Type of Attacks

Objectives

Some of the most common are:

  • Fun and/or hacking reputation.

  • Political purposes.

  • Military purposes.

  • Economical purposes.

Technical objectives

  • Operation disruption.

    • (Distributed) Denial-of-Service.

  • Resource hijack.

    • Spam,

    • Crypt-currency mining/mastermodes,

    • Platform to other attacks!

  • For data interception.

    • Personal data.

      • As the final goal,

      • As a tool to achieve more valuable information.

    • Technical data.

      • Usually used to achieve more valuable information.

    • Commercial data.

      • Digital objects, financial and/or engineering plans, ...

  • All.

    • Disruption to intercept!

    • Intercept to disrupt!

Disruption may be used to achieve interception!

Interception may be used to achieve disruption (operational or commercial).

Disruption Attacks

Distributed DoS

  • Multiple slow/small devices generating traffic to a target.

    • TCP vs. UDP.

Solution at target.

  • Load-balancers.

  • For TCP, maybe it's possible to survive making active (with licit client validation) session resets (server/ firewalls).

    • White list solution, for completed session negotiation.

  • For UDP/DNS, block requests for known external relay/redirection DNS servers (blocks attack amplification, IP target spoofing).

    • Doesn't work with large botnets and direct requests to target.

Solution at source

  • Anomalous behaviors detection.

    • Low traffic variations are hard to detect.

    • Destinations of traffic changes.

    • With "really low" data rates is impossible to detect.

Denial of service by physical signal jamming

  • Pure disruption, or

  • Disruption to activate secondary channels (more easily compromised).

  • Solution.

    • Detect, localized source, and physically neutralize.

Last updated