Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Denial of Service Attack Case Study
Denial-of-Service (DoS) attack eassy
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Denial of Service Attack Case Study
Background
Located in Seattle Washington, the iPremier company is a web-based commerce company founded in 1996 by two students from Swarthmore College. Since its founding, iPremier has registered a success story in e-commerce selling vintage, luxury and rare goods over the internet. Customers use their credit cards to transact business online. With impressive sales and profit margins, iPremier is among the few companies who survived the 2000 technical stock recession (Austin, 2007).
Management at iPremier consists of young employees who were its pioneers and a number of experienced managers recruited over time. The company’s working atmosphere is dynamic with strong values of professionalism, discipline, commitment to results delivery and partnership for profits achievements (Austin, 2007). iPremier’s management orientation is on “do what it takes” to have projects done on schedule.
Being a web-based commerce company, iPremier had contracted Qdata to provide the majority of their computing equipment and internet connectivity (Austin, 2007). Qdata, though not a leading industry in information technology was selected due to its close proximity to iPremier’s company headquarters.
iPremier once suffered a denial of service attack on 12th January 2007 that almost rendered the company’s site nonfunctional (Austin, 2007). Denial of service attack can be defined simply as an attempt to prevent the availability of computer resources to its legitimate users (Encyclopedia Britannica). This is achieved through halting an internet site or service from working efficiently, temporarily or permanently. Hackers had launched the denial of service attack on iPremier but luckily it was launched either by a script-kiddie or a competitor trying to ...
... middle of paper ...
...sing disk space to enable high logging levels, and updating virus signature files and other security patches (Keri and Carol, 2010). The company also needs to come up with a well designed and documented recovery plan. Last, the Company needs to educate its staff about security and threats.
Works Cited
Mirkovic, J., Dietrich, S., Dittrich and Reiher, P (2005).Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall, New Jersey
Austin, Robert (2007). The iPremier Company (A): Denial of Service Attack. Harvard Business School, Boston, Massachusetts
Denial of service attack (DoS attack). (2010). In Encyclopedia Britannica. Retrieved from http://www.britannica.com/EBchecked/topic/1055468/denial-of-service-attack
Keri E. Pearlson and Carol S. Saunders (2010). Strategic Management of Information Systems, 4th Edition. John Wiley & Sons, New York
Saunders, C. S., & Pearlson, K. E. (2009). Managing and Using Information Systems. John Wiley&Sons, Incorporated.
Kotapati, K., Liu, P., Sun, Y., & LaPorta, T. F. (2005). A taxonomy of cyber attacks on 3G networks. In Intelligence and Security Informatics (pp. 631-633). Retrieved November 11, 2013 from http://nsrc.cse.psu.edu/tech_report/NAS-TR-0021-2005.pdf
...a flood of packets. Therefore, the victim node or sometimes the whole network can get easily paralyzed [24].
Murdoch, S. J., & Roberts, H. (2013). Internet Censorship and Control [Guest editors' introduction]. IEEE Internet Computing, 17(3), 6-9. doi:10.1109/MIC.2013.5
The Aim Higher College’s system administrators and network engineers have described seeing some strange behaviors such as high levels of traffic from many hosts that are causing system outages. The web servers of the college have been shutting down frequently by this traffic, it must be from a hacker group trying to attack the school with malicious software. I will review the network traffic from the college’s intrusion detection system and use an intrusion prevention system to block off these threats from the hackers.
The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Bruce Sterling is a book that focuses on the events that occurred on and led up to the AT&T long-distance telephone switching system crashing on January 15, 1990. Not only was this event rare and unheard of it took place in a time when few people knew what was exactly going on and how to fix the problem. There were a lot of controversies about the events that led up to this event and the events that followed because not only did it happen on Martin Luther King Day, but few knew what the situation truly entailed. There was fear, skepticism, disbelief and worry surrounding the people that were involved and all of the issues that it incorporated. After these events took place the police began to crackdown on the law enforcement on hackers and other computer based law breakers. The story of the Hacker Crackdown is technological, sub cultural, criminal, and legal. There were many raids that took place and it became a symbolic debate between fighting serious computer crime and protecting the civil liberties of those involved.
Network modification is one of the action to be considered when DDoS attack occurs. In this situation incident response team could switch to different network by using domain name system (DNS). IP address are translated through DNS by their domain name and DNS and DNS responsibility is to allow the user to securely browse into any websites. Also, DNS allows to send and receive emails through any web browsers in any website. Incident team should distribute the attack traffic across the network of data center so it will delay the DDoS attack in spreading into other networks. At last, traffic should be sent to high capacity networks so it can go through scrubbing services.
Simpson, G. R., & Simons, J. (1998, October 8). The dotted line: A little Internet firm got a big monopoly. The Wall Street Journal, pp. A1.
The Denial of Service attack (DoS), in this attack, the attacker does not actually access the system, but rather simply blocks access from legitimate users. In the words of the CERT (Computer Emergency Response Team) Coordination Center (the first computer security incident response team), “A ‘Denial-of-Service’ attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service” (CERT, 2003). One often-used blocking method is flooding the targeted system with so many false connection requests that it cannot respond to legitimate requests. DoS is an extremely common attack method, second only to malware. (Easttom, 2014)
Many nations in the world - the United States, China, Russia, Iran, Germany, and more- use cyber warfare as a method of conducting sabotage and espionage. Nations, such as China and Russia, use espionage in order to prevent their economy and their military technology from falling behind by stealing advanced nations’ technology. Other nations, including Israel and Iran, focus on sabotaging other nations to cripple them, by sending malwares that destroy important data on the system, from advancing their technology and costing them a decent amount of money due to repairs. Another popular cyber attack used, mainly with hacktivist, government- sympathetic groups not owned by the government, and nations less advanced in technology, is Denial-of-service, or DoS. DoS is used to hinder the target’s website and other things that are maintained by computers by making it unavailable to intended users. People argue there are no benefits for cyber warfare due to its potential destructive powers and instant process of destruction. While other people-looking from a different view find that cyber warfare does have its benefits. They argue that an important benefit is that cyber warfare takes place in cyber space meaning that it does not physically harm people. They also argue that cyber warfare draws the awareness of the nation on the ever increasing dangers of cyber warfare and forces the government to set up stronger cyber security to fend off international attacks, which also help protect the government from internal hackers. It also creates more jobs for hackers, who use their knowledge to increase the security instead of harm it. Although cyber warfare produces damaging effects on a nation, in the long run, it crea...
Laudon, K. C. and Laudon, J. P. (2013). Part II: Information Technology Infrastructure. In Essentials of Management Information Systems (10TH ed., pp. 372-373, 402-403). Prentice Hall
August, Oliver. "The Great Firewall: China's Misguided — and Futile — Attempt to Control What Happens Online." Wired.com. Conde Nast Digital, 23 Oct. 2007. Web. 22 Nov. 2013.
Mehdi Khosrow-Pour, D.B.A. 2006, Cases on information technology : lessons learned,Vol 7, Hershey, Pa. : Idea Group.
attempt to force a network offline and unavailable to its intended users. This process is typically performed by flooding a network with communication requests until the server cannot respond to the traffic, thus making the server go offline and become available. This process is relatively simple to perform to the average person through online programs. Since it is so easy perform, it has become a rising issue simply because anyone has the ability to hack into various servers. One example in recent news of DDoS attacks comes from Riot Games, developer of the popular online multiplayer video game League of Legends. After a month of inconsistency with their server stability and frequent shut downs, Riot Games reported that within the l...
The internet offers high speed connectivity between countries, which allows criminals to commit cybercrimes from anywhere in the world. Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). This lack of security enables hacker...