Lecture 11: Denial of Service Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Denial of Service (DoS) is

an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting CPU resources, memory, bandwidth, and disk space

2
New cards

Attacks

overload or invalid request services that consume significant resources

3
New cards

Internet Control Message Protocol (ICMP)

one of the main IP protocols used by network devices like routers to send error messages indicating requested service is not available

4
New cards

flood ping command attack

classic DoS attack that aims to overwhelm the capacity of the network connection to the target organization. Packets are discarded as capacity decreases

5
New cards

source address spoofing

makes it harder to detect attacking systems

6
New cards

backscatter traffic

scatters the ip addresses across the internet so inspecting packet’s header is not sufficient to identify its source

7
New cards

syn spoofing

another common dos attack which attacks the ability of a server to respond to future TCP connection requests by overflowing the tables used to manage them. Legitimate users are denied access to the server. This attacks system resources focusing on network handling code in the OS

8
New cards

tcp connection handshake

send client syn, receive syn client seq, send syn-ack of server seq, and receive syn ack on client and then send ack back to server

9
New cards

SYN spoofing attack uses

addresses that will not respond to the SYN-ACK with a RST

10
New cards

Types of flooding attacks

ICMP Flood, UDP flood, and TCP SYN flood

11
New cards

DDoS control hierarchy

Attacker sends a single command to the handler zombies; each handler automatically forwards it to all the agents under its control

12
New cards

Application-based bandwidth attacks

Force the victim system to execute resourceconsuming operations

13
New cards

VoIP Session Initiation Protocol (SIP) flood

attacker sends many INVITE requests; major burden on the proxies

14
New cards

HTTP-based attacks

Attempts to monopolize a Web server by sending HTTP requests that never complete

15
New cards

Spidering

Bots starting from a given HTTP link and following all links on the provided Web site in a recursive way

16
New cards

Reflection attacks

Attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system. Goal is to generate enough volumes of packets to flood the link to the target system without alerting the intermediary

17
New cards

Reflection attacks variation

Further variation creates a self-contained loop between intermediary and target • Usually, UDP echo service is used for this – Attacker sends a large UDP packet to the echo service on the intermediary using a spoofed source address for the echo service on the target system

18
New cards

DNS reflection attacks

Use packets directed at a legitimate DNS server as the intermediary system. Attacker creates a series of DNS requests containing the spoofed source address of the target system. Exploit DNS behavior to convert a small request to a much larger response (amplification) • Target is flooded with responses

19
New cards

Four lines of defense against DDoS attacks

Attack prevention and preemption (before attack) • Attack detection and filtering (during the attack) • Attack source traceback and identification (during and after the attack) • Attack reaction (after the attack)

20
New cards

You notice attack traffic coming from legitimate DNS servers directed at your network. What type of attack is this most likely?

DNS Reflection attack, which uses legitimate DNS servers as intermediaries to amplify attack traffic.

21
New cards

You notice your database server CPU is maxed out processing seemingly legitimate but complex queries. What type of attack is this?

Application-based attack

22
New cards

What's the key difference in target between UDP Flood and TCP SYN Flood attacks?

UDP Flood targets network bandwidth by sending packets to random ports, while TCP SYN Flood targets server TCP resources by exhausting connection tables.

23
New cards

How does a DNS Reflection attack achieve amplification?

It sends small DNS requests with spoofed source addresses, causing DNS servers to send larger responses to the victim, multiplying the attack traffic.

24
New cards

Which attack type is most likely to evade basic IP blocking defenses and why?

DDoS attacks, because they come from multiple legitimate-looking sources

25
New cards

Why are Reflection Attacks particularly dangerous compared to direct flooding attacks?

  • Hide the attacker's identity by using legitimate servers

  • Amplify the attack (small requests generate larger responses)

  • Are harder to block since traffic comes from legitimate services

26
New cards

Traffic analysis shows ping requests from thousands of different IP addresses. What type of attack is this?

Distributed ICMP Flood (DDoS)

27
New cards

Why can UDP Flood attacks work even when targeting non-existent services?

Because the goal is to consume bandwidth - whether the service exists or not, the network still has to handle the incoming packets.

28
New cards

If you're seeing attack traffic from thousands of different sources simultaneously, what type of attack is this?

This is a DDoS (Distributed Denial of Service) attack, which uses multiple compromised systems (botnet) to generate attack traffic.