A Denial of Service (DoS) or a Distributed Denial of Service
(DDoS) attack is an attempt to make a machine or network resource unavailable to users,
and is
intended to temporarily or indefinitely interrupt or suspend services to a host connected
to
the Internet.
Typical attacks involve saturating the target machine with external
communication requests, such that the machine can no longer respond to legitimate
traffic, or
responds so slowly it is rendered unavailable. Such attacks usually lead to server
overload.
The three most common methods of attack include:
- TCP SYN flood
- A Transmission
Control Protocol (TCP) Synchronous Transmission (SYN) flood occurs when a malicious
host
sends a flood of TCP/SYN packets - often with a forged sender address. Each of these
packets is handled like a connection request, causing the server to spawn half-open
connections by sending back a TCP/SYN-ACK packet (Acknowledge), and waiting for a
packet
in response from the sender address (response to the ACK Packet). However, because
the
sender address is forged, the response never arrives. These half-open connections
saturate
the number of available connections the server is able to make, keeping it from responding
to legitimate requests until after the attack is over.
- UDP flood
- A User Datagram
Protocol (UDP) flood overloads the target server by repeatedly sending an overwhelming
number of UDP packets.
- ICMP/Ping flood
- An Internet
Control Message Protocol (ICMP) flood sends its victims an overwhelming number of
ping
packets, usually by using the "ping" command. It is simple to launch with the purpose
of
gaining access to a greater amount of bandwidth than its victim.