Section 19.178 Malicious Activity: and Distributed Denial of Service Flashcards

Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity

1
Q

Malicious Activity

A

Constantly evolving threats in the digital age

■ Concerns: Cyber attacks, increasing in frequency and sophistication

■ Purpose: Delve into cyber threats, types, mechanisms, and impacts

Understanding cyber threats is the first step towards its prevention and mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Denial of Service (DoS)

A

Used to describe an attack that attempts to make a computer or server’s resources unavailable

■ Can be extended to network devices like switches and routhers also

This is a type of attack that can be carried out in many different ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Distributed Denial of Service catagories: 1. Flood Attacks

Flood Attack

A

Specialised type of DoS which attempts to send more packages to a single server or host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Distributed Denial of Service catagories: 1. Flood Attacks

Ping Flood

Varities of Flood Attack

A

A variety of Flood Attack in which a server is sent with too many pings (ICMP echo)

Ping Flood has become very common place many organisation now simply block echo replies and simply have a firewall dropping these requests when received

A ping is technically an ICMP echo request packet but they like to call it a ping on the exam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Distributed Denial of Service catagories: 1. Flood Attacks

SYN Flood

Varities of Flood Attack

A

An attacker will initiate multiple TCP sessions but never complete the three-way handshake

● Consumes server resources and prevents legitimate connections

● Countermeasures -
○ Flood guard
○ Timeout configurations
○ Intrusion prevention systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Permanent Denial of Service (PDOS) Attack

A

Exploits security flaws to break a networking device permanently by re-flashing its firmware

■ Requires a full firmware reload to bring the device back online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fork Bomb

A

Attack creates a large number of processes (fork), consuming processing power

■ Not considered a worm, as it doesn’t infect programs or use the network

■ Self-replicating nature causes a denial of service condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Distributed Denial of Service (DDoS) attack

A

Malicious attempt to disrupt the normal functioning of a network, service, or
website by overwhelming it with a flood of internet traffic

■ Involves multiple machines attacking a single server simultaneously.

■ Attackers often use compromised machines within a botnet

■ Techniques like DNS amplification can amplify the attack’s impact

■ DDoS attacks aim to force the target server offline temporarily

A denial of service attack involving the continual flooding of a victim system with request for services that causes a system to crash and run out of memory. Now this all usually happens when you’re talking about one system attacking one system but that wasn’t enough with modern computers.
So we moved up to the distributed denial of service attack where hundreds or thousands
of people target a single server to take it down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GIT HUB attack

A

March of 2018, the website GitHub was hit by the largest DDoS

This is where tens of thousands
of unique endpoints conducted a coordinated attack to hit that server with a spike in traffic, and the spike in traffic went up to 1.35 terabits per second.

This took the website offline for all of five minutes. So you can see how these DDoSs are really hard on a server and can take them down but not for very long if you can stop them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Type of DDoS attack

DNS Amplification Attack

A

Specialised DDoS that allows an attacker to initiate DNS requests from a spoof IP address to flood a website

In an Amplified DDoS attack, the attacker exploits the connectionless nature of the User Datagram Protocol (UDP). They send a small packet of information that appears to originate from the victim’s IP address to a vulnerable UDP server. The server then sends a significantly larger packet of information back to the victim’s IP address, effectively amplifying the size of the data packet and the impact of the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Surviving and Preventing DoS and DDoS Attacks

Black Hole or Sinkhole

A

● Routes attacking IP traffic to a non-existent server through a null interface

● Effective but temporary solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Surviving and Preventing DoS and DDoS Attacks

Intrusion Prevention Systems

A

Can identify and respond to DoS attacks for small-scale incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Surviving and Preventing DoS and DDoS Attacks

Elastic Cloud Infrastructure

A

● Scaling infrastructure when needed to handle large-scale attacks

● May result in increased costs from service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Surviving and Preventing DoS and DDoS Attacks

Specialised Cloud Service Providers

A

● Providers like CloudFlare and Akamai offer DDoS protection services

● Provide web application filtering, content distribution, and robust
network defenses

● Help organisations withstand DDoS and high-bandwidth attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly