1.7 Reflective DDoS attacks and amplification attacks

In this kind of attack, the attacker uses a legitimate computer to launch an attack against the victim by hiding its own IP address. The usual way is the attacker sends a small packet to a legitimate machine after forging the sender of the packet to look as if it has been sent from the victim. The legitimate machine will in turn send the response to the victim. If the response data is large, the impact is amplified. We can call the legitimate computers reflectors and this kind of attack, where the attacker sends small data and the victim receives a larger amount of data, is called an amplification attack. Since the attacker does not directly use computers controlled by him and instead uses legitimate computers, it's called a reflective DDoS attack:

The reflectors are not compromised machines unlike botnets. Reflectors are machines that respond to a particular request. It can be a DNS request, or a Networking Time Protocol (NTP) request, and so on.
Fig: Reflective DDos and Amplifaication attacks

DNS amplification attacks, WordPress pingback attacks, and NTP attacks are amplification attacks. In a DNS amplification attack, the attacker sends a forged packet to the DNS server containing the IP address of the victim. The DNS server replies back to the victim instead with larger data. The WordPress pingback attack and NTP attack are explained later in the chapter. Other kinds of amplification attack include SMTP, SSDP, and so on.

We will look at an example of such an attack in the next section. The computers that are used to send traffic to the victim are not the compromised ones and are called reflectors.

There are several groups of cyber criminals responsible for carrying out ransom DDoS attacks, such as DD4BC, Armada Collective, Fancy Bear, XMR-Squad, and Lizard Squad.

These groups target enterprises. They will first send out an extortion email, followed by an attack if the victim does not pay the ransom.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.163.58