The Internet belongs to everyone. Let’s keep it that way.

Protect Net Neutrality
Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Distributed Denial of Service (DDoS) attack

No description
by

Andrey Popradanov

on 24 November 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Distributed Denial of Service (DDoS) attack

1.Cloudbric for 40 GB, the price is $69
2.Anti DDoS Guardian $99.95
3.Incapsula $59/ month
4.Cloudfare $200/ month
5.StormWall Pro $209/month

Tools
/most popular/
1. LOIC (Low Orbit Ion Canon)
2. HOIC
3. HULK (HTTP Unbearable Load King)
4. DDOSIM—Layer 7 DDOS Simulator
5. R-U-Dead-Yet
6. Tor’s Hammer
7. PyLoris
8. OWASP DOS HTTP POST
9. DAVOSET
10. GoldenEye HTTP Denial Of Service Tool
Image by Tom Mooring
Protection
/software/
Distributed Denial of Service (DDoS) attack
What is DDoS attack?
A Distribured Denail of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.

They target a wide variety of important resources,from banks to new websites,and present a major challenge to making sure people can publish and access important information.
How does it work?
Types
Why do they do it?
Why DDoS?
A typical DDoS attack would be to send 1Gb/s from 10 different servers and to block a targeted server using a
1 Gb/s connection. The result is the same as the DoS attackьь, but because of the variety of resources, the attack is a bit more complex to block.

Perpetrator uses more than one, often thousands of, unique IP addresses. The scale of DDoS attacks has continued to rise over recent years, even reaching over 1Tbit/s


Questions?
Business Competition
Hacktivism
"Script Kiddies"

//Redirection

Victims
Twitter
SoundClould
Netflix
Amazon
Spotify
Interesting.
Github
Etsy
Heroku
Pagerduty
Shopify
The new york times
CNN
Protection
/techniques/
networking techniques
local techniques
preventive action
blocking traffic
traffic analysis
Victums
/BULGARIA/
1. CENTRAL ELECTION COMMISSION
2.Ministry of Interior
3.Ministry of Foreign Affairs


http://www.digitalattackmap.com/
http://null-byte.wonderhowto.com/how-to/hack-like-pro-denial-service-dos-tools-techniques-0165699/
Link
Protection
/services/
1.Incapsula
2.F5 Networks
3.Arbor
4.Nexusguard
5.Verisign
6.Neustar
7.Akamai
8.DOSarrest
9.CloudFlare
10.Radware
source:
http://www.toptenreviews.com/business/internet/best-ddos-protection-services/
INSUFFICIENT DDOS DEFENSES
/cisco/
1.Blackholing
2.Routers
3.Firewall /not purpose-built
DDoS prevention devices/
4.IDS / cannot detect DDoS attacks
using valid packet/
/not a solution/
+ Kali Linux
Full transcript