BZU PAGES: Find Presentations, Reports, Student's Assignments and Daily Discussion; Bahauddin Zakariya University Multan Right Header

HOME BZU Mail Box Online Games Radio and TV Cricket All Albums
Go Back   BZU PAGES: Find Presentations, Reports, Student's Assignments and Daily Discussion; Bahauddin Zakariya University Multan > Welcome to all the Students > Articles > Computer & Programming


Reply
 
Thread Tools Search this Thread Rating: Thread Rating: 1 votes, 5.00 average. Display Modes
Old 21-09-2008, 03:44 PM   #1
Denial of service
Waqas Ahmed Waqas Ahmed is offline 21-09-2008, 03:44 PM
Rating: (1 votes - 5.00 average)


Denial of service
Denial-of-service (DoS) attacks are among the most common hacker attacks. A
hacker initiates so many invalid requests to a network host that it uses all its
resources responding to them and ignores legitimate requests.
DoS attacks
The following types of DoS attacks are possible against your network and
hosts, and can cause systems to crash, data to be lost, and every user to
jump on your case, wondering when Internet access will be restored.
Individual attacks
Here are some common DoS attacks:
[1] SYN floods: The attacker literally floods a host with TCP SYN packets.
[1] Ping of Death: The attacker sends IP packets that exceed the maximum
length of 65,535 bytes, which can ultimately crash the TCP/IP stack on
many operating systems.
[1] WinNuke: This attack can disable networking on older Windows 95 and
NT computers.
Distributed attacks
Distributed DoS (DDoS) attacks have an exponentially greater impact on their
victims. The most famous was the DDoS attack against eBay, Yahoo!, CNN,
and dozens of other Web sites by the hacker known as MafiaBoy. These are
some common distributed attacks:
[1] Smurf attack: An attacker spoofs the victim’s address and sends ICMP
echo request (ping packets) to the broadcast address. The victim computer
gets deluged with tons of packets in response to those echo
requests.
[1] Trinoo and Tribe Flood Network (TFN) attacks: Sets of client- and
server-based programs launch packet floods against a victim machine,
effectively overloading it and causing it to crash.
DoS attacks can be carried out with tools that the hacker either writes or
downloads off the Internet. These are good tools to test your network’s
IDS/IDP and firewalls. You can find programs that allow actual attacks and
programs, such as BLADE Software’s IDS Informer, that let you send controlled
attacks.
144 Part III: Network Hacking
Testing
Your first DoS test should be a search for DoS vulnerabilities from a portscanning
and network-analysis perspective.
Don’t test for DoS unless you have test systems or can perform controlled
tests with the proper tools. Poorly planned DoS testing is a job search in the
making. It’s like trying to delete data from a network share remotely and
hoping that the access controls in place are going to prevent it.
Countermeasures
Most DoS attacks are difficult to predict, but they can be easy to prevent:
[1] Test and apply security patches as soon as possible for such network
hosts as routers and firewalls, as well as for server and workstation
operating systems.
[1] Use IDS and IDP systems to monitor regularly for DoS attacks.
You can run a network analyzer in continuous capture mode if you can’t
justify the cost of an all-out IDS or IDP solution.
[1] Configure firewalls and routers to block malformed traffic. You can do
this only if your systems support it, so refer to your administrator’s
guide for details.
[1] Minimize IP spoofing by either
• Using authentication and encryption, such as a Public Key
Infrastructure (PKI)
• Filtering out external packets that appear to come from an internal
address, the local host (127.0.0.1), or any other private and nonroutable
address such as 10.x.x.x, 172.16.x.x–172.31.x.x, or
192.168.x.x
[1] Block all ICMP traffic inbound to your network unless you specifically
need it. Even then, you should allow it only in to specific hosts.
[1] Disable all unneeded TCP/UDP small services (such as echo and chargen).
Establish a baseline of your network protocols and traffic patterns before a
DoS attack occurs. That way, you know what to look for. And periodically
scan for such potential DoS vulnerabilities as rogue DoS software installed on
network hosts.
Work with a minimum necessary mentality when configuring your network
devices such as firewalls and routers:
[1] Identify traffic that is necessary for approved network usage.
[1] Allow the traffic that’s needed.
[1] Deny all other traffic.
__________________

Waqas Ahmed

---------------------------------------------------
My education, expertise and experience as follows:
MS (CS), M.Sc.(TS), CCNA, CCNP, RHCE (prepared),
HTML, XHTML, DHTML, CSS, Javascripts, PHP, MYSQL, WORDPRESS, JOOMLA, DRUPEL, PHPBB ETC..
Adobe Photoshop, FLASH.
VMWARE Server. Windows 2003 Server, Apache Server, Squid Server, etc.
You can also get training from any of above or gain services.
Mobile : 0313-7359605
Email : waqqas1@yahoo.com
Company : www.vision2define.com
http://bzupages.com/f2/aoa-760/

 
Waqas Ahmed's Avatar
Waqas Ahmed

Join Date: Sep 2008
Location: New-Multan
Age: 37
Posts: 297
Contact Number: 0321-7359605, 0313-7359605
Program / Discipline: MSTS
Class Roll Number: 07-22
Views: 1913
Reply With Quote
  #2  
Old 21-09-2008, 03:59 PM
.BZU.'s Avatar


 
Join Date: Sep 2007
Location: near Govt College of Science Multan Pakistan
Posts: 9,693
Contact Number: Removed
Program / Discipline: BSIT
Class Roll Number: 07-15
.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute
Information How do you avoid being part of the problem?

What is a distributed denial-of-service (DDoS) attack?

In a distributed denial-of-service (DDoS) attack, an attacker may use your computer to attack another computer. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of your computer. He or she could then force your computer to send huge amounts of data to a web site or send spam to particular email addresses. The attack is "distributed" because the attacker is using multiple computers, including yours, to launch the denial-of-service attack. How do you avoid being part of the problem?

Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers:
  • Install and maintain anti-virus software (see Understanding Anti-Virus Software for more information).
  • Install a firewall, and configure it to restrict traffic coming into and leaving your computer (see Understanding Firewalls for more information).
  • Follow good security practices for distributing your email address (see Reducing Spam for more information). Applying email filters may help you manage unwanted traffic.
How do you know if an attack is happening?

Not all disruptions to service are the result of a denial-of-service attack. There may be technical problems with a particular network, or system administrators may be performing maintenance. However, the following symptoms could indicate a DoS or DDoS attack:
  • unusually slow network performance (opening files or accessing web sites)
  • unavailability of a particular web site
  • inability to access any web site
  • dramatic increase in the amount of spam you receive in your account
What do you do if you think you are experiencing an attack?

Even if you do correctly identify a DoS or DDoS attack, it is unlikely that you will be able to determine the actual target or source of the attack. Contact the appropriate technical professionals for assistance.
  • If you notice that you cannot access your own files or reach any external web sites from your work computer, contact your network administrators. This may indicate that your computer or your organization's network is being attacked.
  • If you are having a similar experience on your home computer, consider contacting your Internet service provider (ISP). If there is a problem, the ISP might be able to advise you of an appropriate course of action.

__________________
(¯`v´¯)
`*.¸.*`

¸.*´¸.*´¨) ¸.*´¨)
(¸.*´ (¸.
Bzu Forum

Don't cry because it's over, smile because it happened
Reply With Quote
Reply

Tags
denial, service


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
University ki bus; :) BZU Multan, Bus Service .BZU. BZU Graphics and Wallpapers 1 05-08-2013 02:57 PM
Lajawab log bakamal service .BZU. Chit Chat 0 02-04-2012 08:17 AM
A Public Service Message .. Use your brain .BZU. Funny Cut Piece 0 18-10-2011 12:23 PM
[Presentation] Service Marketing BSIT07-01 Marketing 0 14-04-2009 01:58 AM
WiMaX (Broadband Service) Waqas Ahmed Telecommunication 0 23-09-2008 11:18 PM

Best view in Firefox
Almuslimeen.info | BZU Multan | Dedicated server hosting
Note: All trademarks and copyrights held by respective owners. We will take action against any copyright violation if it is proved to us.

All times are GMT +5. The time now is 09:48 PM.
Powered by vBulletin® Version 3.8.2
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.