1 / 14

Ddos Attack PROGRESSION

A0953355 曾天財 指導教授:梁明章 教授. Ddos Attack PROGRESSION. Types of Attacks. Penetration Eavesdropping Man-in-the-Middle Flooding. Penetration. Attacker gets inside your machine Can take over machine and do whatever he wants

hollis
Download Presentation

Ddos Attack PROGRESSION

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A0953355 曾天財 指導教授:梁明章 教授 Ddos Attack PROGRESSION

  2. Types of Attacks • Penetration • Eavesdropping • Man-in-the-Middle • Flooding

  3. Penetration • Attacker gets inside your machine • Can take over machine and do whatever he wants • Achieves entry via software flaw(s), stolen passwords or insider access

  4. Eavesdropping • Attacker gains access to same network • Listens to traffic going in and out of your machine

  5. Man-in-the-Middle • Attacker listens to output and controls output • Can substitute messages in both directions

  6. Flooding Attack • Attacker sends an overwhelming number of messages at your machine; great congestion • Usually called a Denial of Service (DoS) attack, because that’s the effect • Usually involves a large number of machines, hence Distributed Denial of Service (DDoS) attack

  7. What is a DDoS attack? • “Distributed denial-of-service attack” • Attempt to make a computer resource unavailable, usually by flooding the target with internet traffic from many different sources

  8. DDoS Attacks • Some History • First DDoS attacks were mainly directed toward to disrupting IRC servers. • TimeLine • 1996 • SYN flood • Worked with minimum bandwidth

  9. DDoS Attacks • 1997 • Vulnerability in Microsoft Windows TCP/IP Stack • Tools were teardrop, boink, bonk • Smurf Attack • Bounce packets off misconfigured network • Lagging • Just sending a lot of packets

  10. DDoS Attacks • 1998 - 99 • Targa • Multiple attacks in one tool • Attackers would work together to bring down systems • Big increase in ability to attack computer systems this year.

  11. DDoS Attacks • 2000 • Many huge sites are taken down • Big losses in profit. • 2001 • DNS Attacks • Microsoft

  12. DDoS Attacks • 2002 • Root DNS servers are attacked • No serious damage because of the length of the attack. • 2003 - 2004 • Attacking smaller sites and even some extortion attempts. • Bot networks

  13. DDoS Attacks • Current • Hackers beginning to attack Linux/Unix machines • Many web servers are based on those operating systems • Web servers have a lot of bandwidth and having control of the server would mean a lot of attack power • Spam Screensavers • Attacks spammers

  14. 謝謝~~

More Related