wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Dos (Denial of service) Attack

profile
Moses D'souza
Aug 24, 2022
0 Likes
0 Discussions
80 Reads

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. In both instances, the DoS attack deprives legitimate users (i.e. employees, members, or account holders) of the service or resource they expected.
Victims of DoS attacks often target web servers of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations. Though DoS attacks do not typically result in the theft or loss of significant information or other assets, they can cost the victim a great deal of time and money to handle.
There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop. Popular flood attacks include:
•    Buffer overflow attacks – the most common DoS attack. The concept is to send more traffic to a network address than the programmers have built the system to handle. It includes the attacks listed below, in addition to others that are designed to exploit bugs specific to certain applications or networks
•    ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping every computer on the targeted network, instead of just one specific machine. The network is then triggered to amplify the traffic. This attack is also known as the smurf attack or ping of death.
•    SYN flood – sends a request to connect to a server, but never completes the handshake. Continues until all open ports are saturated with requests and none are available for legitimate users to connect to.

Other DoS attacks simply exploit vulnerabilities that cause the target system or service to crash. In these attacks, input is sent that takes advantage of bugs in the target that subsequently crash or severely destabilize the system, so that it can’t be accessed or used.
An additional type of DoS attack is the Distributed Denial of Service (DDoS) attack. A DDoS attack occurs when multiple systems orchestrate a synchronized DoS attack to a single target. The essential difference is that instead of being attacked from one location, the target is attacked from many locations at once. The distribution of hosts that defines a DDoS provide the attacker multiple advantages:
•    He can leverage the greater volume of machine to execute a seriously disruptive attack
•    The location of the attack is difficult to detect due to the random distribution of attacking systems (often worldwide)
•    It is more difficult to shut down multiple machines than one
•    The true attacking party is very difficult to identify, as they are disguised behind many (mostly compromised) systems
Modern security technologies have developed mechanisms to defend against most forms of DoS attacks, but due to the unique characteristics of DDoS, it is still regarded as an elevated threat and is of higher concern to organizations that fear being targeted by such an attack.


Comments ()


Sign in

Read Next

The Role of Teachers in Building a Child’s Confidence

Blog banner

MPL and how its effects?

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Deadlock and Starvation

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Dangers of Using Public WiFis

Blog banner

Supervised and unsupervised learning

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Electronic data interchange

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Memory Management

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

ADIDAS

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Deadlocks in Operating Systems

Blog banner

Social engineering in cyber security

Blog banner

Be you

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

DATA WRANGLING

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

John Titor: The Time Traveler

Blog banner

Deadlock

Blog banner

Uniprocessor Scheduling

Blog banner

Deadlock

Blog banner

Defining youtubr

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Senseless Teeths

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Hello World

Blog banner

What is Packet Filtering?

Blog banner

Cyber Laws In India and Around the World

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Spyware

Blog banner

Challenges and risks in service operations

Blog banner