distributed denial of service attacks dennis galinsky, brandon mikelaitis, michael stanley brandon...
TRANSCRIPT
![Page 1: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/1.jpg)
TEAM DNSDistributed Denial of Service Attacks
Dennis Galinsky, Brandon Mikelaitis, Michael Stanley
Brandon Williams, Ryan Williams
![Page 2: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/2.jpg)
Agenda
Types of Attack
Source of Attacks
Prevention
History of Attacks
Business Aspect
![Page 3: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/3.jpg)
TCP Connection Attack (SYN FLOOD)
Normal Connection SYN Flood
![Page 4: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/4.jpg)
HTTP Get Flood HTTP Post Flood
Application Layer Attack
![Page 5: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/5.jpg)
Source of Attack Botnets
What are they?How are they Created?Notable Botnet Army’s
○ Storm○ Rbot
For-HireHow much does it cost?Rent an ArmyThreat Level?
![Page 6: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/6.jpg)
Prevention
Detect the threat Mitigate the threat
Distinguish good traffic from bad trafficBlock bad traffic while still allowing good
traffic through. Protect all points of vulnerability.
![Page 7: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/7.jpg)
Prevention Methods
Blackholing Overprovision Routers Firewalls Intrusion Detection Systems (IDS) Third Party Protection
![Page 8: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/8.jpg)
Blackholing
Blocking all traffic the network as far upstream as possible.
Traffic is diverted to a “black hole” where it is discarded.
Good and bad packets are discarded.Not an efficient solution to a DDoS attack.Attacker’s objective is still fulfilled.
![Page 9: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/9.jpg)
Firewalls
Not purpose-built for DDoS attacks, but provide some protection.
Reside too far downstream in the network.
Lack of anomaly detection, can’t recognize when valid protocols are being used in an attack.
Cannot perform antispoofing on a packet by packet basis.
![Page 10: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/10.jpg)
Third Party Protection
DNS based redirect service. Border Gateway Protocol (BGP) based
service. Content Delivery Network (CDN)
providers.
![Page 11: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/11.jpg)
History of Attacks
Anonymous Hacktivist Group (Civil Disobedience)
Lizard Squad PlayStation 4 Network, Xbox Live, Facebook
GitHub Attack Chinese Government, Replaced JS Code to Force reload pages
Happening Now Digital Attack Map
![Page 12: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/12.jpg)
![Page 13: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/13.jpg)
Business AspectCosts for Businesses
![Page 14: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/14.jpg)
![Page 15: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/15.jpg)
DDoS Attacks Lead to: Software & Hardware Replacements Reduction in Revenue Loss of Consumer Trust Customer Data Theft
![Page 16: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/16.jpg)
Questions?
Types of Attack
Source of Attacks
Prevention
History of Attacks
Business Aspect
Demonstration
![Page 17: Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams](https://reader036.vdocument.in/reader036/viewer/2022070407/56649e235503460f94b11373/html5/thumbnails/17.jpg)
References https://www.youtube.com/watch?v=BzgsT-_GC4Q https://www.youtube.com/watch?v=sUrM7_G_y7A http://searchsecurity.techtarget.com/definition/SYN-flooding http://us.norton.com/botnet/ http://www.webroot.com/blog/2012/06/06/ddos-for-hire-services-
offering-to-take-down-your-competitors-web-sites-going-mainstream/
https://www.blacklotus.net/learn/about-ddos-attacks/ http://www.slate.com/articles/technology/technology/2010/12/
in_defense_of_ddos.html http://www.cbronline.com/news/cybersecurity/cost-of-ddos-attack
s-tops-half-a-billion-dollars-4498766
http://databreachinsurancequote.com/cyber-insurance/cyber-insurance-can-serve-as-an-ideal-ddos-attack-response-plan/
http://www.kaspersky.com/about/news/business/2015/A-single-DDoS-attack-can-cost-a-company-more-than-400000-dollar