Malware-Driven DoS, SYN Flood, Reflection & Botnet Mechanics Explained

 31 min video

 2 min read

YouTube video ID: zbU-mYqHbSg

Source: YouTube video by NPTEL-NOC IITMWatch original video

PDF

Malware such as viruses and worms can copy themselves to other applications and computers, delete files silently, generate network traffic without the user’s knowledge, harvest passwords via keyloggers, and encrypt data before deleting the original files. These actions can occur entirely in the background, making the victim unaware of the ongoing damage. Because the malicious program can also produce traffic, it can be a source of denial‑of‑service (DoS) or distributed denial‑of‑service (DDoS) attacks.

Denial of Service and Distributed Denial of Service

DoS and DDoS attacks target the “availability” pillar of security by overwhelming a server’s bandwidth or processing capacity. Infected machines, or bots, send a flood of packets that exceed the server’s limits, preventing legitimate users from accessing the service. The traffic is generated by malware under external control, so the victim’s computer may never see the attack originate from it.

SYN Flood Attack

A SYN flood exploits the TCP three‑way handshake (SYN, SYN‑ACK, ACK). When a SYN packet arrives, the server allocates a Transmission Control Block (TCB) – typically 250 to 1,000 bytes – to store the connection’s IP address and port. The attacker sends many SYN packets but never completes the handshake with the final ACK, causing the server to fill its TCB pool (e.g., 1,000 entries). Once the memory is exhausted, the server cannot accept new legitimate connections, resulting in a denial of service. This can be achieved with a single machine that can generate enough SYN packets.

Reflection and Amplification Attacks

In reflection attacks, malware sends spoofed requests to intermediate servers such as DNS or NTP, using the victim’s IP address as the source. Those servers, unaware of the spoofing, reply directly to the victim, reflecting the traffic. Amplification occurs when the reply is much larger than the request; for example, a 100‑byte request can trigger a 1,000‑byte response. This magnifies the attack volume while hiding the attacker’s identity and reducing the bandwidth each compromised host must provide.

Botnets and Command‑and‑Control

A botnet is a network of automated programs (bots) coordinated to perform malicious activities. While a bot itself is merely an automated task runner, a botnet can launch DDoS attacks, send spam, or steal data under the direction of a botmaster. Coordination is achieved through a Command‑and‑Control (C&C) infrastructure, which may be centralized (client‑server model) or distributed via peer‑to‑peer propagation. Robust C&C must handle churn—bots going offline or rebooting—and keep reaction time minimal. Common communication protocols include IRC and HTTP/Web traffic.

  Takeaways

  • Malware can silently copy itself, delete files, generate traffic, harvest passwords, and encrypt data without the user’s awareness.
  • DoS and DDoS attacks overwhelm a server’s bandwidth or processing capacity, targeting the availability aspect of security.
  • A SYN flood exhausts a server’s memory by filling its Transmission Control Block pool with incomplete TCP handshakes.
  • Reflection attacks spoof the victim’s IP to intermediate servers, while amplification multiplies the response size, hiding the attacker’s source.
  • Botnets use centralized or peer‑to‑peer command‑and‑control infrastructures, often communicating via IRC or HTTP, to coordinate large‑scale malicious actions.

Frequently Asked Questions

How does a SYN flood exhaust a server’s memory?

A SYN flood sends many TCP SYN packets without completing the handshake, causing the server to allocate a Transmission Control Block for each request. Each TCB consumes 250‑1000 bytes of memory, and when the server’s TCB limit (e.g., 1,000 entries) is reached, no new connections can be accepted, resulting in a denial of service.

What distinguishes reflection from amplification attacks?

Reflection attacks involve sending spoofed requests to intermediate servers that reply to the victim’s IP, redirecting traffic toward the target. Amplification adds a size increase, where a small request (e.g., 100 bytes) triggers a much larger response (e.g., 1,000 bytes), magnifying the attack’s impact while obscuring the attacker’s origin.

Who is NPTEL-NOC IITM on YouTube?

NPTEL-NOC IITM is a YouTube channel that publishes videos on a range of topics. Browse more summaries from this channel below.

Does this page include the full transcript of the video?

Yes, the full transcript for this video is available on this page. Click 'Show transcript' in the sidebar to read it.

Helpful resources related to this video

If you want to practice or explore the concepts discussed in the video, these commonly used tools may help.

Links may be affiliate links. We only include resources that are genuinely relevant to the topic.

PDF