Running Head: SECURITY ATTACK ON SYSTEMS AND WEB SERVERS 1
Security Attack on Systems and Web Servers
Author’s Name
School of Affiliation
Date
SECURITY ATTACK ON SYSTEMS AND WEB SERVERS 2
1. Denial of Service (DOS)
This is an attack launched by a malicious user that makes a resource unavailable to the
users and this is achieved through the flooding of the URL target with numerous requests than
that a server can handle. The traffic in accessing a particular site will be slowed down than
normal, or rather, it would be interrupted completely. The Denial of Service takes place when the
legitimate users of a web service or resource are denied access and use (Qin et al. 2018). The
attack affects the individual or organization emails, the websites, and online accounts of the
banking sector.
The most common existing type of the denial of service attack is the Smurf attack, where
the sending of the internet control message protocol packet using spoofed IP addresses to
multiple hosts in the network. The response was made on the spoofed IP addresses making the
target host experience flooding initiating denial of service. The SYN flood attack as a form of
denial of service attack occurs when requests are sent by an attacker to be connected to the
server, but the connection cannot complete because of a three-way handshake. The
incompleteness of the handshake left a port in an unconnected status and unavailable for
requests. Sending the packets will continue making the ports saturated; hence legitimate users
will not connect to the connect, resulting in a DOS.
2. Distributed Denial of Service Attack (DDOS)
This nature of the attack is typically a Denial of service attack but comes out from
multiple sources affecting the same target. The origin and source of the DDOS attack may come
from numerous zombie machines connected to the internet. The attacker used a botnet as a
machine controlled remotely and used to launch attacks on the internet. The attack is made from
multiple sources, and coordination is done from a centralized place (Jamal et al. 2018). There
SECURITY ATTACK ON SYSTEMS AND WEB SERVERS 3
exist many botnets worldwide. The attacker only needs to infect one with malicious software that
corrupts its data and alters its normal functioning in the network after infection. For instance, a
malicious user may be hired to cripple a competitive or rival company in the market by
launching a denial of service attack. The discussed below are the three types (volumetric,
protocol, and application-layer attacks).
Types of Distributed Denial of Service Attack.
a. The Application Layer Attack
The attack is also known as the layer 7 attacks. The malicious users launching the attack
aim to exhaust the target's resources, thereby creating a denial of service. The DOS attack has its
specific target on the application layer, where the web pages are created and delivered to the
client upon responding to an HTTP request from the client. For effective running of the HTTP
request on the server, the service focuses on loading the multiple files running the database
queries needed to create a web page. Upon the creation of the web pages, the response is given
back to the client (Mahjabin et al. 2017). The attack is difficult to detect and prevent, as it is
difficult for one to assess legit traffic from malicious traffic. The numerous HTTP request from
multiple clients both legit malicious cause traffic on the web pages, thereby slowing down the
process or completely interrupting the process hence causing a denial of service.
The attack targets web-based applications, web servers, and web application platforms.
The attacker will make the server have crashed, making the application that uses the server
difficult to access. The attacker exploits the available vulnerabilities exposed by the user, or the
attacker finds them in the application. This business logic is underlying or focuses on abusing the
HTTPS or SNMP in the network. The attack's success is enhanced because it uses less
bandwidth; hence, the rate of display of network traffic is slow compared to other attacks,
SECURITY ATTACK ON SYSTEMS AND WEB SERVERS 4
making its detection difficult. The attack launched on a system is measured in terms of requests
per second sent to the server.
● HTTP flood
The exploitation of the legitimate request of an HTTP POST or GET in an attempt to
attack the web server or web-based application. The attack uses less bandwidth on the target host
to remain undetected. The attacker makes sure that the web-based application server uses
maximum resources when responding to a single request made—causing a denial of service
attack.
b. Protocol attacks
The attack was launched by a malicious user to over-consuming the available server
resources or the existing resources of the load balancers and the network firewalls, thereby
leading to a denial of service attack (Yadav et al. 2016). The attack is also called state
exhaustion, as it causes a complete disruption of the server functionality. The attack targets the
OSI model's network layer and transport layer, layers 3 and 4. The attack is portrayed using the
SYN flood attack.
● SYN flood attack
The attack launched uses the TCP handshake where the computers in a network initiate
communication by sending the target number of TCP connections with spoofed source IP
addresses. When a client sends an HTTP request and the server before confirmation, more
requests come in until it becomes overwhelming, and the resources depleted, causing a denial of
service when the target machine sends responses to the clients that made connection requests and
waits for the final handshake that never comes leading to exhaustion of target machine resources
(Zeebaree et al. 2020).
SECURITY ATTACK ON SYSTEMS AND WEB SERVERS 5
● Ping of death attack
The malicious pings are sent to the target host by the attacker. There exists a limit of
packets sent in the data link layer. A larger IP packet is split into multiple IP packets making the
recipient host reassemble the packets for completion (Yihunie et al. 2018). The attacker
maliciously fragments a content making the host end up with a larger IP packet on reassembling.
The result leads to the overflowing of the memory buffer allocated to the packet. The attack
causes legitimate packets to suffer from denial of service.
c. Volumetric attacks
The malicious user on launching this attack consumes all the existing bandwidth
between the target machine and the larger internet, thereby causing high-level congestion in the
network (Larson & D, 2016). The attack's nature is based on the transmission of numerous data
to an identified target using the application as the basic form or using other manipulative ways of
creating massive traffic in the network, such as the request sent from a botnet. The attacker uses
DNS amplification as a way to cause a denial of service to users.
● ICMP floods
The attack focuses on overwhelming the target source. Let's say the server with the ICMP
Echo requests or the ping packets. The botnet controlled by the attacker sends the packets faster
without waiting for a response or replies. The attacks consume the incoming and outgoing
bandwidth since the server being targeted will try responding to the ping packets resulting in
slowing down the server performance or complete interruption.
● UDP floods
The attack focuses on flooding the target with User Datagram Packet to ensure the
random ports are flooded on the remote host. The host continuously checks for the listening
SECURITY ATTACK ON SYSTEMS AND WEB SERVERS 6
application at that port, having ICMP destination unreachable packet, thereby sapping the
resources leading to service accessibility in the network.
● Domain Name Server application.
The attacker makes sure that he sends multiple requests to an available Domain name
Server using a spoofed IP address in the network. The server's target IP address receives the
request from the owner of the spoofed IP address from the server in the network, which leads to
congestion because of numerous requests sent to them, causing a denial of service attack (Costa
et al. 2016).
Prevention of DDOS attack
● We are purchasing more bandwidth to make network infrastructure resistant to DDOS
attacks in spikes in traffic caused by malicious user activities.
● Use of Anti-DDOS software modules and hardware where load balancers are used and
the addition of software modules in different web servers to prevent the occurrence of
DDoS. The close monitoring of incomplete connections flushing them out as the number
reaches a given threshold value configured is the best preventive measure to DDOS.
● Configuring the hardware in the network against DDOS attacks will reduce malicious
activities on the network. Small changes like configuration of firewall to drop requests
made to the DNS from outside the network.
SECURITY ATTACK ON SYSTEMS AND WEB SERVERS 7
References
Costa Gondim, J. J., de Oliveira Albuquerque, R., Clayton Alves Nascimento, A., García
Villalba, L. J., & Kim, T. H. (2016). A methodological approach for assessing amplified
reflection distributed denial of service on the internet of things. Sensors, 16(11), 1855.
Jamal, T., Haider, Z., Butt, S. A., & Chohan, A. (2018). Denial of service attack in cooperative
networks. arXiv preprint arXiv:1810.11070.
Larson, D. (2016). Distributed denial of service attacks–holding back the flood. Network
Security, 2016(3), 5-7.
Mahjabin, T., Xiao, Y., Sun, G., & Jiang, W. (2017). A survey of distributed denial-of-service
attack, prevention, and mitigation techniques. International Journal of Distributed
Sensor Networks, 13(12), 1550147717741463.
Qin, J., Li, M., Shi, L., & Yu, X. (2018). Optimal denial-of-service attack scheduling with
energy constraint over packet-dropping networks. IEEE Transactions on Automatic
Control, 63(6), 1648-1663.
Yadav, S., & Subramanian, S. (2016, March). Detection of Application Layer DDoS attack by
feature learning using Stacked AutoEncoder. In 2016 International Conference on
Computational Techniques in InformMallikarjunan, K. N., Muthupriya, K., & Shalinie, S.
M. (2016, January). A survey of distributed denial of service attack. In 2016 10th
International Conference on Intelligent Systems and Control (ISCO) (pp. 1-6).
IEEE.ation and Communication Technologies (ICCTICT) (pp. 361-366). IEEE.
Yihunie, F., Abdelfattah, E., & Odeh, A. (2018, May). Analysis of ping of death DoS and DDoS
attacks. In 2018 IEEE Long Island Systems, Applications and Technology Conference
SECURITY ATTACK ON SYSTEMS AND WEB SERVERS 8
(LISAT) (pp. 1-4). IEEE.
Zeebaree, S. R., Jacksi, K., & Zebari, R. R. (2020). Impact analysis of SYN flood DDoS attack
on HAProxy and NLB cluster-based web servers. Indones. J. Electr. Eng. Comput.
Sci, 19(1), 510-517.