DDOS

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

DoS and DDoS Attacks :

Methods, Impacts and Solutions

MUHAMMAD FAIQ ADZIM BIN AYOB


B082110125

NUR SYAHIRAH FARHANA BINTI SHAHRUL


B082110329

MUHAMMAD HAFIZ BIN NOOR HISHAM


B082110085

NURUL IZZAH BINTI SAIPUL AZHAR


B082110087

AHMAD MULHIM BIN MOHD SAFRIL


B082110530
INTRODUCTION
 A Denial of Service (DoS) attack is a type of
cyber attack in which the attacker attempts to
make a network or website unavailable to its
intended users.

 A Distributed Denial of Service (DDoS) attack is


a variant of a DoS attack in which the traffic or
requests come from multiple sources, making it
more difficult to block or mitigate the attack.
How does DOS and
DDOS Attacks?
DOS and DDOS attack
happens when the attacker
themselves gain control of
the internet in the computer
that they are using. Once the
attacker has control over the
botnet, they can directly
send malicious traffic or
software to the target server or
network.
DIFFERENCE
DOS and DDOS attack
DOS DDOS

 DOS Stands for Denial of  DDOS Stands for Distributed Denial of


service attack. service attack.

 In Dos attack single system  In DDoS multiple systems attacks the


targets the victim system. victims system..

 Victim PC is loaded from the


packet of data sent from a  Victim PC is loaded from the packet of
data sent from Multiple location.
single location.

 Dos attack is slower as


compared to DDoS.  DDoS attack is faster than Dos Attack.

 It is difficult to block this attack as


 Can be blocked easily as only multiple devices are sending packets
one system is used. and attacking from multiple locations.
METHODS
DDOS METHODS
DOS METHODS
 Using multiples sources of
• Using single devices or devices
coming from only single
user.  The attackers controls a
• The attackers directly network of compromised
sent malicious traffic or machines and directly send
files to the target victims malicious file from
• Less complicated to different types of sources.
detect the attacker then
DDOS.  Harder to detect and
distinguish the attacker.
EFFECTS
of DOS and DDOS Attacks?
 Both DOS and DDOS attacks
can cause target devices to
unreachable , slowed down or
system crash completely

 DDOS effects can be more


severe than a DOS attack due
to malicious traffic that being
sent to the targets.
IMPACTS
Buffer overflow attacks 
The attacker overload a network address with traffic so that it is put out of use.

ICMP flood 
An ICMP flood attack is used to take unconfigured or misconfigured network devices and uses
them to send spoof packets to ping every computer within the target network.

SYN flood 
SYN flood attacks send requests to connect to a server but don’t complete the handshake. This attack is
preventing anyone from connecting to the network when the network becomes inundated with connection
requests.

Teardrop Attack 
An attacker sends IP data packet fragments to a network that will attempt to recompile these fragments into their
original packets. The recompiling process will exhaust the system until it ends up crashing. It crashes because the
fields are designed to confuse the system so that it can not put them back together.
SOLUTION
To protect against DDoS attacks, businesses and individual website owners
can use specialized services. Some of the best solutions are listed below. :

• Cloudflare
• Incapsula
• Akamai
• AWS Shield
• BeeThink Anti-DDoS Guardian
• Sucuri
• Cloudbric
• Alibaba
• F5
• Radware DefensePro
CONCLUSION
In conclusion, DoS and DDoS are malicious attempts to make
a network or website unavailable to its intended users. These
attacks can have a significant impact on the availability and
functionality of targeted systems and can result in significant
financial losses and reputational damage. It is important to
take steps to protect against these types of attacks, such as
implementing firewalls, intrusion detection systems and
intrusion prevention systems, as well as using services such
as cloud-based DDoS protection. It is highly recommended to
stay informed and updated with the latest trends and best
practices to effectively defend against these types of attacks.
THANK YOU
Semoga hari anda dipenuhi senyum tawa manis , bukan sedih yang
membunuh hati <3

You might also like