StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Denial of Service Attack - Essay Example

Cite this document
Summary
The author of the paper "Denial of Service Attack" argues in a well-organized manner that in most cases, denial of service attacks is usually by one system or person. It is crucial to note that 2014 estimates show that the number of denial-of-service attacks has reached 28 per hour (Yu, 2014)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Denial of Service Attack
Read Text Preview

Extract of sample "Denial of Service Attack"

 Denial of service attacks is common in businesses and organizational websites. Perpetrators of these attacks target services or sites that are hosted by high-profile servers. These include credit card payment systems, banks, and root name servers. The article on denial of service attacks that will be used is Dave Neal’s “Denial of Service Attacks Exploits White House Press Machine”. This article was published in The Inquirer on November 12, 2014.

According to this article, attackers used the White House press release machine as a way of gaining network trust. The White House made this discovery when it updated its internet report with a caution that attackers are exploiting the facility’s press release machine. These attackers are using content emanating from the White House to gain network trust. They are using DNS reflection attacks to exploit the press machine. Attackers who target the network at the White House are designing large DNS text records to increase amplification and magnify their attacks. These attackers create their text records to amplify the responses as required (Neal, 2014). This helps them to direct traffic to targeted sites. The targeted traffic, which is amplified overwhelms the targeted site and makes it unable to respond to requests. In this case, the attacks saturate the target network or machine with amplified external communication requests. These requests come in large numbers to prevent the machine from responding to legitimate traffic. They also cause the network or machine to respond slowly to legitimate traffic. Denial of service attacks eventually leads to server overload. This technique is effective because the text records can achieve the largest possible response. The attacks that were observed lasted for 5 hours and created a bandwidth load that peaked at 4.3Gbps (Neal, 2014). The text record technique has been extensively used to target entertainment websites, particularly video game websites. In other cases, the attacks may force a targeted computer to consume its resources or reset. As a result, the targeted computer is unable to provide its intended services. This also obstructs the communication media between the victim and the intended user so that they no longer communicate effectively.  

Conclusion

A denial of service attack is used to make a network resource or machine unavailable to its intended users. These attacks comprise attempts to indefinitely or temporarily suspend or interrupt a host of services connected to the internet. According to Neal (2014), attackers are amplifying content from the White House and using the content to attack other networks. The targeted network, computer, or website is overwhelmed with incoming traffic to the extent that it cannot provide its intended service to users.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Denial Of Service Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Denial Of Service Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1666198-denial-of-service
(Denial Of Service Essay Example | Topics and Well Written Essays - 500 Words)
Denial Of Service Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1666198-denial-of-service.
“Denial Of Service Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1666198-denial-of-service.
  • Cited: 0 times

CHECK THESE SAMPLES OF Denial of Service Attack

Denial-of-service Attacks

This act by the attacker is a denial-of-service attack as it prevents people from accessing the website.... Denial-of-attack refers to a situation created by an attacker with an aim to stop or make it difficult for the legitimate users from accessing the information they require or using services offered online (Komar et.... This essay "Denial-of-service Attacks" aims to analyze the causes, effects, and reasons behind denial-of-service attacks....
6 Pages (1500 words) Essay

Introduction to Network Security

Malicious code could result in serious data loss, downtimes, and it could also trigger a Denial of Service Attack besides triggering many other problems.... The paper "Introduction to Network Security" states that networks from the time of their birth have come a long way.... Initially, they were only used in large firms and businesses....
9 Pages (2250 words) Research Paper

Denial of service attacks (DoS)

Denial of Service Attacks (DoSs) By Student Date Table of Contents Introduction Denial of Service Attack or simply DoS can be defined in many ways.... This sort of attacks (Denial of Service Attack) may target users in an attempt to stop them from creating links on the network.... Moreover, Denial of Service Attack is straightforward in accomplishment as compared to gaining managerial access to a specific system from distant location.... However, we can discuss modes of attack in following terms: Attacks due to Buffer Overflow Buffer Overflow is one of the most common types of Denial of Service Attack....
5 Pages (1250 words) Essay

Information Security

According to the National Institute of Standards and Technology (NIST), major threats include Denial of Service Attack, malicious code, and virus attack.... When 21% small businesses indicated a Denial of Service Attack, 20% firms pointed that there system had been made into bots (NIST).... describe, a Denial of Service Attack (DOS attack) or distributed Denial of Service Attack (DDOS attack) is an attempt by hackers to cut the availability of a network resource to its intended users....
3 Pages (750 words) Research Proposal

Denial of Service Attacks (DoSs)

This sort of attacks (Denial of Service Attack) may target users in an attempt to stop them from creating links on the network.... Moreover, Denial of Service Attack is straightforward in accomplishment as compared to gaining managerial access to a specific system from distant location.... denial of service Attacks (DoSs) ... denial of service Attacks DoS attack (denial of service) can be defined as an event that prevents un-authorized access to the resources or make interruption in those operations that are critical with time factor....
7 Pages (1750 words) Essay

Denial of Service Attacks

denial of service (DoS) attacks on Internet-connected systems can be particularly virulent.... uite simply a denial-of-service attack attempts to make computer resources unavailable to its intended users.... In a SYN flood DOS attack, a malicious host or the attacker sends a large number of SYN packets 'only', while holding out or not replying with the corresponding ACK packet response to the victim's SYN/ACK packets.... Even though the technical laws of different countries vary, still denial-of-service attacks are considered as a crime in most of the countries....
4 Pages (1000 words) Essay

The PC: 35 Years and Computing - Computer Crime

The paper "The PC: 35 Years and Computing - Computer Crime" states that many anti-viruses came about in the market in all these years to control the viruses.... Anti-viruses became more efficient as new technologies came into the market and were regularly updated to detect the new viruses in the market....
6 Pages (1500 words) Essay

Counter-Terrorism in Cyberspace

This article "Counter-Terrorism in Cyberspace" presents the United States that finds itself in something of a unique position with regards to forming cyber warfare and other actions against potential radical websites and/or Web users.... ... ... ... As such, stamping out each and every one of these websites and ensuring that they immediately go off-line as soon as they are posted will only serve to encourage alternative methods of jihadist discussion and planning....
6 Pages (1500 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us