This document discusses DDoS attacks, including what they are, common types, motives and impacts, and ways to prevent and mitigate them. A DDoS attack aims to disrupt a website or online service by overwhelming it with traffic from multiple sources. There are three main types of DDoS attacks: volumetric attacks, protocol attacks, and application layer attacks. DDoS attacks can be launched for reasons like extortion, sabotage or protest. Prevention methods include firewalls, load balancers, intrusion detection systems and caching.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
59 views10 pages
DDoS Attack
This document discusses DDoS attacks, including what they are, common types, motives and impacts, and ways to prevent and mitigate them. A DDoS attack aims to disrupt a website or online service by overwhelming it with traffic from multiple sources. There are three main types of DDoS attacks: volumetric attacks, protocol attacks, and application layer attacks. DDoS attacks can be launched for reasons like extortion, sabotage or protest. Prevention methods include firewalls, load balancers, intrusion detection systems and caching.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10
DDoS Attack
Introduction
• DDoS Attack: A Threat for Computer Security
• What is a DDoS attack and why is it important to know about it? • What are the main types, motives, and impacts of DDoS attacks? • What are some common prevention and mitigation ways of DDoS attacks? What is a DDoS attack? • A DDoS attack is a type of cyberattack that aims to disrupt the normal functioning of a website or an online service by overwhelming it with a large amount of traffic from multiple sources. • A DoS attack can be launched by using a single computer, a network of compromised devices (botnet), or a DDoS attack tool. • A DDoS attack can target different layers of the target system: network, protocol, or application. Types of DDoS attacks
• These attacks use a large network of compromised
devices to launch a DDoS attack on a target system.
• Bontet, which is a network of infected devices that can
be controlled remotely by an attacker to launch DDoS attacks. A botnet is created when a malware infects a device and allows the attacker to access it. Motives and impacts of DDoS attacks • DDoS attacks can have various motives, such as extortion, sabotage, competition, or protest. • DDoS attacks can cause significant losses, damages, or disruptions to the victims, such as financial losses, reputational damages, or operational disruptions. • DDoS attacks can also be used as a diversion or a distraction for other malicious activities, such as data theft or network infiltration. Prevention and mitigation of DDoS attacks • DDoS attacks are a serious threat for computer security, as they can compromise the security, integrity, and reliability of the target system, and affect the performance and availability of the website or service.
Some common prevention and mitigation ways of DDoS
attacks are: 1. Firewalls 2. Load Balancer 3. Intrusion Detection and Prevention System (IDS/IPS)Caching 4. Anycast network diffusion Case Study • The first DDoS attack happened in 1996, using the Syn Flood technique to overload servers with unfinished requests.
• Example of a DDoS attack that happened
in Ethiopia is the one that targeted the Ethiopian Airlines website in 2020. the attack was launched by a group of hackers called Anonymous, • The attack caused the website to be inaccessible for several hours, affecting the online booking and ticketing services of the airline. Thank you