Page 75 - StudyBook.pdf
P. 75

General Security Concepts: Attacks • Chapter 2  59

                    The financial and publicity-related implications of an effective DoS attack are
                 hard to measure—at best they are embarrassing, and at worst they are a deathblow.
                 Companies reliant on Internet traffic and e-purchases are at particular risk from
                 DoS and DDoS attacks.The Web site is the engine that drives e-commerce, and
                 customers are won or lost on the basis of the site’s availability and speed. If a site is
                 inaccessible or unresponsive, an alternate virtual storefront is usually only a few
                 clicks away.A hacker, regardless of motive, knows that the best way to hurt an e-
                 business is to affect its Internet presence in some way. DoS attacks can be an effi-
                 cient means of achieving this end; the next sections cover two elemental types of
                 DoS attacks: Resource Consumption attacks (such as SYN flood attacks and amplifica-
                 tion attacks) and Malformed Packet attacks.
                 Resource Consumption Attacks

                 Computing resources are, by their very nature, finite.Administrators around the
                 world bemoan the fact that their infrastructures lack network bandwidth, central
                 processing unit (CPU) cycles, Random-Access Memory (RAM), and secondary
                 storage. Invariably, the lack of these resources leads to some form of degradation of
                 the services the computing infrastructure delivers to clients.The reality of having
                 finite resources is highlighted even further when an orchestrated attack consumes
                 these precious resources.
                    The consumption of resources involves the reduction of available resources,
                 whatever their nature, by using a directed attack. One of the more common forms
                 of a DoS attack targets network bandwidth. In particular, Internet connections and
                 the supporting devices are prime targets of this type of attack, due to their limited
                 bandwidth and their visibility to the rest of the Internet community.Very few busi-
                 nesses are in the fortunate position of having excessive Internet bandwidth, and
                 when a business relies on its ability to service client requests quickly and efficiently,
                 a bandwidth consumption attack can bring the company to its knees.
                    Resource consumption attacks predominantly originate from outside the local
                 network, but you should not rule out the possibility that the attack is from within.
                 These attacks usually take the form of a large number of packets directed at the
                 victim, a technique commonly known as flooding.
                    A target network can also be flooded when an attacker has more available
                 bandwidth than the victim and overwhelms the victim with pure brute force.This
                 situation is less likely to happen on a one-to-one basis if the target is a medium-
                 sized e-commerce site. Such companies generally have a larger “pipe” than their
                 attackers. On the other hand, the availability of broadband connectivity has driven




                                                                              www.syngress.com
   70   71   72   73   74   75   76   77   78   79   80