A: They can be countered by filtering spoofed traffic, securing server configurations, implementing rate-limiting, and using protocols designed to resist abuse.

35
New cards

Flashcard 35
Q: What measures can organizations take to prevent their systems from being used in DoS attacks

A: Organizations should secure system configurations, patch vulnerabilities, and apply proper network segmentation to avoid being exploited as reflectors or amplifiers.

36
New cards

Flashcard 36
Q: How does load balancing help mitigate DoS attacks

A: Load balancing distributes incoming traffic across multiple servers, reducing the strain on any single system and enhancing overall resilience during an attack.

37
New cards

Flashcard 37
Q: How is a DoS attack typically identified

A: It is identified through traffic analysis and filtering, which detect abnormal patterns such as sudden surges in traffic or unusual packet types.

38
New cards

Flashcard 38
Q: What is the role of post-attack forensics and recovery

A: This process involves analyzing the attack to understand its vectors, learning from the incident, and implementing measures to prevent future occurrences while restoring services.

39
New cards

Flashcard 39
Q: What are the overall goals of a DoS attack

A: The primary goal is to disrupt service availability by exhausting system resources, thereby denying legitimate users access to network or application services