Ddos Attack Strategy

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

In order to achieve a distributed denial-of-service attack, the attacker needs to recruit the multiple agent i.e. slave machines. This process is done through scanning automatically by remote machines, and looking for several security holes that would be enabled destruction. "Vulnerable machines are then been exploited and by using the discovered vulnerability to gain number of access to the machine, and they will be mostly affected with the attack code".

The exploit or infection phase will also be automated, and then the infected machines will also be used for further recruitment of new Agent machines will also perform the whole attack against the victim system. The attackers will usually hide the identity of the agent machines during the attack through spoofing techniques.

DDoS Goals

The main goal of a DDoS attack is to inflict all the damage on the victim, either for personal reasons with a number of attack against home computers some for revenge and for material gain or for popularity which successfully attacks on the web servers to mostly gain the respects of the hackers community in the internet world.

Well known DDOS attacks

These days they are getting much complex as number of the attacks been increasing in this world and with a new concept as they classify different types of attacks is a matter of opinion. "One vendor may classify only 5 types, whilst the other 10 types". As the situation considered the consensus which we all agree on is that now days the problems are real and getting bigger.

Flood attacks

  • TCP SYN Flood Attack:In a TCP SYN flood attack, the attacker creates half-open TCP connections by sending the initial SYN packet with a forged IP address, and never acknowledges the SYN /ACK from the host with an ACK. The server is not able to complete the connection requests and, as a result, the victim will waste all of its network type of resources. "A relatively small flood of bogus packets will tie up memory, CPU, and applications, resulting in shutting down a server"[4].
  • Smurf IP Attack:An attacker sends a nasty type of dos which forged ICMP echo packets to broadcast addresses of vulnerable networks. All these systems on these networks will reply to the entire victim with ICMP echo replies. The attacker sends a huge amount of ICMP traffic to a source address and uses a victim's IP address as the source IP so all the replies from the devices which respond to the broadcast address will flood the victim.
  • UDP Flood Attack:UDP is a connectionless protocol and it will not require any connection or any other set up procedure for transferring the data. A UDP Flood Attack is most possible if an attacker will send an UDP packet to a random port on the victim systems. This will make it relatively easy to abuse for flood type of attacks. A similar type of UDP flood attack are often referred to be as a Pepsi attack, it is an attack in which the attacker will be sending a large number of fake UDP packets to random ports on to a target host. When it will be realizing that there is no application that is waiting on the port, it will be generating an ICMP packet of destination unreachable to the duplicate source address. If there are an enough UDP packets which are delivered to ports on victim, the system will automatically go down without any user interference.
  • ICMP Flood Attack: "The ICMP attack are of 2 basic kinds, Floods and Nukes." These ICMP flood attack is usually been achieved by broadcasting either a bunch of pings or normal pings or ICMP pings or UDP packets. The main idea is to send more data to the victim system, that it will slow down so that much of them which are been disconnected from IRC is due the ping time out. "Nukes exploit bugs in certain Operating systems, Like Windows 95, and Windows NT. The idea is to send a packet of information that the OS can't handle. Usually, they cause your system to lock up"[3].


  • rev

    Our Service Portfolio

    jb

    Want To Place An Order Quickly?

    Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

    whatsapp

    Do not panic, you are at the right place

    jb

    Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

    Get 20% Discount, Now
    £19 £14/ Per Page
    14 days delivery time

    Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

    Get An Instant Quote

    ORDER TODAY!

    Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

    Get a Free Quote Order Now