ddos attack illustration

1
INTERNET Database Server Router ACLs configured Core Switch LAB 1 Administration LAN Switch 1. User sends an HTTP Request 2. Webserver sends Login page - Port 443 (HTTPS) NIDS Network Intrusion Detection System Only HTTP/HTTPS traffic to the webserver is allowed Handler Handler Instructs the DDoS Agents Compromised Hosts - Zombies Regular traffic to the registration system DDoS Attack 4. Registration and payment processed 3. User logs into the system and requests registration Thousands of bogus HTTP requests Public University Web-Based Registration and Cashiering System Internal DDoS attack Illustration LOT2 – Marcelo Silva After being overwhelmed, the servers become unavailable Web Servers Distributed Denial of Service Attack 1. DDoS Agents are deployed to comprised hosts 2. Handler instructs the bots to attack 3. The Botnet attacks the victim hosts LAB 2 LAB 3

Upload: marcelo-silva

Post on 05-Dec-2014

1.199 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: DDoS Attack illustration

INTERNET

Database Server

Router ACLs configured

Core Switch

LAB 1

Administration LAN Switch

1. User sends an HTTP Request

2. Webserver s

ends Login page - P

ort 443 (H

TTPS)

NIDS

Network Intrusion Detection System

Only HTTP/HTTPS traffic to the webserver is allowed

Handler

Handler Instructs the DDoS Agents

Compromised Hosts - Zombies

Regular traffic to the registration system

DDoS Attack

4. Registration and payment processed

3. Use

r logs in

to the sy

stem and re

quests re

gistratio

n

Thousands of bogus HTTP requests

Public UniversityWeb-Based Registration and Cashiering SystemInternal DDoS attack IllustrationLOT2 – Marcelo Silva

After being overwhelmed,

the servers become

unavailable

Web Servers

Distributed Denial of Service Attack1. DDoS Agents are deployed to comprised hosts2. Handler instructs the bots to attack3. The Botnet attacks the victim hosts

LAB 2 LAB 3