Denial of Service Attacks Flashcards
A ____________ attack is an attempt to compromise availability by hindering or blocking completely the provision of some service.
Denial-Of-serive (DoS)
What are the three resources that can be targeted during a DoS?
Network Bandwidth
System resources
Application resources
______ _______ relates to the capacity of the network links connecting a server to the wider Internet (ISP).
Network Bandwidth
A form of system resource attack that uses packets whose structure triggers a bug in the system’s network handling software, causing it to crash.
Poison packet
A common characteristic of packets used in many types of DoS attacks is the use of forged source addresses.
Source address spoofing
The ability of a network server to respond to TCP connection request by overflowing the tables used to manage such connections.
SYN spoofing
_______ attacks take a variety of forms, based on which network protocol is being used to implant the attack. In all cases the intent is generally to overload the network capacity on some link to a server.
Flooding
What is the difference between SYN flooding attack and SYN spoofing attack.
In SYN flooding it is the total volume of packets that is the aim of the attack rather than the system code.
What are three indirect attack types that utilize multiple systems?
Distributed denial-of-service
Reflector attacks
Amplifier attacks
An _____ ______ refers to an attack that bombards Web servers with HTTP requests.
HTTP flood
Typically a DDos attack, with HTTP requests coming form many different bots.
______ exploits the common server technique of using multiple threads to support multiple requests to the same server applications
Slowloris
The attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system. When the intermediary responds, the response is sent to the target. Effectively this reflects the attack off the intermediary.
Reflection attack
______ _______ are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.
Amplification attack
What are the four lines of defense against DDoS attacks?
Attack prevention and preemption (before the attack)
Attack detection and filtering (during the attack)
Attack source traceback and identification (during and after the attack)
Attack reaction (after the attack)
These mechanisms enable the victim to endure attack attempts without denying service to legitimate clients. Techniques include enforcing policies for resource consumption and providing backup resources available on demand. In addition, prevention mechanisms modify systems and protocols on the internet to reduce the possibility of DDoS attacks.
Attack prevention and preemption (before the attack)