Denial of Service Attack
Denial of Service Attack
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt
to make a computer resource unavailable to its intended users. Although the means to carry out,
motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a
person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily
or indefinitely.
UDP Flood
A UDP flood, by definition, is any DDoS attack that floods a target with User Datagram Protocol
(UDP) packets
The goal of the attack is to flood random ports on a remote host
This causes the host to repeatedly check for the application listening at that port, and (when no
application is found) reply with an ICMP ‘Destination Unreachable’ packet
This process saps host resources, which can ultimately lead to inaccessibility
Slowloris
Slowloris is a highly-targeted attack, enabling one web server to take down another server,
without affecting other services or ports on the target network
Slowloris does this by holding as many connections to the target web server open for as long as
possible
It accomplishes this by creating connections to the target server, but sending only a partial
request
Slowloris constantly sends more HTTP headers, but never completes a request. The targeted
server keeps each of these false connections open
This eventually overflows the maximum concurrent connection pool, and leads to denial of
additional connections from legitimate clients
NTP Amplification
In NTP amplification attacks, the perpetrator exploits publically-accessible Network Time
Protocol (NTP) servers to overwhelm a targeted server with UDP traffic
The attack is defined as an amplification assault because the query-to-response ratio in such
scenarios is anywhere between 1:20 and 1:200 or more
This means that any attacker that obtains a list of open NTP servers (e.g., by a using tool like
Metasploit or data from the Open NTP Project) can easily generate a devastating high-
bandwidth, high-volume DDoS attack.
HTTP Flood
In an HTTP flood DDoS attack, the attacker exploits seemingly-legitimate HTTP GET or POST
requests to attack a web server or application
HTTP floods do not use malformed packets, spoofing or reflection techniques, and require less
bandwidth than other attacks to bring down the targeted site or server
The attack is most effective when it forces the server or application to allocate the maximum
resources possible in response to every single request
SYN Flood attack
SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests
to a target's system. Normally runs like a three way handshake:
1. The client requests a connection by sending a SYN (synchronize) message to the server.
2. The server acknowledges this request by sending SYN-ACK back to the client.
3. The client responds with an ACK, and the connection is established.
When the attacking computer doesn’t reply to the SYN-ACK sent by the server it consumes resources
and
when this process is repeated a large number of times the server is rendered incapable of responding.