A Short Note On Dos And Dos Attacks

2136 Words9 Pages
I. II. DoS Classification: DoS attacks usually compromise victim’s bandwidth or connectivity [1]. Bandwidth is compromised by flooding the network to an extent that exhausts partial or entire available bandwidth; while connectivity is compromised by flooding the victim machine with requests that exhausts partial or entire available operating system resources. In either of the cases, an authorized used is denied from accessing the victim machine or its resources. Based on the resource that a DoS attack may exploit, it can be classified into five broad categories as shown in the figure shown below: Figure 1: Classification of DoS attacks As the name suggests each of these categories exploit weakness or bugs at the respective level to…show more content…
The Strategy: Figure 2 on next page shows a simplistic model of a DDoS attack with its basic elements viz. an attacker, a handler or master who receives control traffic from the attacker and himself is capable of controlling multiple agents; then an agent or slave also known as a zombie, drone or a daemon agent which is essentially an innocent machine being controlled by master by running a daemon or special program and are used to send flood traffic towards the victim machine; and finally the victim himself. The actual strategy may comprise of different techniques, but each of them follows a step-wise process to set the entire model up and launch a coordinated attack as listed below. Also the Figure 3 below gives an overview of this process. Figure 2: Model of a DDoS attack [1] Figure 3: DDoS attack strategy a. To find a vulnerable machine to act as an agent or zombie: There are various scanning techniques [10] known in order to find a vulnerable machine: Random Scanning – a random IP address is selected from a pool of addresses and a malicious code checks for its vulnerability. If found vulnerable, the malicious code is installed and it further probes to find another vulnerable machine. The advantage of this technique is that it spreads the malicious code really quick and eventually the attacker has a pool of zombies in no
Open Document