What is DoS Attack?
Denial of service or as simply says the DoSis an attack on a computer or network that prevents legitimate use of its resources. In this attacker flood a victim system with non-legitimate service requests or traffic to overload its resources, which prevents it from performing its intended tasks.
Symptoms of a DoS Attack
- Slow network performance
- Unavailability of a particular website
- Inability to access any website
- Dramatic increase of spam emails received
Detection Techniques
Detection techniques are based on identifying and discriminating the illegitimate traffic increase and flash events from legitimate packet traffic.
Activity profiling:
Activity profile can be identified by analyzing network packet’s header information. An attack is indicated by an increase of activity level among clusters.
Wevlet Analysis:
This describes an input signal in terms of spectral components. This will provide for concurrent time and frequency description. By analyzing each spectral window’s energy determines the presence of anomalies.
Countermeasure strategies
- Absorbing the attack: Use additional capacity to absorb traffic; It requires additional resources.
- Degrading services: Identify critical services and stop non-critical services.
- Shutting down services: Shutdown all the services until the attack has decreased.
- Configure the firewall to block external ICMP traffic access.
- Prevent using unnecessary functions such as gets, strcpy, etc. in programming.
- Secure the remote administration and connectivity testing.
- Prevent the return address being overwritten.
- Data processed by the attacker should be stopped from being executed.
- Perform thorough input validation.
- Use a better network card to handle large number of traffic.
- Update kernel to the latest release.
- Disable unused and insecure services.
DoS/DDoS Protection Tools
- NetFlow analyzer (http://www.manageengine.com/)
- D-Guard anti DDoS firewall (http://www.d-guard.com/)
- RegX fuzzer (http://www.microsoft.com/)
- NetSclar (http://www.citrix.com/)
- FortGuard (http://www.fortguard.com/)
- IntruGuard (http://www.intruguard.com/)
- WANGuard (http://www.andrisoft.com/)
No comments:
Post a Comment