Denial of Service Attacks - Essay Example

Only on StudentShare

Extract of sample
Denial of Service Attacks

The most common method involves flooding the victim machine with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. [1]
The other method is of obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. Even though the technical laws of different countries vary, still denial-of-service attacks are considered as a crime in most of the countries.[2]
The TCP/IP protocols form the basis of today's Internet, but these protocols lack even the basic mechanisms for security, such as validation or encryption. Newer versions of these protocols such as IPV6 do have better security features but currently TCP/IP protocols are the ones most widely used and common protocols and so their lack of built-in security has become increasingly challenging. [1]
Now in accordance with the question let us look at the working of the protocol to understand the loophole and the problem. In TCP/IP the TCP half uses sequence numbers to keep track of the order or sequence of data packet, (this is to counter high message latency and loss which results in messages usually arriving in non-sequential order). ...Show more

Summary

Denial of Service (DoS) attacks on Internet-connected systems can be particularly virulent. Agreed. DoS attacks can be termed both primitive and deadly. It is one of those diseases of the computer world that have been around for quite some time (in fact it is amongst the earliest and most well-known)…
Author : jordan91
Save Your Time for More Important Things
Let us write a custom essay on your topic
"Denial of Service Attacks"
with a personal 20% discount.
Find out more

Related Essays

The Security Risks to Online Banking
But with this rapid growth, a number of risks are exposed to the online services, this is due to several reasons; the ubiquitous and global nature of electronic networks, the incorporation of legacy systems in e-banking platforms, reliance of banks on third party ISPs, and that is just to name a few.
40 pages (10000 words) Coursework
Domain Name System Security Extensions
RFC 3833 tries to document a number of the recognized flaws in the DNS and how DNSSEC reacts to those threats. The DNSSEC are a suite of Internet Engineering Task Force specifications for securing definite kinds of information offered by the DNS as utilized on Internet Protocol (IP) networks.
8 pages (2000 words) Essay
Wireless Security. Webased Online Diary System.
Webased online diary system technologies allow us to finally connect multiple users to share Internet connections without messy and expensive cable installation procedures. WLAN webased online diary systems make available always-on-webased online diary system connectivity without the restriction of sitting at your desk.
16 pages (4000 words) Essay
Information, Security & Control
It also recognised that the client/server relational database model was showing signs of maturing and could no longer rely on this to achieve the expected year on year growth in revenue that its shareholders demanded. Oracle recognised that the future of software development lay with applications delivery through the Internet.
12 pages (3000 words) Essay
Hacking and Hacktivism
It is a combination of grassroots political protest with computer hacking. Hacktivists operate within the fabric of a cyberspace, struggling over what is technologically possible in virtual lives, and reaches out of cyberspace utilizing virtual powers to mould offline life.
12 pages (3000 words) Essay
Firewall Architectures and Techniques A study on the high speed network security they provide.
The project is intended to describe and evaluate firewall architectures and techniques and network security they provide. The firewall is the central issue of the network security policy of the enterprise that defines procedures to protect the network and its contents and users from loss and damage.
2 pages (500 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT