Detecting and Mitigating DoS or Distributed DoS Attacks

2566 Words6 Pages

Introduction

Denial of service (DoS) and distributed DoS (DDoS) attack is a means to take control of a computer terminal or network resources to disrupt communications of a computer host with a connection to the Internet. A DDoS is an attack sent by more than two computer hosts or a coopted zombie computers in a botnet and DoS is an attack by one computer host. Either attack will flood an online computer or network with of incoming messages to overwhelm the targeted system thus denying service to the internet or communication with authorized users (US-CERT, 2013).

Often DDoS attacks are employed by a overloading an internet service by using up bandwidth on the application-layer and cause services to cease service by inundation of packet to the data base with application calls (US-CERT, 2013). Also an attack can be accomplished by resource flooding where an attacker(s) consumes a target network or computer resources. CPU, hard disk to degrade the equipment communication to put it in a state unavailable for legitimate users. This means of resource flooding can place into two types, malformed packet attack or a Protocol exploit attack (Keromytis et al., n.d).

Keep in mind a DoS or DDoS attack often has many victims in both the unaware compromised systems and the target network both suffer severely degraded services. It is important to note that network server requires a minimal amount of network bandwidth to function that is often disrupted and denied during DoS or DDoS activity (UMUC, 2013).

History documents the first DoS-style attack was executed by a 15 year boy aka “mafiaboy.” In February 7, 2000, the Canadian youth carried out a series of DoS attacks toward Amazon.com and eBay.com. His attacks brought a great percentage ...

... middle of paper ...

...MUC (2013) Interactive Case Study Module 4.Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640.

US-CERT (2013) Security Tip (ST04-015) Understanding Denial-of-Service Attacks. Retrieved from http://www.us-cert.gov/ncas/tips/ST04-015

Zade A,Patil S & Salunke D (2011) A Novel Technique for Detection and Prevention of Distributed Denial of Service Attack. Advances in Computational Sciences and Technology. ISSN 0973-6107 Volume 4 Number 2 (2011) pp. 221-225. Retrieved from http://www.ripublication.com/acst.htm

Wang X, Chellappan S, Boyer P & Xuan D (2006)On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. IEEE transactions on Parallel and Distributed systems, vol. 17, no. 7, July 2006. Retrieved from http://www.computer.org.ezproxy.umuc.edu/csdl/trans/td/2006/07/l0619.pdf

More about Detecting and Mitigating DoS or Distributed DoS Attacks

Open Document