Preview

Types of Network Attacks

Satisfactory Essays
Open Document
Open Document
339 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Types of Network Attacks
Denial-of-Service (DoS) : A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers make DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows:

* Saturate network resources. * Disrupt connections between two computers, thereby preventing communications between services. * Disrupt services to a specific computer.

Man-in-the-middle : Man-in-the-middle attacks occur when an attacker successfully inserts an intermediary software or program between two communicating hosts. The intermediary software or program allows attackers to listen to and modify the communication packets passing between the two hosts. The software intercepts the communication packets and then sends the information to the receiving host. The receiving host responds to the software, presuming it to be the legitimate client.

Replay Attack : A replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network. In an attempt to obtain an authenticated connection, the attackers then resend the captured packet to the system. In this type of attack, the attacker does not know the actual password, but can simply replay the captured packet.

Distributed Denial of Service (DDOS) : In the distributed denial of service (DDOS) attack, an attacker uses multiple computers throughout the network that it has previously infected. Such computers act as zombies and work together to send out bogus messages, thereby increasing the amount of phony traffic. The major advantages to an attacker of using a distributed denial-of-service attack are that multiple machines can generate more attack traffic than one machine, multiple attack machines are harder to turn off than one attack

You May Also Find These Documents Helpful

  • Powerful Essays

    In a data modification attack, an unauthorized party on the network intercepts data in transit and changes parts of that data before retransmitting it.…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    The content is static and therefore does not change depending on who or when requests the content, making a replay attack effective since the content shouldn’t be expected to change.…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Experiencing problems with the web site is the most prominent signs that a database, attack that can occur. The attack on a computer hosts are often zombie computers with broadband connections to the internet threat have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and direct the attack, often through a botnet/dosnet. Launching a DoS attack can have a negative impact on the business of an organization. The result of the attacker can lead to a loss of reputation along with economic losses. A successful DoS (Denial of Service) attack can disable computers and subsequently, an entire network. An attack launched by a moderately configured system can crash PCs that are of high value. The following steps should be followed when conducting a DoS penetration test: 1) Test heavy loads on the sever; 2) Check for systems and devices vulnerable…

    • 392 Words
    • 2 Pages
    Good Essays
  • Better Essays

    This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The complete protection of the campus infrastructure from a (D)DoS is futile however, there are measures that can be put into place which will significantly reduce the risk of an outage due to a (D)DoS. Standardizing policies and procedures, segmenting the network into functional areas, active monitoring, and a defense in depth approach will reduce the duration and severity of any future (D)DoS attack.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Better Essays

    root causes of DDoS attacks by reducing Bots infections. Tools such as AD, SCCM, and…

    • 885 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Final Exam Review

    • 1475 Words
    • 6 Pages

    A DDoS stands for one of the common forms of viruses, that attacks multiple computers to flood a website until it slows or crashes. What does DDoS stand for?…

    • 1475 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Denial of services is an attack on networks that are intended at making computer or particular service on a computer unavailable.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Itp 1101 Research Paper

    • 2125 Words
    • 9 Pages

    "Denial-of-service" attacks are commonly characterized by an explicit attempt by hackers to prevent legitimate users of a service or resource from using them. It is also an effort to make one or more computer systems unavailable. It is typically targeted at web servers, but it can also be used on mail servers, name servers, and any other type of computer system. Denial of service (DoS) attacks may be started from a single machine, but they typically use many computers to carry out an attack. Since most servers have firewalls and other security software installed, it is easy to lock out individual systems. Therefore, distributed denial of service (DDoS) attacks are often used to coordinate multiple systems in a simultaneous attack. A distributed denial of service attack tells all coordinated systems to send a continuous stream of requests to a specific server all at the same time. These requests may be a simple ping or a more complex series of packets. If the server cannot respond to the large number of simultaneous requests, incoming requests will eventually become queued. This backlog of requests may result in a slow response time or a no response at all. When the server is unable to respond to legitimate requests, the denial of service attack has succeeded.…

    • 2125 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 4 Questions IS3110

    • 398 Words
    • 1 Page

    DoS/DDoS attack from the WAN/Internet: buy more bandwidth, denial of service, and good load balancing.…

    • 398 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Class this concept of overloading the system can, however, be used by nefarious individuals to deny service to companies. Has anyone ever experienced a denial of service attack? Have you ever heard of Botnets?…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    This technique involves identifying the source of the computers and their I.P. Addresses for which the hacker would like to compromise.…

    • 916 Words
    • 4 Pages
    Good Essays