Preview

Dos Attack Executive Summary

Better Essays
Open Document
Open Document
885 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dos Attack Executive Summary
21 Nov 2011
Hacking
Defense Against Denial of Service (DoS) Attacks
P a g e | 1
B. Executive Summary: Measures to counter University Distributed
Denial of Service (DDoS) attack.
A DDoS attack against the Universities Registration System Server (RSS) by infected computers (Bots) located in the University Computer Labs (see diagram) resulted in shutting down access to the RSS system. Orchestrated and controlled by a central controller these Bots established web connections (HTTP protocol) to the RSS using up all available bandwidth. Doing so prevented other users from accessing the Web site/server for legitimate traffic during the attack. This is considered a Consumption of
Resources attack using up all the resources of RSS bandwidth.
…show more content…
HBSS allows the management of local computer firewall configurations to identify and possibly shut down infected computers during an attack. The use of AD, SCCM, and
HBSS combine to reduce the likelihood of an attack and provide valuable information during the attack and post-attack phases.
Countermeasures to internal network DDoS attacks consist of detection, neutralization, prevention of additional attacks, deflection, and post-attack forensics. In the current network design an IDPS can alert network administrators of potential problem detection and block signature based (known) attacks to help in the mitigation process. Use of HBSS and Network IDPS allows administrators to shut down services during an attack to neutralize attacks. The capture of Traffic Patterns stored during
DDoS attacks can be used for forensic analyzes post-attack. Load Balancing increases incoming traffic levels during peak hours of operations and during DDoS attacks.
Proper configuration of load balancing of network devices, services, and servers will reduce effects of a DDoS attack. (Householder, A., Manion, A., Pesante, L., Weaver,
…show more content…
Identifying Bot computers as quickly as possible and removing them from the network is an effective response to DDoS attacks. Once removed from the network the
Bot application can be removed from the computer. If removal is not possible or effective a baseline installation of the Operating System is required. With the use of In-
Depth Defense and Countermeasures DDoS damage can be significantly reduced.
Defensive steps include; user account best practices, effective application patching process, current virus definitions usage, properly configured host-based firewall rules, active network scans for anomalies by IDPS are effective tools against DDoS.
Identifying, shutting down, and preventing additional outbreaks of infected computers best practices must be documented. Education of Users and IT staff helps to reduce the root causes of DDoS attacks by reducing Bots infections. Tools such as AD, SCCM, and
IDS used properly can help detect and formulate an effect defense against these attacks.
In-Depth Defense and Countermeasures used together to formulate an effect process when dealing with DDoS attacks.
21 Nov 2011
Hacking
Defense Against Denial of Service (DoS) Attacks
P a g e |

You May Also Find These Documents Helpful

  • Better Essays

    State the organisational procedures developed to report and rectify inappropriate information and unsuitable resources and how they are implemented.…

    • 1528 Words
    • 7 Pages
    Better Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Better Essays

    References: Torkzadeh, G. (1988, Fall). The Quality of User Documentation. Journal of Managment Information Systems, 5(2), 99-108.…

    • 1171 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The iPremier and Denial of Service Attack case study is a made up case from the Harvard Business School. This case shows clearly how companies may not be taking their security seriously and after several high profile hacking stories, we can see that is the truth. The background of the case is that iPremier, a high end online store, suffered a DOS attack during the night. Those in charge of operations attempted to find the cause of the attack but were met with resistance from their collocation facility. Once granted access and after almost the entire company’s senior management team was involved, the attack stopped. There was no rhyme or reason as to how or why but it stopped and business was back to normal on the site.…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Forensics Case Summary

    • 2064 Words
    • 9 Pages

    employees should be aware of them, so that quality levels could be analyzed as part…

    • 2064 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Staff Hand Book Report

    • 1026 Words
    • 5 Pages

    *To provide information on work practices and procedure (see practice and procedures guide), hHhhhHHHHealth and Safety at work. This information will contain what to do in case of an emergency, how to seek first aid, any changes that might harm or affect health and safety in the work place, what has been put into practice to protect health and safety.…

    • 1026 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    The Stuxnet Virus

    • 1719 Words
    • 7 Pages

    4. Masters, J. (2011, May 23). Confronting the cyber threat. Council on Foreign Relations Website. Retrieved August 3rd 2011, from:…

    • 1719 Words
    • 7 Pages
    Better Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    This report about the five most significant security breaches of the past six months ago.…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Itil Version 3 Paper

    • 11361 Words
    • 46 Pages

    Good practices: Practices that are widely used in industry by companies getting good results p g gg Reasons to adopt good practice:…

    • 11361 Words
    • 46 Pages
    Good Essays
  • Good Essays

    CyberSecurity

    • 754 Words
    • 3 Pages

    DDoS works by a cracker sending the command to initiate the attack to his zombie army. Each computer within the army sends an electronic connection request to an innocent computer called a reflector. When the reflector receives the request, it looks like it originates not from the zombies, but from the ultimate victim of the attack. The reflectors send information to the victim system, and eventually the system's performance suffers or it shuts down completely as it is inundated with multiple unsolicited responses from several computers at once. From the perspective of the victim, it looks like the reflectors attacked the system. From the perspective of the reflectors, it seems like the victimized system requested the packets. The zombie computers remain hidden, and even more out of sight is the cracker himself.…

    • 754 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In real world scenario, a Denial-of-Service attack DoS attack) or Distributed Denial-of-Service attack (DDoS attack) is an effort to make a machine or network resource unavailable to its genuine users. Although the means to carry out, motives for, and objective of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or eliminate services of a host connected to the internet. One common method of attack involves saturating the target machine with outside communications requests, so much so that it cannot respond to legitimate traffic or responds so lowly as to be rendered essentially unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are carried out by either…

    • 286 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Dos Attack Case Study

    • 749 Words
    • 3 Pages

    As a result of the DoS attack earlier this morning, it is important to assess and address the upcoming actions of our company with regard to customers, procedures, security, and partners. Below I have summarized my suggestions on how to handle these issues and what needs to be done to prevent another attack from reoccurring.…

    • 749 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Raymind, A. (2011, January 19). Bit-defender 's 2011E-Threat Predictions Spotlight DDoS Protests, Rogue Applications, Social Network Plug Ins, and Mobile Malware. World Market Media. Retrieved January 22, 2011, from World Market Media Web site: http:/ / worldmarketmedia.com…

    • 2198 Words
    • 9 Pages
    Best Essays
  • Best Essays

    Cyberterrorism

    • 3167 Words
    • 13 Pages

    Blau, J. (2004, November 29). The Battle Against Cyberterror. Retrieved November 2012, from Network World: http://www.networkworld.com/supp/2004/cybercrime/112904terror.html…

    • 3167 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    Inventory

    • 649 Words
    • 3 Pages

    Recommend steps required to successfully install the new system and assist in assembling setup information and accounting data used in the implementation process.…

    • 649 Words
    • 3 Pages
    Satisfactory Essays