Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Vimeo
    Let's Tech It Easy
    Subscribe Login
    • Homepage
    • About
    • Blog
      • Computers
      • Cloud
      • Gaming
      • Cyber Security
      • iPhone
      • Mac
      • Windows
      • Android
    • Contact
    • My Tickets
    • Submit Ticket
    Let's Tech It Easy
    Home»Computers»DoS Attack Implementation and Prevention in Ubuntu
    Computers

    DoS Attack Implementation and Prevention in Ubuntu

    ltieintern1By ltieintern122 December 2020Updated:12 January 2021No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Abstract

    Denial-of-Service attack or DoS attack is a cybersecurity attack in which the attacker makes the network or the system unavailable for the user temporarily or indefinitely until it has been resolved. In a Distributed Denial-of-Service attack or DDoS attack, attacker makes use of a network to stop the user from using the network or system. DoS and DDoS cybersecurity attacks are very dangerous in nature and attacker can steal user information or data and user might seem that there is probably something wrong with the internet connection or system is slowing down. The purpose of this blog is to demonstrate how an attacker can make use of DoS attack or DDoS attack and what vulnerabilities are being used by the attacker and how it can be resolved. The attack is performed inside a virtual machine so no machine has been actually targeted and is intended for learning purposes only. The virtual environment is created using Oracle Virtualbox and Ubuntu is used as the virtual machine.

    Introduction

    Distributed Denial-of-Service attack or infamously known as DDoS attack is a threatening attack where perpetrators slows down the network or system and then steal information from the user. Now a user might think that how slowing down or stoppage can result into an attack. Attackers try different methods like HTTP poisoning or ARP poisoning where they flood the network and while user is not able to do any task on the system and the attacker would penetrate inside the system. Recently in 2020, Amazon Web services were attacked by a brutal DDoS attack which lasted for three days. Thus, it is evident that DDoS attack is still at large and many big companies have been targeted and it is predicted to increase in coming years. This blog will present a simple way of how an attacker implements a DOS attack, what it does a system and how it can be stopped.

    Implementation of DOS in Ubuntu

    In order to implement DOS in ubuntu, the first requirement is to install Apache server with evasive mode. The Apache server is a free web server which powers up around 40% of websites. The evasive mode in Apache helps in protecting the server from various attacks like DoS, DDoS and brute force. In order to install Apache server in evasive mode, the command is ‘sudo apt-get install libapache2-mod-evasive’. If the reader is not familiar with commands in Linux, another blog can be read which depicts common commands in Kali Linux, which are very similar to Ubuntu. The screenshot below shows installation of Apache in Ubuntu.

    After the Apache server has been installed then it will ask for package configuration and in this ‘Local Only’ is used since the attack is only performed inside the virtual machine as shown below:

    Further, when the completion of server takes place, then evasive mode needs to be enabled and in order to do that the command required is ‘a2enmod evasive’ as shown below.

    Now, the configuration file of evasive mode can be opened which requires the command ‘a2query -m evasive’. This will open the following window.

    From the figure above, it is evident that the evasive mode has an option to create DoS hash tables. This will generate hash tables which will be running on the server and they will run a page count of 20 after every 5 seconds. This will slow down the server and then the connection will stop. In Apache server a directory can be created which would store logging information. In order to do that first directory is created using ‘mkdir’ command and then using command ‘chown’ permission is granted to read the directory as shown below:

    Now initially, if the DoS attack was not implemented then when command ‘test.pl when ran, it will give the following results.

    From the figure above, it is evident that the connection is established but after DOS hash table is generated then the following results are given:

    It is evident that the DoS hash table has stopped the connection to be established. Thus, DoS attack has been implemented successfully and connection has been cut off.

    Prevention of DoS Attack

    In order to prevent DoS attack, first the IP address of the attacker needs to be found. The log directory created before will help in figuring out about who is attacking the system. Now if the items are listed on the directory it will show the following results:

    As clear from the figure that the attacker of DoS attack is ‘127.0.0.1’. Now if the IP address is blacklisted inside the configuration of the evasive mode then the attacker will not be able to attack the system anymore. Either the IP address can be blacklisted or DoS address can be whitelisted which would both block the IP address as shown below:

    Now when the settings are saved then the attacker will not be able to attack anymore. From the image below, it is evident that again the connection has been re-established.

    Now, the connection is back on and the attacker has been blocked. In case of DDoS attack, there will multiple network so it will be difficult to figure out the attacker.

    Conclusion

    DoS attack is widely used but DoS attack can be prevented but when it comes to DDoS attack it is really difficult to stop it. As shown, a single attacker was able to perform a heavy DoS attack and block the user to connect. There have been multiple DoS and DDoS attack and, in this blog, it was demonstrated how harmful they can be and how hard it is to prevent them. The evasive mode of Apache comes with different features where attackers can be blacklisted and thus stopping them. For learning purposes, hash tables can be generated inside the evasive mode of Apache. Recent DDoS attack on Amazon was really brutal and it is predicted that attacks will be continued in the future. Due to many ways a Dos or DDoS can be created, makes it hard to find it but maybe in future a better solution will be found.

    computer cybersecurity ubuntu
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleTop Kali Linux Commands
    Next Article Let’s Play with Python!! ?
    ltieintern1

    Related Posts

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025
    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Demo
    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Windows 10 End of Service: What Must Be Done

    By Uneeb19 March 20250

    On October 14, 2025, Microsoft will officially end support for Windows 10, signalling a major shift…

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    You too can join us

    If you also think about technology and want to contribute either as a mentor or even from a learner’s perspective, look no further and join us. Write us at info@letstechiteasy.com and share your opinion. Our team will get back by sending you an invite to join the platform as a contributor. Empower others, empower yourself so each one of us can play with the technology safely one day without being scared.

    Subscribe Here
    Loading
    For Partnership Worldwide

    Contact:

    partner@letstechiteasy.com

     

    About Us
    About Us

    “Let’s Tech It Easy” or popularly known as “LTIE” is the blogging platform for everyone who wants to share and learn about technology. It is an initiative by the serial techpreneur Vish when he realized the wide gap between the pace at which the technology is evolving and at which it is getting adopted by a wider audience.

    Email Us: support@benchmarkitservices.com

    Latest Posts

    Upgrading RAM

    10 March 2023

    Desktop Vs Laptop

    10 March 2023

    Data Recovery

    3 March 2023

    MacOS on Windows Virtual Box

    10 February 2023

    macOS Monterey and what’s new in it?

    12 April 2022
    New Comments
    • How to Troubleshoot Sound and Mic on Windows 10 - Let's Tech It Easy on How to Access Troubleshooters on Windows 10
    • How to Stay Safe While Using Public Wi-Fi Networks - Let's Tech It Easy on Internet Security for Home Users – VPN 101
    • How to Set up Oracle VirtualBox on a Mac - Let's Tech It Easy on How to Install Windows 10 on a Mac Using Boot Camp Assistant
    • DoS Attack Implementation and Prevention in Ubuntu – Let's Tech It Easy on Top Kali Linux Commands
    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About
    • Blog
    • Contact
    • Computers
    • Cloud
    • Gaming
    • Cyber Security
    • iPhone
    • Mac
    • Windows
    • My Tickets
    • Submit Ticket
    © 2025 LetsTechitEasy. Designed by Sukrit Infotech.

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login below or Register Now.

    Lost password?

    Register Now!

    Already registered? Login.

    A password will be e-mailed to you.