Denial of Service Attacks and How to Prevent Them

Denial of Service

What Are Denial of Service Attacks?

A denial-of-service (DoS) attack is a tactic for overloading a machine or network to make it unavailable. Attackers achieve this by sending more traffic than the target can handle, causing it to fail—making it unable to provide service to its normal users. Examples of targets might include email, online banking, websites, or any other service relying on a targeted network or computer.

There are different types of DoS attacks such as resource exhaustion and flood attacks. Resource exhaustion attacks cause the targeted infrastructure to use all of it's available memory or storage resources, slowing the service's performance or stopping it alltogether. Flood attacks send an overwhelming number of packets that exceed server capacity.

A distributed denial-of-service (DDoS) is a type of DoS attack where the traffic used to overwhelm the target is coming from many distributed sources. This method means the attack can't be stopped just by blocking the source of traffic.

Botnets are often employed for DDoS attacks.

Protection Against Denial of Service Attacks

While DoS attacks are less challenging to stop or prevent, DDoS attacks can still present a serious threat.

Prevent spoofing: Check that traffic has a source address consistent with the set of addresses for its stated site of origin and use filters to stop dial-up connections from spoofing.

Limit broadcasting: Often attacks will send requests to every device on the network, amplifying the attack. Limiting or turning off broadcast forwarding where possible can disrupt attacks. Users can also disable echo and chargen services where possible.

Streamline incident response: Honing your incident response can help your security team respond quickly when DoS attacks are detected.

Protect endpoints: Ensure that all endpoints are patched to eliminate known vulnerabilities. Endpoints capable of running EDR agents should have them installed.

Dial in firewalls: Ensure your firewalls are limiting ingress and egress traffic across the perimeter wherever possible.

Monitor the network: The more you know about what normal inbound traffic looks like, the quicker you'll spot the start of a DDoS attack. Real-time visibility with network detection and response (NDR) is an efficient and reliable way to maintain a profile of what your network should look like (using machine learning) so you can detect suspicious surges immediately.

Denial of Service History

As far as we know, the first DoS attack was a SYN flood attack on the ISP Panix. It's services were down for several days before being restored.

One notable attack targeted the DNS provider Dyn in 2016. The Mirai botnet was used to launch DNS lookup requests from tens of millions of IP addresses, crippling and disrupting service for major sites including The New York Times, Reddit, Amazon, Visa, Paypal, and others.

So far, the largest ever DDoS attack was the 2018 2.3 Tbps attack on AWS Shield.