Preview

DDoS Attack

Good Essays
Open Document
Open Document
270 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
DDoS Attack
A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.

In a typical DDoS attack, the assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master, also known as the botmaster, identifies and identifies and infects other vulnerable systems with malware. Eventually, the assailant instructs the controlled machines to launch an attack against a specified target.

There are two types of DDoS attacks: a network-centric attack which overloads a service by using up bandwidth and an application-layer attack which overloads a service or database with application calls. The inundation of packets to the target causes a denial of service. While the media tends to focus on the target of a DDoS attack as the victim, in reality there are many victims in a DDoS attack -- the final target and as well the systems controlled by the intruder. Although the owners of co-opted computers are typically unaware that their computers have been compromised, they are nevertheless likely to suffer a degradation of service and not work well.

A computer under the control of an intruder is known as a zombie or bot. A group of co-opted computers is known as a botnet or a zombie army. Both Kaspersky Labs and Symantec have identified botnets -- not spam, viruses, or worms -- as the biggest threat to Internet

You May Also Find These Documents Helpful

  • Good Essays

    Argyro Karanasiou Summary

    • 368 Words
    • 2 Pages

    What Argyro Karanasiou mentioned in her writing is difficult to understand and put it into words for the laymen when it comes to actual technical terms. In basic language, what Argyro is talking about is how a group of hackers can justify using a certain cyber-attack that will either slow websites to a very slow speeds or to a point that they are inaccessible to anyone other than an operator. That these attacks that the groups use is a form of “protest”, but because these attacks puts stress on hardware, the hardware that stores many information might be destroyed because of the strain that these attacks cause on the hardware. Due to this, many government officials consider this not a form of protest, but an attack.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The complete protection of the campus infrastructure from a (D)DoS is futile however, there are measures that can be put into place which will significantly reduce the risk of an outage due to a (D)DoS. Standardizing policies and procedures, segmenting the network into functional areas, active monitoring, and a defense in depth approach will reduce the duration and severity of any future (D)DoS attack.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Better Essays

    root causes of DDoS attacks by reducing Bots infections. Tools such as AD, SCCM, and…

    • 885 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Final Exam Review

    • 1475 Words
    • 6 Pages

    A DDoS stands for one of the common forms of viruses, that attacks multiple computers to flood a website until it slows or crashes. What does DDoS stand for?…

    • 1475 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Itp 1101 Research Paper

    • 2125 Words
    • 9 Pages

    This paper provides a general overview of denial-of-service attacks in which the primary goal of the attack is to remove or limit the victim’s access to a particular service or resource. The paper also provides an overview of on methods of attack and its impacts. It also includes information that may assist you on how to respond to such an attack.…

    • 2125 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 4 Questions IS3110

    • 398 Words
    • 1 Page

    DoS/DDoS attack from the WAN/Internet: buy more bandwidth, denial of service, and good load balancing.…

    • 398 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    To begin one of the most basic types of possible threats can come from what is called an IP sweep. What an IP sweep basically is a broad area ping that allows the user to determine what hosts if any exist on a network given a certain IP address range. A normal ping consists of a single hello message from one computer to the receiving computer. A ping sweep pings any and all computer to determine which are alive so that the attacker can figure out where he can attack the network.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cool Paper

    • 781 Words
    • 4 Pages

    Attackers can now use hundreds or thousands of computers in an attack against a single computer or network, making it impossible to stop an attack by identifying and blocking the source. True or false?…

    • 781 Words
    • 4 Pages
    Better Essays
  • Best Essays

    Individual Assignment 1

    • 2342 Words
    • 10 Pages

    Kuppusamy, K. K., & Malathi, S. S. (2012). Prevention of Attacks under DDoS Using Target Customer Behavior. International Journal Of Computer Science Issues (IJCSI), 9(5), 301-307.…

    • 2342 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Why Warfare Is Wrong

    • 764 Words
    • 4 Pages

    The internet is a vast zone where the impossible transforms into the possible. Few can manipulate the internet and use it to cause harm. On August 15, 2012, the world witnessed the largest internet attack on Saudi Aramco, one of the world's largest oil companies. The attack caused "35,000 computers to be wiped or totally destroyed and every office was physically unplugged from the Internet to prevent the virus from spreading further" (Plagiary). The attack caused the entire company, that supplies 10% of the world's oil supplies, to shut down. Multiple companies in Saudi Arabia got denied oil. The effects of the attack fell instantly as shortages of oil, caused riots that injured thousands in the Middle East. The individuals who carried out the attack on Saudi Aramco didn't have to pick up a weapon or annihilate them with bombs to cause a huge blow to the company or to harm those estimated 1,100 souls that who were critically injured in the…

    • 764 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Valentines Day Party Ideas

    • 1087 Words
    • 5 Pages

    Ideas for a great Valentine's Day dance or party for teenagers, including themes, party favors, Valentine decor, food, & activities for your special event.…

    • 1087 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Hacked

    • 640 Words
    • 3 Pages

    List of Gov.My site suspected of Distributed Denial of Service Attacks-DDOS/Servers Shut Off by Gov. (In no particular order) :…

    • 640 Words
    • 3 Pages
    Satisfactory Essays