Lecture 11: Denial of Service Attacks

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 27

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

28 Terms

1

Denial of Service (DoS) is

an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting CPU resources, memory, bandwidth, and disk space

New cards
2

Attacks

overload or invalid request services that consume significant resources

New cards
3

Internet Control Message Protocol (ICMP)

one of the main IP protocols used by network devices like routers to send error messages indicating requested service is not available

New cards
4

flood ping command attack

classic DoS attack that aims to overwhelm the capacity of the network connection to the target organization. Packets are discarded as capacity decreases

New cards
5

source address spoofing

makes it harder to detect attacking systems

New cards
6

backscatter traffic

scatters the ip addresses across the internet so inspecting packet’s header is not sufficient to identify its source

New cards
7

syn spoofing

another common dos attack which attacks the ability of a server to respond to future TCP connection requests by overflowing the tables used to manage them. Legitimate users are denied access to the server. This attacks system resources focusing on network handling code in the OS

New cards
8

tcp connection handshake

send client syn, receive syn client seq, send syn-ack of server seq, and receive syn ack on client and then send ack back to server

New cards
9

SYN spoofing attack uses

addresses that will not respond to the SYN-ACK with a RST

New cards
10

Types of flooding attacks

ICMP Flood, UDP flood, and TCP SYN flood

New cards
11

DDoS control hierarchy

Attacker sends a single command to the handler zombies; each handler automatically forwards it to all the agents under its control

New cards
12

Application-based bandwidth attacks

Force the victim system to execute resourceconsuming operations

New cards
13

VoIP Session Initiation Protocol (SIP) flood

attacker sends many INVITE requests; major burden on the proxies

New cards
14

HTTP-based attacks

Attempts to monopolize a Web server by sending HTTP requests that never complete

New cards
15

Spidering

Bots starting from a given HTTP link and following all links on the provided Web site in a recursive way

New cards
16

Reflection attacks

Attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system. Goal is to generate enough volumes of packets to flood the link to the target system without alerting the intermediary

New cards
17

Reflection attacks variation

Further variation creates a self-contained loop between intermediary and target • Usually, UDP echo service is used for this – Attacker sends a large UDP packet to the echo service on the intermediary using a spoofed source address for the echo service on the target system

New cards
18

DNS reflection attacks

Use packets directed at a legitimate DNS server as the intermediary system. Attacker creates a series of DNS requests containing the spoofed source address of the target system. Exploit DNS behavior to convert a small request to a much larger response (amplification) • Target is flooded with responses

New cards
19

Four lines of defense against DDoS attacks

Attack prevention and preemption (before attack) • Attack detection and filtering (during the attack) • Attack source traceback and identification (during and after the attack) • Attack reaction (after the attack)

New cards
20

You notice attack traffic coming from legitimate DNS servers directed at your network. What type of attack is this most likely?

DNS Reflection attack, which uses legitimate DNS servers as intermediaries to amplify attack traffic.

New cards
21

You notice your database server CPU is maxed out processing seemingly legitimate but complex queries. What type of attack is this?

Application-based attack

New cards
22

What's the key difference in target between UDP Flood and TCP SYN Flood attacks?

UDP Flood targets network bandwidth by sending packets to random ports, while TCP SYN Flood targets server TCP resources by exhausting connection tables.

New cards
23

How does a DNS Reflection attack achieve amplification?

It sends small DNS requests with spoofed source addresses, causing DNS servers to send larger responses to the victim, multiplying the attack traffic.

New cards
24

Which attack type is most likely to evade basic IP blocking defenses and why?

DDoS attacks, because they come from multiple legitimate-looking sources

New cards
25

Why are Reflection Attacks particularly dangerous compared to direct flooding attacks?

  • Hide the attacker's identity by using legitimate servers

  • Amplify the attack (small requests generate larger responses)

  • Are harder to block since traffic comes from legitimate services

New cards
26

Traffic analysis shows ping requests from thousands of different IP addresses. What type of attack is this?

Distributed ICMP Flood (DDoS)

New cards
27

Why can UDP Flood attacks work even when targeting non-existent services?

Because the goal is to consume bandwidth - whether the service exists or not, the network still has to handle the incoming packets.

New cards
28

If you're seeing attack traffic from thousands of different sources simultaneously, what type of attack is this?

This is a DDoS (Distributed Denial of Service) attack, which uses multiple compromised systems (botnet) to generate attack traffic.

New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot