What is a denial of service attack

Assignment Help Computer Engineering
Reference no: EM133240069

Question 1. What is a denial of service attack? A Denial-of-Service (DoS) attack is an attack that shut down a machine or network, making it not accessible to its intended users. Victims of DoS attacks often target web servers of high-profile organizations such as media companies, commerce, banking, or government and trade organizations.

Question 2. How easy is to launch a Dos attack?

Attackers use different methods to attack such as the Ping of death attack where the ping command is usually used to test the availability of a network resource. It works by sending the small number of data packets to the network resource and takes advantage of this and sends data packets above the maximum limit (65,536 bytes) that TCP/IP allows. TCP/IP fragmentation breaks the packets into small chunks that are sent to the server. Since the sent data packages are larger than what the server can handle, the server can freeze, reboot, or crash. Smurf another type of attack usages large amounts of ICMP ping traffic target at an Internet Broadcast Address. When the reply IP address is spoofed, All the replies are sent to the victim instead of the IP used for the pings. Since a single Internet Broadcast Address can support a maximum of 255 hosts, a Smurf attack amplifies a single ping 255 times that make the effect of slowing down the network to a point where it is impossible to use it. In addition, Buffer overflow also uses by attackers where the buffer is a temporary storage location in RAM that is used to hold data, and the CPU can manipulate it before writing it back to the disk. Buffers have a size limit. This type of attack loads the buffer with more data than it can hold. This response causes the buffer to overflow and corrupt the data it holds. An attack is a short form for Synchronize. This type of attack takes advantage of the three-way handshake to set up communication using TCP. SYN attack works by flooding the victim with incomplete SYN messages. This response causes the victim machine to allocate memory resources that are never used and deny access to legitimate users.

Question 3. What is a Distributed Denial of Service attack? A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. A DDoS attack uses more than one unique IP address or machine, often from thousands of hosts infected with malware.

Question 4. Difference between DDoS and Intrusion? Distributed denial of service (DDoS) attacks use intermediary computers, called agents, to launch the attack from multiple locations. A program called a zombie is surreptitiously installed by the hacker on these agent computers, which can be anywhere on the Internet. The hacker activates the zombies to simultaneously attack, leaving the true origin of the attack obscured. Even if your network is not the target of a DoS attack, if you don't take strong security precautions, you could find that your computers are being used as the zombies in a DDoS attack. Intrusion attacks are when an attacker enters your network to read, damage, and/or steal your data. These attacks can divide into two subcategories: pre-intrusion activities and intrusions.

Question 5. Does the fact that DDos attack happened to mean that an intrusion has also definitely happened? No, but in some cases, DDoS attacks happen after an intrusion attack has occurred. DDoS attacks typically require four components: an attacker, master hosts, zombie hosts, and a victim host. Using exploits in a remote system, an attacker installs the attack program that can be remotely controlled by the master host. When the attack begins, it usually falls into one of two classes: bandwidth depletion and resource depletion. Attackers can perform these attacks directly or through reflection. Reflection makes it more difficult to track down the source of the problem and offers a greater challenge to DDoS handling systems by bouncing packets off other hosts. The first line of defense against DDoS attacks is intrusion prevention. Rate-limiting filters are commonly used for preventing DDoS attacks. The reason why intrusion prevention and intrusion detection are unlikely to solve all kinds of DDoS attacks is that it is often difficult to tell the two kinds of traffic apart. Although some DDoS traffic can be easily distinguished from legitimate traffic, this fact is not true in the general case.

Question 6. How common are DDos attacks? A distributed denial of service attack, also known as a DDoS attack, uses multiple systems to flood a server with irrelevant requests the scale of DDoS attacks has continued to rise over recent years, by 2016 exceeding a terabit per second. Some common examples of DDoS attacks are UDP flooding, SYN flooding, and DNS amplification.

Reference no: EM133240069

Questions Cloud

Implementation of cloud computing services : How to create a business case exploring the implementation of the cloud computing services or other required changes.
Research methods in health and human performance : Research Methods in Health and Human Performance - Give personal thoughts on how benficial this study was and what would you do if you were given the task
Do you consider the article from this website : With the support of credibility criterions, do you consider the article from this website as a credible source of information?
Enterprise risk management-integrated framework : The Enterprise Risk Management-Integrated Framework of the Committee of Pponsoring Organizations (COSO) is best defined as a:
What is a denial of service attack : CSEC 340 DePaul University What is a denial of service attack? A Denial-of-Service (DoS) attack is an attack that shut down a machine or network
What drove this wave of mergers and acquisition : 1) Critical analyse what drove this wave of mergers and acquisition? Concentrate on synergies (both operational and financial), tax issues, research costs, mark
Write current television commercial for a particular product : Write a description (about a paragraph or longer) of a current television commercial for a particular product.
Determine the price to charge for various lunch plates : The manager of High Times Restaurant wants to determine the price to charge for various lunch plates.
What is the process strategy and product strategy : What is the process strategy, Product strategy, compete, distribution, demand pattern and misalignment in Pizza hut case.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd