Chapter 7 Flashcards
5th most costly form of attack for the respondents
DoS
is an action that prevents or impairs the authorized use of networks, systems, or application by exhausting resources.
DoS
categories of resources that could be attacked
- Network Bandwidth
- System Resources
- Application Resources
relates to the capacity of the network links connecting a server to the wider Internet
Network Bandwidth
The system can no longer communicate over the network until this software is reloaded
poison packet
examples of poison of death
- ping of death
- teardrop
- The aim of this attack is to overwhelm the capacity of the network connection to the target organization
- Traffic can be handled by higher capacity links on the path, but packets are discarded as capacity decreases
- Network Performance is noticeably affected
flooding ping command attack
flooding attack disadvantages
- the source of the attack is explicitly identified
- the targeted system will attempt to respond to the packets being sent
- A common characteristic of packets used in many types of DoS attacks is the use of forged source address –> harder to identify and via raw socket interface
- attacker generates large volumes of packets that have the target system as the destination address
- Congestion would result in the router connected to the final, lower capacity link
- Requires netwerk engineers to specifically query flow information from their routers
- source address spoofing
- Common DoS attack
- This attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connection
- legitimate users are denied access to the server
- an attack on system resources, specifically the network handling code in the OS
SYN spoofing attack
The standard protocol used for call setup in VoIP is the _____
Session Initiation Protocol
refers to an attack that bombards Web Servers with HTTP requests.
HTTP Floods
- It exploits the common server technique of using multiple threads to support multiple requests to same server application
- Eventually consumes Web Server’s connection capacity
- Attempts to monopolize by sending HTTP requests that never complete
- Utilizes legitimate HTTP traffic
- Existing intrusion detection and prevention solution that rely on signatures to detect attacks will generally not recognize slowloris
Slowloris
- For most organizations this is their connection to their Internet Service Provider (ISP)
- Network Bandwidth
Aims to overload or crash the network handling software
System Resources