preview

Distributed Denial Of Service ( Ddos )

Good Essays

DISTRIBUTED DENIAL OF SERVICE (DDoS) Prachi Shah School of Informatics and Computing Indiana University Bloomington Email: pracshah@indiana.edu Abstract--- Distributed Denial of Service attacks are executed by an attacker that uses numerous zombie machines to launch an attack against the victim system. The purpose is to exhaust the connection bandwidth thereby, making a network resource or a service temporarily or indefinitely unavailable to its intended users. Keywords DoS, DDoS, bandwidth, networks, zombie, botnet 1. INTRODUCTION 1.1 Computer Security and Privacy One of the most challenging and important issues faced in the computer networks domain since a very long time now are network security and privacy issues. These issues …show more content…

Previously, routers would implement FIFO method for storing SYN packets. Once new (bogus) SYN packets enter the system, old (legitimate) packets are dropped off. Thus, the server memory gets overwhelmed by storing illegitimate packets and cannot accept new (legitimate) SYN requests from its intended users thereby, denying services to its intended users. Over the time, routers became smarter. They use rate-based filtering. After a certain limit of packets are accepted, routers don’t further accept packets. Also, routers don’t implement FIFO methods anymore. They only accept and store packets from computers that send an ACK as response to their SYN-ACK and complete the 3-way handshake. Incoming packets from a computer system that do not complete a 3-way handshake are dropped. 1.3 2 nd generation DoS attacks As the routers got smarter, attackers felt the need to improve their techniques. The 2 generation DoS attack called Distributed Denial of Service attack is much more sophisticated than the traditional DoS attack. The attacker uses one or more controller systems and targets a few thousand computer system to convert them into zombies. Zombies are computer systems that have been infected by an external entity like a hacker, trojan horse or a computer virus and possess a security hazard. The owners of the zombie machines are not aware of their system being compromised. A simple spam

Get Access