StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ddos Attack Classification - Essay Example

Cite this document
Summary
The paper "Ddos Attack Classification" discusses that Dos attack classification is vital in understanding the attacked protocols so as to avoid the worms on suitable platforms. Over the last decades, there has been no study on DDoS attacks and therefore there is not much understanding of the same…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Ddos Attack Classification
Read Text Preview

Extract of sample "Ddos Attack Classification"

Groups include Destructive, Resource consumption, and Bandwidth consumption attacks. On the other hand, Douligeris and Mitrokotsa advanced the classification to five groups which included Network OS level, Device level, Application level, Data flood, and Protocol feature attack. This can be explained below:

1. Bandwidth-based attacks
This often attacks the routers, servers, and firewall processing resources and thus limits them. Normally, this type of DDoS attack sent a lot of data which leads to an overload making the network bandwidth depleted. There is a reduction in the quality of service when there is an overload attack in a system. This is because the normal access is tempered with.

2. Traffic-based attacks
This kind of attack often sent large traffic attacks in the form of TCP, UDP, and other ICPM. Often people use technology forgery to escape the system monitoring. When the attacks are mixed with malware exploitation, they cause leaking of the information and this may be dangerous. This illegal activity of information leakage will occur while fighting DDoS attacks.

3. Application-based attacks
This is vital as it is used in financial institutions to prevent breaches and leakages of information. Though the attackers may not be many, this attack is taken for specific roles such as canceling fraudulent transactions or accessing a vital database. (Chai, 2013)This often involves targeting the application layer of the OSI model. Normally, application layer data is sent to the attackers to disable their functions.

4. Modus Operandi
Here, there is the involvement of a machine which in most cases is the agent. When the orders are received from the master machine which is controlled by the attacker, these agents will be involved in remitting the packets to a host who is a victim of the attack. The agents and master will then generate an actual attack message instructing the modus operandi to attack the network victim.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Science Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1699953-computer-science
(Computer Science Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1699953-computer-science.
“Computer Science Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1699953-computer-science.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ddos Attack Classification

Denial of Service Issues and Solutions

hen a denial of service attack is taken place, the server receives several authentication requests, seemingly came from the authentic users, which have false return addresses.... enerally, there are three major classifications of DoS attacks depending on the victims targeted by attackers—users, hosts, or networks though there are several types of DoS attack prevalent on the Internet.... lood-type attacks are the first known form of a DoS attack and their attacking mechanism is quite simple – attackers send more traffic to a server than they can handle (Georgieva, 2009)....
19 Pages (4750 words) Dissertation

Techniques for Detecting, Preventing or Mitigating Distributed Denial of Service

o recruit machines into his/her ddos attack, the attacker may follow several processes.... Local subnet scanning uses a compromised host to attack another computer within its own network without firewall detection as it uses the information stored in the local addresses (UMUC, 2012).... Generally speaking, as a way of detecting ddos, programmable hardware is embedded on the internet (Tuncer, & Takar, 2011)....
10 Pages (2500 words) Essay

Computer Attacks and Their Counter Measures

ddos attack is an ill attempt to make a network or server resource unavailable to users, often through disrupting or suspending the services of a connected host from the internet.... The ddos attack can be achieved in two main ways.... Without proper security measures and control, your data might be prone to an outside attack.... Secondly, the attacker then controls the affected computers and makes them attack simultaneously the target thus achieving their initial goal (Gu & Liu, 2007)....
6 Pages (1500 words) Essay

Internet of Things - Features, Challenges, and Weaknesses

It was found that, in the distributed form of architecture in IoT, attackers could hijack unsecured network devices, converting them into bots to attack third parties.... The perceptual layer in distributed IoT architecture was also found to be vulnerable to node capture attacks, including physical capture, brute force attack, DDoS attacks, and node privacy leaks....
24 Pages (6000 words) Research Paper

The Successful Emergence of the Internet of Things

We found that in the distributed form of architecture in IoT, attackers could hijack unsecured network devices converting them into bots to attack third parties.... Finally, the perceptual layer in distributed IoT architecture is also found to be vulnerable to node capture attacks, including physical capture, brute force attack, DDoS attacks, and node privacy leaks....
23 Pages (5750 words) Research Paper

EBuy Control Station

DDoS stands for distributed denial of service, normally meant to attack the available networks.... rom the ISPs, there is a ddos mitigation center.... On this front, the company must go for the latest anti-ddos technology.... There are also cloud-based providers of ddos mitigation (Norman, 2007)....
5 Pages (1250 words) Case Study

Network Time Protocol

This coursework "Network Time Protocol" describes the analysis of Network Time Protocol (NTP).... This paper outlines the history of NTP, vulnerabilities, reduction of vulnerability and mitigation, Intrusion Prevention System (IPS), the security of NTP implementation.... ... ... ... In order to obtain UTC, several methods can be used including satellite and radio systems....
9 Pages (2250 words) Coursework

Using the Internet of Things Device in the Hackinig Process

The author of the paper will begin with the statement that Consumer Electronics (CE) has adopted some problems of insecurity because of the exponent world we are in.... Thus, affecting CE because it has gone digital too.... The Internet of Things (IoT) class of CE is still young within this stage....
19 Pages (4750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us