Page 56 - Computer Software Application TP - Volume 1
P. 56
COMPUTER SOFTWARE APPLICATION - CITS
EXERCISE 15 : Handling Denial-of-Service (DoS)
Objectives
At the end of this exercise you shall be able to
• handle DoS during a attack
• prevent DoS during the attack.
Requirements
Tools/Materials
• PC/Laptop with network connectivity
• Firewall & VPN
Procedure
TASK 1: Handling DoS During a Attack
1 Identify the Attack: The first step is to recognize a DoS attack. Signs include unusually slow network
performance, website outages, or specific applications being unavailable.
2 Isolate the Attack: Try to isolate the affected system or service to minimize the impact on the entire network.
Firewalls and traffic filtering rules can be helpful here.
3 Activate DDoS Defense Mechanisms: Many network devices like routers have built-in DDoS protection
features. These may include rate limiting, which restricts incoming traffic volume, or blackholing malicious IP
addresses.
4 Contact Your Service Provider: If you suspect a large-scale DDoS attack, especially for businesses or
organizations, your internet service provider (ISP) can offer more advanced mitigation techniques and
resources.
5 Analyze and Adapt: Once the immediate attack subsides, analyze logs and traffic patterns to understand the
attack type. This will help refine your mitigation strategies for future attacks.
TASK 2: Preventing DoS Attacks
1 Plan and Prepare: Develop a DoS incident response plan that outlines roles, responsibilities, and
communication protocols during an attack.
2 Strengthen Network Security: Regularly update firewalls, intrusion detection/prevention systems (IDS/IPS),
and software on all devices.
3 Utilize DDoS Mitigation Services: Consider subscribing to DDoS protection services offered by security
vendors. These services can filter malicious traffic before it reaches your network.
4 Content Delivery Networks (CDNs): CDNs can absorb large traffic spikes and distribute legitimate traffic
more efficiently.
5 Educate Users: Train employees on potential social engineering tactics hackers use to launch DoS attacks
via phishing emails or malware.
NOTE: DoS mitigation strategies depend on the specific attack type and the resources available.
41