Security Countermeasures and Denial of Service



"Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks impact system availability by flooding the target system with traffic or requests or by exploiting a system or software flaw" (PCcare, 2018).

What happens during a DoS attack, is that a single attacker directs an attack against a single target, sending packets directly to the target. It basically targets the network bandwidth or connectivity.


There are many common forms of DoS attacks, for example:
  1. Smurf
  2. Fraggle
  3. Ping flood
  4. Ping-of-death
  5. Syn Flood
  6. Land
  7. Teardrop
  8. DNS poisoning
  9. Banana Attack
  10. Negative Acknowledgement (NACK)
  11. Deuthentication (Deauth)
One of the most knowledgeable and used is Spam. It consists of sending unwanted e-mail messages to users.
It's considered a from of DoS because:
  • It consumes bandwidth that is used by legitimate traffic. 
  • It can fill a mailbox or hard disk and result in legitimate e-mail being rejected. 
  • Spam is often distributed by hijacking misconfigured SMTP servers.
Wonder if you might be a victim of DoS?
There are 4 main symptoms that you might be in the look out for:
  • Unavailability of a particular website
  • Inability to access any website
  • Dramatic increase in the number of spam emails received
  • Unusually slow network performance
Some countermeasures to consider for DoS and DDoS attacks:
  • Intrusion Detection Systems (IDS) and an Intrusion Protection Systems (IPS). 
  • Strong anti-virus and anti-spyware software on all systems with Internet connectivity. 
  • File and folder hashes on system files and folders to identify if they have been compromised. 
  • Reverse DNS lookup to verify the source address. 
  • External firewalls with the following filters: 
  • Ingress filters that specify any inbound frame must have a public IP address from outside of the organization's LAN. 
  • Egress filters that specify any outbound frame must have a private IP address within the organization's LAN. 
  • Address filter to prevent traffic from specific attackers (if known). 
  • Once a DoS attack begins, you can minimize its effects by implementing filters to block unwanted traffic. You can also contact your ISP to implement filtering closer to the source and reduce the bandwidth used by the attack. 
  • Hardening practices on all machines, especially publicly exposed servers and directory and resource servers. 

References:

PCcare. (2018). Eurocon. DoS Attacks and Countermeasures. Retrieved from: https://sites.google.com/a/pccare.vn/it/security-pages/dos-attacks-and-countermeasures

Rao. (2018). TATA. An Intro To Denial Of Service (DOS) Attacks & Countermeasures. Retrieved from: https://securitycommunity.tcs.com/infosecsoapbox/articles/2018/01/18/intro-denial-service-dos-attacks-countermeasures

Comentarios

Entradas más populares de este blog