Denial of service (DOS) attack,
 a type of attack on a network that is designed to bring the network to 
its knees by flooding it with useless traffic. Many DoS attacks, such as
 the Ping of Death and Teardrop attacks, exploit limitations in the 
TCP/IP protocols.
Types:
Teardrop attack is type of attack where fragmented packets are forged to overlap each other when the receiving host tries to reassemble them.
Ping of death type of 
DoS attack in which the attacker sends a ping request that is larger 
than 65,536 bytes, which is the maximum size that IP allows. While a 
ping larger than 65,536 bytes is too large to fit in one packet that can
 be transmitted, TCP/IP allows a packet to be fragmented, essentially 
splitting the packet into smaller segments that are eventually 
reassembled. Attacks took advantage of this flaw by fragmenting packets 
that when received would total more than the allowed number of bytes and
 would effectively cause a buffer overload on the operating system at 
the receiving end, crashing the system. Ping of death attacks are rare 
today as most operating systems have been fixed to prevent this type of 
attack from occurring.
DDOS Attack: A 
distributed denial of service attack (DDoS) occurs when multiple systems
 flood the bandwidth or resources of a targeted system, usually one or 
more web servers. This is the result of multiple compromised systems 
(for example a botnet) flooding the targeted system(s) with traffic. 
When a server is overloaded with connections, new connections can no 
longer be accepted.
Peer to Peer Attack 
Attackers have found a way to exploit a number of bugs in peer-to-peer 
servers to initiate DDoS attacks. Peer-to-peer attacks are different 
from regular botnet-based attacks. With peer-to-peer there is no botnet 
and the attacker does not have to communicate with the clients it 
subverts. Instead, the attacker acts as a “puppet master,” instructing 
clients of large peer-to-peer file sharing hubs to disconnect from their
 peer-to-peer network and to connect to the victim’s website instead. As
 a result, several thousand computers may aggressively try to connect to
 a target website. While peer-to-peer attacks are easy to identify with 
signatures, the large number of IP addresses that need to be blocked 
(often over 250,000 during the course of a large-scale attack) means 
that this type of attack can overwhelm mitigation defences.
For all known DOS attacks, there are 
software fixes that system administrators can install to limit the 
damage caused by the attacks.
 
 
No comments:
Post a Comment