際際滷

際際滷Share a Scribd company logo
Public University
                                                                                                                                                                                Web-Based Registration and Cashiering System
                                                                                                                                                                                Internal DDoS attack Illustration
                                                                                                                                                                                LOT2  Marcelo Silva
                                      INTERNET


                                                                                                                                                                         After being overwhelmed,
                                                                                                                                                                            the servers become
                                                                                                                Router                                                          unavailable
                                                             Network Intrusion Detection System
                                                                                                            ACLs configured




                                                                                                                                                                                 4. Registration and payment
                                                                                                                                                                                           processed

           Handler                                                Only HTTP/HTTPS traffic to                                                                                  Web Servers
                                                                  the webserver is allowed
                                                      NIDS
                          Ha




                                                                                                                                                                                                                         Database Server
                           nd




                                                                                                                                            S) ion
                                                                                                                                          TP
                             ler




                                                                                                                                st               t
                                                                                                                             ue        (HT istra                                                 Core Switch
                                 In




                                                                                                                          eq         3
                                                                                                                                   44 s reg
                                                                                                                      PR
                                str




                                                                                                                 HT
                                                                                                                    T         ort est
                                   uc




                                                                                                              an           -P
                                     ts




                                                                                                                        ge           u
                                                                                                          ds                     req
                                        th




                                                                                                        n           pa
                                                                                                   r se          in           nd
                                           e




                                                                                                 se           Log           a
                                         DD




                                                                                            1. U           ds          tem
                                               oS




                                                                                                      sen          sys
                                                                                                 ver            he
                                                Ag




                                                                                                              ot                           Thousands of bogus HTTP requests
                                                                                              ser
                                                  en




                                                                                           eb             int
                                                     ts




                                                                                       2.
                                                                                          W            gs
                                                                                                  r lo
                                                                                                se
                                                                                            3 .U
                                                                                                                                                                                                                Administration LAN Switch



                                                                                                        LAB 1                        LAB 2                              LAB 3




                                                                                                                                                                                                 Compromised Hosts - Zombies
Distributed Denial of Service Attack
1. DDoS Agents are deployed to comprised hosts
2. Handler instructs the bots to attack                                                                                                                                                          Regular traffic to the registration system
3. The Botnet attacks the victim hosts
                                                                                                                                                                                                 DDoS Attack

More Related Content

Featured (20)

PDF
2024 Trend Updates: What Really Works In SEO & Content Marketing
Search Engine Journal
PDF
Storytelling For The Web: Integrate Storytelling in your Design Process
Chiara Aliotta
PDF
Artificial Intelligence, Data and Competition SCHREPEL June 2024 OECD dis...
OECD Directorate for Financial and Enterprise Affairs
PDF
How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...
SocialHRCamp
PDF
2024 State of Marketing Report by Hubspot
Marius Sescu
PDF
Everything You Need To Know About ChatGPT
Expeed Software
PDF
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
PDF
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
PDF
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
PDF
Skeleton Culture Code
Skeleton Technologies
PDF
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
PDF
Content Methodology: A Best Practices Report (Webinar)
contently
PPTX
How to Prepare For a Successful Job Search for 2024
Albert Qian
PDF
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
PDF
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
PDF
5 Public speaking tips from TED - Visualized summary
SpeakerHub
PDF
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
PDF
Getting into the tech field. what next
Tessa Mero
PDF
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
PDF
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
2024 Trend Updates: What Really Works In SEO & Content Marketing
Search Engine Journal
Storytelling For The Web: Integrate Storytelling in your Design Process
Chiara Aliotta
Artificial Intelligence, Data and Competition SCHREPEL June 2024 OECD dis...
OECD Directorate for Financial and Enterprise Affairs
How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...
SocialHRCamp
2024 State of Marketing Report by Hubspot
Marius Sescu
Everything You Need To Know About ChatGPT
Expeed Software
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
Skeleton Culture Code
Skeleton Technologies
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
Content Methodology: A Best Practices Report (Webinar)
contently
How to Prepare For a Successful Job Search for 2024
Albert Qian
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
5 Public speaking tips from TED - Visualized summary
SpeakerHub
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
Getting into the tech field. what next
Tessa Mero
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC

DDoS Attack illustration

  • 1. Public University Web-Based Registration and Cashiering System Internal DDoS attack Illustration LOT2 Marcelo Silva INTERNET After being overwhelmed, the servers become Router unavailable Network Intrusion Detection System ACLs configured 4. Registration and payment processed Handler Only HTTP/HTTPS traffic to Web Servers the webserver is allowed NIDS Ha Database Server nd S) ion TP ler st t ue (HT istra Core Switch In eq 3 44 s reg PR str HT T ort est uc an -P ts ge u ds req th n pa r se in nd e se Log a DD 1. U ds tem oS sen sys ver he Ag ot Thousands of bogus HTTP requests ser en eb int ts 2. W gs r lo se 3 .U Administration LAN Switch LAB 1 LAB 2 LAB 3 Compromised Hosts - Zombies Distributed Denial of Service Attack 1. DDoS Agents are deployed to comprised hosts 2. Handler instructs the bots to attack Regular traffic to the registration system 3. The Botnet attacks the victim hosts DDoS Attack