DDoS .

25
• DDoS https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and- online-course.html

Transcript of DDoS .

• DDoS

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Prolexic Technologies - DDoS mitigation

1 This attack mitigation approach is said to be lower-cost than the

traditional approach of a company maintaining its own network firewall, making DDoS attack prevention an

option for most firms doing business on the web.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Industrial espionage - Distributed denial of service (DDoS) attack

1 The distributed denial of service (DDoS) attack uses compromised computer systems to

orchestrate a flood of requests on the target system, causing it to shut down and deny

service to other users. It could potentially be used for economic or industrial espionage with

the purpose of sabotage. This method was allegedly utilized by Russian secret services,

over a period of two weeks on a Cyberwarfare|cyberattack on Estonia in May 2007, in response

to the removal of a Soviet era war memorial.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

CipSoft - 2013 DDoS Attacks

1 During August 2013, the company's main product suffered from a long period of DDoS

attacks, which led CipSoft to hire Prolexic for increased protection against DDoS

attacks. To compensate the players for the attacks, which made the game unplayable

for a long time, CipSoft distributed vouchers for premium time or double experience to

the players affected.http://www.tibia.com/news/?

subtopic=newsarchiveid=2519https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

DDoS

1 In computing, a 'denial-of-service (DoS)' or 'distributed denial-of-service (DDoS) attack' is an attempt to make a machine or network

resource unavailable to its intended User (computing)|users. Although the means to carry out, motives for, and targets of a DoS

attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt

or suspend Network service|services of a Host (network)|host connected to the

Internet.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

DDoS

1 As clarification, DDoS (Distributed Denial of Service) attacks are sent by

two or more persons, or bots. (See botnet) DoS (Denial of Service)

attacks are sent by one person or system.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

DDoS - Asymmetry of resource utilization in starvation attacks

1 ** controlling a large number of computers and directing them to

attack as a group. A DDoS attack is the primary example of this.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

DDoS - Distributed attack

1 A 'D'istributed 'D'enial 'o'f 'S'ervice 'A'ttack ('DDoS') occurs when

multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

DDoS - Distributed attack

1 Malware can carry DDoS attack mechanisms; one of the better-

known examples of this was MyDoom. Its DoS mechanism was

triggered on a specific date and time. This type of DDoS involved

hardcoding the target IP address prior to release of the malware and

no further interaction was necessary to launch the attack.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

DDoS - Distributed attack

1 In some cases a machine may become part of a DDoS attack with

the owner's consent, for example, in Operation Payback, organized by the

group Anonymous (group)|Anonymous.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

DDoS - Distributed attack

1 More sophisticated attackers use DDoS tools for the purposes of

extortioneven against their business rivals.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

DDoS - Distributed attack

1 If an attacker mounts an attack from a single host it would be classified as

a DoS attack. In fact, any attack against availability would be classed as a Denial of Service attack. On the other hand, if an attacker uses many

systems to simultaneously launch attacks against a remote host, this

would be classified as a DDoS attack.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

DDoS - Reflected / Spoofed attack

1 ICMP Echo Request attacks (Smurf Attack) can be considered one form of reflected attack, as the flooding host(s) send Echo Requests to the

broadcast addresses of mis-configured networks, thereby

enticing hosts to send Echo Reply packets to the victim. Some early DDoS programs implemented a distributed form of this attack.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

DDoS - Switches

1 Wan-link failover will work as long as both links have DoS/DDoS prevention mechanism.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

DDoS - Clean pipes

1 All traffic is passed through a cleaning center or a scrubbing center via various methods

such as proxies, tunnels or even direct circuits, which separates bad traffic (DDoS

and also other common internet attacks) and only sends good traffic beyond to the server. The provider needs central connectivity to the Internet to manage this kind of service unless they happen to be located within the

same facility as the cleaning center or scrubbing center.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

The Spamhaus Project - CyberBunker dispute and DDoS attack

1 Spamhaus also hired Cloudflare, a DDoS mitigation company, to assist them by distributing their internet

services across Cloudflare's worldwide network, after which the

focus of the attack was redirected to the companies that provide

Cloudflare's network connections.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

The Spamhaus Project - CyberBunker dispute and DDoS attack

1 According to The New York Times Kamphuis also claimed to be the

spokesman of the attackers, and said in a message We are aware that this is one of the largest DDoS attacks

the world had publicly seen, and that CyberBunker was retaliating against Spamhaus for abusing their influence

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

The Spamhaus Project - CyberBunker dispute and DDoS attack

1 The British National Cyber Crime Unit revealed that a London schoolboy

had been secretly arrested as part of a suspected organised crime gang responsible for the DDoS attacks

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Direct Connect (file sharing) - Direct Connect used for DDoS attacks

1 As the protocol allows hubs to redirect users to other hubs,

malicious hubs have redirected users to places other than real Direct

Connect hubs, effectively causing a DDoS|Distributed Denial of Service attack. The hubs may alter the IP

Address|IP in client to client connections, pointing to a potential

victim. https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Direct Connect (file sharing) - Direct Connect used for DDoS attacks

1 The CTM Exploit surfaced in 2006–2007, during which period the whole Direct Connect network suffered from

DDoS attacks. The situation prompted developers to take security

issues more seriously.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Electricité de France - DDoS attack on EDF site

1 EDF's website was brought down by Denial-of-service attack|DDoS

attacks three times in 2011, twice in April and once later in June.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Gwyneddosaurus

1 'Gwyneddosaurus' is an extinct genus of aquatic Tanystropheus|tanystropheid reptile

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Gwyneddosaurus

1 They noted that this would make Gwyneddosaurus a synonym

(taxonomy)|senior synonym of Tanytrachelos, and recommended conserved name|conserving the younger but better-represented

genus.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Association for Progressive Communications - 2013 DDoS Attack

1 [1] The attack was later described as a DNS reflection attack also known as a Denial of service attack#Reflected .2F Spoofed attack|spoofed

attack http://yro.slashdot.org/story/13/08/07/0315207/zimbabweans-hit-by-cyber-attacks-during-election Several sources linked the attack to the

Zimbabwean general election, 2013|Zimbabwe Elections, held a day earlier.http://www.theinquirer.net/inquirer/news/2287433/zimbabwe-election-hit-by-hacking-and-ddos-attackshttp://news.softpedia.com/

news/Zimbabwe-s-Presidential-Election-Accompanied-by-Cyberattacks-373758.shtmlhttp://www.techweekeurope.co.uk/news/zimbabwe-election-

cyber-attacks-123938 GreenNet's services were not fully operational again until 10.30 BST on Thursday 7

August.http://mailman.greennet.org.uk/pipermail/greennet-l/2013-August/000121.html On the 9th of August there was a second attack,

which, while affecting some systems, allowed GreenNet to discover the site which was being

targeted.http://mailman.greennet.org.uk/pipermail/greennet-l/2013-August/000122.html In October 2013, the target was revealed to be the

site of British investigative reporter Andrew Jennings.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html