StudentShare solutions
Triangle menu

Denial of Service Attacks - Essay Example

Not dowloaded yet

Extract of sample
Denial of Service Attacks

The most common method involves flooding the victim machine with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. [1]
The other method is of obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. Even though the technical laws of different countries vary, still denial-of-service attacks are considered as a crime in most of the countries.[2]
The TCP/IP protocols form the basis of today's Internet, but these protocols lack even the basic mechanisms for security, such as validation or encryption. Newer versions of these protocols such as IPV6 do have better security features but currently TCP/IP protocols are the ones most widely used and common protocols and so their lack of built-in security has become increasingly challenging. [1]
Now in accordance with the question let us look at the working of the protocol to understand the loophole and the problem. In TCP/IP the TCP half uses sequence numbers to keep track of the order or sequence of data packet, (this is to counter high message latency and loss which results in messages usually arriving in non-sequential order). So the basic purpose of allotting sequence numbers is to ensure reaches the user in the correct order, regardless of the order in which the data is actually received.[3] This allotment takes place during the initial phase of the TCP connection which is called the three-way handshake. The process can be detailed as follows:
1. The originator of the connection initiates the connection by sending a packet having the SYN flag set in the TCP header - the "SYN packet".
2. The receiver or the target responds by sending back to the originator a packet that has the SYN and ACK flags set - "SYN/ACK packet"
3. The originator acknowledges receipt of the 2nd packet by sending to the receiver a third packet with only the ACK flag set (an "ACK packet").
After the completion of this three-step handshaking process the TCP connection is considered "open" and data transfer can take place between the two systems. Herein lies the loophole, after sending the SYN-ACK packet (between steps 2 and 3), the receiving system is required to wait for the ACK packet and keep a record of the incomplete connection in a queue called "listen queue". The listen queue allows successful connections even with high message latency and is necessary. Most hardware's only have a limited amount of space for such incomplete records. If the receiver gets further requests for new connections while too many connections are left in the incomplete state, the receiver will run out of space, and new connection requests can not be handled.
In a SYN flood DOS attack, a malicious host or the attacker sends a large number of SYN packets 'only', while holding out or not replying with the corresponding ACK packet response to the victim's SYN/ACK packets. The victim's listen queues block up with incomplete connec ...Show more

Summary

Denial of Service (DoS) attacks on Internet-connected systems can be particularly virulent. Agreed. DoS attacks can be termed both primitive and deadly. It is one of those diseases of the computer world that have been around for quite some time (in fact it is amongst the earliest and most well-known)…
Author : jordan91
Denial of Service Attacks essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Denial of Service Attacks"
with a personal 20% discount.
Grab the best paper

Related Essays

Denial-of-service attack
There are some users who create hurdles for others sometimes for fun purposes or to de-motivate users from working with a particular service or website. These people misuse the knowledge and worsen the reputation of certain organizations in the technological world.
6 pages (1500 words) Essay
Computer Security
However with all its advantages research suggests that of all the email that is sent daily 85% of these messages are unwanted spam, viruses, denial-of-service attacks, Trojans and other malicious threats. This misuse of the advantages, convenience and cost-effective measures that the internet facilitates for users all over the world which has resulted in a combined consensus from analysts throughout the world to come up with measures appropriate to restrict the free access of the email as well as web page facilities.
3 pages (750 words) Essay
Denial of service attacks (DoS)
This paper presents an overview of DoS attacks. This paper will discuss different types of DoS attacks. This paper will also outline the ways to deal with this threat. Denial of Service Attacks DoS attack (denial of service) can be defined as an event that prevents un-authorized access to the resources or make interruption in those operations that are critical with time factor.
5 pages (1250 words) Essay
Botnets Essay
The compromised zombie army is invaded by a Trojan, which is known as a remote application that installs itself within the system memory or kernel and provides data or connectivity to the hacker. Moreover, Trojan is operational by initiating an Internet Relay Chat (IRC) that waits for any action from the hacker who has full control over the botnet (Rapoza, 2008).
3 pages (750 words) Essay
Denial of Service Attacks (DoSs)
Denial of Service Attacks (DoSs) One of the most well-known web server security attacks is known as a buffer overflow. Basically, a buffer overflow takes place when a software application attempts to store more data in a static buffer than its capacity to store or manage.
7 pages (1750 words) Essay
Cyber -Attacks on America
In addition to these physical attacks, the US now faces another form of attack, cyber-attacks, against computer networks that crucially serve the economy and security of the nation. Attackers target organizations across the various sectors of the economy including both private and government institutions (Sanger & Perlroth, 2013).
10 pages (2500 words) Essay
Denial of service (dos) attacks
The main goal of Denial of Service or DOS attack is to deny valid Internet and Network users from the services of the target system or Network or server. It launches an attack that prevents the use of services that are offered to the legitimate and authenticated users by the Network.
5 pages (1250 words) Essay
Wireless Network Active Attacks
Large number of consumer use devices such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker takes advantage of this and unleash large amount of noise by using these devices and jam the airwaves so that the
2 pages (500 words) Essay
Botnet Paper
The compromised zombie army is invaded by a Trojan, which is known as a remote application that installs itself within the system memory or kernel and provides data or
3 pages (750 words) Essay
Denial Of Service
In most of the cases, denial of service attacks is usually by one system or person. It is crucial to note that 2014 estimates show that the number of denial of service attacks has
2 pages (500 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation