Honore With His Spouce IGA KUBUNTU! OWNER. BLOG SITE. This is My Child FUTURE COMPUTER TECHNOLOGY
blogger JavaScript Rocks.

Wednesday, 11 September 2013

DOS Attacks

DOS Attacks


                                                                                                              
Denial of service (DOS) attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols.

Types:
Teardrop attack is type of attack where fragmented packets are forged to overlap each other when the receiving host tries to reassemble them.

Ping of death type of DoS attack in which the attacker sends a ping request that is larger than 65,536 bytes, which is the maximum size that IP allows. While a ping larger than 65,536 bytes is too large to fit in one packet that can be transmitted, TCP/IP allows a packet to be fragmented, essentially splitting the packet into smaller segments that are eventually reassembled. Attacks took advantage of this flaw by fragmenting packets that when received would total more than the allowed number of bytes and would effectively cause a buffer overload on the operating system at the receiving end, crashing the system. Ping of death attacks are rare today as most operating systems have been fixed to prevent this type of attack from occurring.  

DDOS Attack: A distributed denial of service attack (DDoS) occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. This is the result of multiple compromised systems (for example a botnet) flooding the targeted system(s) with traffic. When a server is overloaded with connections, new connections can no longer be accepted.


Peer to Peer Attack Attackers have found a way to exploit a number of bugs in peer-to-peer servers to initiate DDoS attacks. Peer-to-peer attacks are different from regular botnet-based attacks. With peer-to-peer there is no botnet and the attacker does not have to communicate with the clients it subverts. Instead, the attacker acts as a "puppet master," instructing clients of large peer-to-peer file sharing hubs to disconnect from their peer-to-peer network and to connect to the victim's website instead. As a result, several thousand computers may aggressively try to connect to a target website. While peer-to-peer attacks are easy to identify with signatures, the large number of IP addresses that need to be blocked (often over 250,000 during the course of a large-scale attack) means that this type of attack can overwhelm mitigation defenses.


For all known DOS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks.

Related Posts:

  • DO YOU WANT TO BECOME SYSTEM ADMINISTRATOR??? Sys admins have a crucial work at hand, that of maintaining the security of the systems they have been entrusted with. As such they need to be extra careful while selecting the tools for managing the security scenario … Read More
  • WIRELESS NETWORK SECURITY Hackers are becoming more and more sophisticated each day and making use of some of the most thought-bred effective tools that guarantee complete attack and kill! While everyone can't be a tech-buff so as to know all a… Read More
  • FACE RECOGNITION PASSWORD STEP BY STEP Are you still using the traditional way of typing your password to login into your computer, Then you should read this post, Here in this post we will be showing you how you can enable facial recognition on your compu… Read More
  • SOFTWARE FOR THOSE WHO USING NANOTECHNOLOGY Nanotechnology research includes a lot of tools that people don't know of. While many of the tools are paid and commercially available tools, there are also those that can be downloaded freely. Being one of the premier … Read More
  • INTERNET DOWNLOAD MANAGER NEW ORIGINAL FOREVER STEP 1 : DOWLOAD INTERNET DOWNLOAD MANAGER 6.17                              Dowload idm6.17(30-day trial version.) (note) STEP 2 : INSTALL … Read More

0 comments:

Post a Comment