DDOS Attacks: The Rundown
Group A: Joshua Petree, Wiley Allgood, Samuel Royce, James Francois, Jordan Griggs
April 14th, 2022
LIS4777, Dr. Shuyuan Metcalfe
Project Significance
Network Environment Topology
HTTP Flooding
HTTP Flood Demo
Defending against HTTP Flooding
NTP Amplification
Attacking with NTP Amplification
Defending from NTP Amplification
Attacking With ICMP (Ping) Flooding
Defending from ICMP (Ping) Flooding
Defense Methods
Attacking with Slowloris
OSI Model Layer: Application Layer 7
Target:
Method:
Tools Used:
Defending Against Slowloris
Prevention Methods:
Attacking with SYN Flooding
Method/Target:
Tools:
Defending from SYN Flooding
Prevention Method:
Counting Our Assets
Lessons Learned and Conclusion