Transcript Document

• DDoS
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Prolexic Technologies - DDoS mitigation
This attack mitigation approach is
said to be lower-cost than the
traditional approach of a company
maintaining its own network firewall,
making DDoS attack prevention an
option for most firms doing business
on the web.
1
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Industrial espionage - Distributed denial of service (DDoS) attack
The distributed denial of service (DDoS)
attack uses compromised computer systems
to orchestrate a flood of requests on the
target system, causing it to shut down and
deny service to other users. It could
potentially be used for economic or industrial
espionage with the purpose of sabotage. This
method was allegedly utilized by Russian
secret services, over a period of two weeks
on a Cyberwarfare|cyberattack on Estonia in
May 2007, in response to the removal of a
Soviet era war memorial.
1
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
CipSoft - 2013 DDoS Attacks
During August 2013, the company's main
product suffered from a long period of DDoS
attacks, which led CipSoft to hire Prolexic for
increased protection against DDoS attacks.
To compensate the players for the attacks,
which made the game unplayable for a long
time, CipSoft distributed vouchers for
premium time or double experience to the
players
affected.http://www.tibia.com/news/?subtopic
=newsarchiveid=2519
1
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
DDoS
1
In computing, a 'denial-of-service (DoS)'
or 'distributed denial-of-service (DDoS)
attack' is an attempt to make a machine
or network resource unavailable to its
intended User (computing)|users.
Although the means to carry out,
motives for, and targets of a DoS attack
may vary, it generally consists of efforts
to temporarily or indefinitely interrupt
or suspend Network service|services of
a Host (network)|host connected to the
Internet.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
DDoS
1
As clarification, DDoS (Distributed Denial
of Service) attacks are sent by two or
more persons, or bots. (See botnet) DoS
(Denial of Service) attacks are sent by one
person or system.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
DDoS - Asymmetry of resource utilization in starvation attacks
** controlling a large number of
computers and directing them to
attack as a group. A DDoS attack is the
primary example of this.
1
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
DDoS - Distributed attack
1
A 'D'istributed 'D'enial 'o'f 'S'ervice
'A'ttack ('DDoS') occurs when multiple
systems flood the bandwidth or
resources of a targeted system,
usually one or more web servers
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
DDoS - Distributed attack
Malware can carry DDoS attack
mechanisms; one of the better-known
examples of this was MyDoom. Its
DoS mechanism was triggered on a
specific date and time. This type of
DDoS involved hardcoding the target
IP address prior to release of the
malware and no further interaction
was necessary to launch the attack.
1
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
DDoS - Distributed attack
1
In some cases a machine may become
part of a DDoS attack with the owner's
consent, for example, in Operation
Payback, organized by the group
Anonymous (group)|Anonymous.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
DDoS - Distributed attack
1
More sophisticated attackers use DDoS
tools for the purposes of extortioneven
against their business rivals.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
DDoS - Distributed attack
1
If an attacker mounts an attack from a
single host it would be classified as a
DoS attack. In fact, any attack against
availability would be classed as a
Denial of Service attack. On the other
hand, if an attacker uses many systems
to simultaneously launch attacks
against a remote host, this would be
classified as a DDoS attack.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
DDoS - Reflected / Spoofed attack
ICMP Echo Request attacks (Smurf
Attack) can be considered one form of
reflected attack, as the flooding
host(s) send Echo Requests to the
broadcast addresses of misconfigured networks, thereby enticing
hosts to send Echo Reply packets to
the victim. Some early DDoS
programs implemented a distributed
form of this attack.
1
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
DDoS - Switches
1
Wan-link failover will work as long as both
links have DoS/DDoS prevention mechanism.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
DDoS - Clean pipes
1
All traffic is passed through a cleaning center
or a scrubbing center via various methods
such as proxies, tunnels or even direct
circuits, which separates bad traffic (DDoS
and also other common internet attacks) and
only sends good traffic beyond to the server.
The provider needs central connectivity to the
Internet to manage this kind of service unless
they happen to be located within the same
facility as the cleaning center or scrubbing
center.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
The Spamhaus Project - CyberBunker dispute and DDoS attack
1
Spamhaus also hired Cloudflare, a DDoS
mitigation company, to assist them by
distributing their internet services across
Cloudflare's worldwide network, after
which the focus of the attack was
redirected to the companies that provide
Cloudflare's network connections.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
The Spamhaus Project - CyberBunker dispute and DDoS attack
According to The New York Times
Kamphuis also claimed to be the
spokesman of the attackers, and said in a
message We are aware that this is one of
the largest DDoS attacks the world had
publicly seen, and that CyberBunker was
retaliating against Spamhaus for abusing
their influence
1
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
The Spamhaus Project - CyberBunker dispute and DDoS attack
1
The British National Cyber Crime Unit
revealed that a London schoolboy had
been secretly arrested as part of a
suspected organised crime gang
responsible for the DDoS attacks
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Direct Connect (file sharing) - Direct Connect used for DDoS attacks
1
As the protocol allows hubs to redirect
users to other hubs, malicious hubs
have redirected users to places other
than real Direct Connect hubs,
effectively causing a DDoS|Distributed
Denial of Service attack. The hubs may
alter the IP Address|IP in client to client
connections, pointing to a potential
victim.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Direct Connect (file sharing) - Direct Connect used for DDoS attacks
1
The CTM Exploit surfaced in 2006–2007,
during which period the whole Direct
Connect network suffered from DDoS
attacks. The situation prompted
developers to take security issues more
seriously.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Electricité de France - DDoS attack on EDF site
EDF's website was brought down by
Denial-of-service attack|DDoS attacks
three times in 2011, twice in April and once
later in June.
1
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Gwyneddosaurus
'Gwyneddosaurus' is an extinct genus of
aquatic Tanystropheus|tanystropheid reptile
1
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Gwyneddosaurus
They noted that this would make
Gwyneddosaurus a synonym
(taxonomy)|senior synonym of
Tanytrachelos, and recommended
conserved name|conserving the
younger but better-represented genus.
1
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Association for Progressive Communications - 2013 DDoS Attack
1
[1] The attack was later described as a DNS reflection attack also known as
a Denial of service attack#Reflected .2F Spoofed attack|spoofed attack
http://yro.slashdot.org/story/13/08/07/0315207/zimbabweans-hit-by-cyberattacks-during-election Several sources linked the attack to the
Zimbabwean general election, 2013|Zimbabwe Elections, held a day
earlier.http://www.theinquirer.net/inquirer/news/2287433/zimbabwe-electionhit-by-hacking-and-ddos-attackshttp://news.softpedia.com/news/Zimbabwes-Presidential-Election-Accompanied-by-Cyberattacks373758.shtmlhttp://www.techweekeurope.co.uk/news/zimbabwe-electioncyber-attacks-123938 GreenNet's services were not fully operational again
until 10.30 BST on Thursday 7
August.http://mailman.greennet.org.uk/pipermail/greennet-l/2013August/000121.html On the 9th of August there was a second attack, which,
while affecting some systems, allowed GreenNet to discover the site which
was being targeted.http://mailman.greennet.org.uk/pipermail/greennetl/2013-August/000122.html In October 2013, the target was revealed to be
the site of British investigative reporter Andrew Jennings.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
For More Information, Visit:
• https://store.theartofservice.co
m/itil-2011-foundationcomplete-certification-kitfourth-edition-study-guideebook-and-online-course.html
The Art of Service
https://store.theartofservice.com