170 likes | 324 Views
A0953355 曾天財 指導教授:梁明章 教授. Ddos Attack PROGRESSION. Types of Attacks. Penetration Eavesdropping Man-in-the-Middle Flooding. Penetration. Attacker gets inside your machine Can take over machine and do whatever he wants
E N D
A0953355 曾天財 指導教授:梁明章 教授 Ddos Attack PROGRESSION
Types of Attacks • Penetration • Eavesdropping • Man-in-the-Middle • Flooding
Penetration • Attacker gets inside your machine • Can take over machine and do whatever he wants • Achieves entry via software flaw(s), stolen passwords or insider access
Eavesdropping • Attacker gains access to same network • Listens to traffic going in and out of your machine
Man-in-the-Middle • Attacker listens to output and controls output • Can substitute messages in both directions
Flooding Attack • Attacker sends an overwhelming number of messages at your machine; great congestion • Usually called a Denial of Service (DoS) attack, because that’s the effect • Usually involves a large number of machines, hence Distributed Denial of Service (DDoS) attack
What is a DDoS attack? • “Distributed denial-of-service attack” • Attempt to make a computer resource unavailable, usually by flooding the target with internet traffic from many different sources
DDoS Attacks • Some History • First DDoS attacks were mainly directed toward to disrupting IRC servers. • TimeLine • 1996 • SYN flood • Worked with minimum bandwidth
DDoS Attacks • 1997 • Vulnerability in Microsoft Windows TCP/IP Stack • Tools were teardrop, boink, bonk • Smurf Attack • Bounce packets off misconfigured network • Lagging • Just sending a lot of packets
DDoS Attacks • 1998 - 99 • Targa • Multiple attacks in one tool • Attackers would work together to bring down systems • Big increase in ability to attack computer systems this year.
DDoS Attacks • 2000 • Many huge sites are taken down • Big losses in profit. • 2001 • DNS Attacks • Microsoft
DDoS Attacks • 2002 • Root DNS servers are attacked • No serious damage because of the length of the attack. • 2003 - 2004 • Attacking smaller sites and even some extortion attempts. • Bot networks
DDoS Attacks • Current • Hackers beginning to attack Linux/Unix machines • Many web servers are based on those operating systems • Web servers have a lot of bandwidth and having control of the server would mean a lot of attack power • Spam Screensavers • Attacks spammers