DDoS Attacks


Analytical Approaches and Justification


Overview

  • Task: Use Shodan to detect at risk devices that are connected to the Internet
  • Value: Great source for detecting devices that connect to the internet with vulnerable systems
    • Typically, the vulnerable devices are targets for DDoS
    • Scanning of these vulnerable devices, organizations can gain an understanding of which devices need to be more secured
      • Typical vulnerabilities include: not password or firewall protected, not connected to a private network, or their port is open



Key Insights and Intelligence


Results

  • Effects of Attack:
    • Unsatisfied customers
    • Revenue decrease
    • Negative connotation of brand
  • DDoS Primary Targets:
    • Devices with open ports
    • Not protected by a firewall
    • No or weak password protection