Got a tricky question? Receive an answer from students like you! Try us!

Denial of Service Attacks - Essay Example

Only on StudentShare
Author : jordan91

Summary

Denial of Service (DoS) attacks on Internet-connected systems can be particularly virulent. Agreed. DoS attacks can be termed both primitive and deadly. It is one of those diseases of the computer world that have been around for quite some time (in fact it is amongst the earliest and most well-known)…

Extract of sample
Denial of Service Attacks


The most common method involves flooding the victim machine with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. [1]
The other method is of obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. Even though the technical laws of different countries vary, still denial-of-service attacks are considered as a crime in most of the countries.[2]
The TCP/IP protocols form the basis of today's Internet, but these protocols lack even the basic mechanisms for security, such as validation or encryption. Newer versions of these protocols such as IPV6 do have better security features but currently TCP/IP protocols are the ones most widely used and common protocols and so their lack of built-in security has become increasingly challenging. [1]
Now in accordance with the question let us look at the working of the protocol to understand the loophole and the problem. In TCP/IP the TCP half uses sequence numbers to keep track of the order or sequence of data packet, (this is to counter high message latency and loss which results in messages usually arriving in non-sequential order). ...
Download paper

Related Essays

The Security Risks to Online Banking
Though, the Internet has made it possible for businesses to carry out their activities in a more efficient and cost-effective manner but at the same time, it has proved to be more insecure than traditional ways of trade because practically, it is much more difficult and expensive to tackle fraudulent activities that cyber-criminals and hackers carry out aggressively to steal confidential; financial data of online-businesses for their own benefit.…
40 pages (10040 words)
Domain Name System Security Extensions
It is a collection of extensions to DNS that offer the DNS clients origin verification of DNS data, data reliability and authenticated defiance of existence.…
8 pages (2008 words)
Wireless Security. Webased Online Diary System.
This allows users to move freely while continuously having connection to the same resources. It is for this reason that webased online diary system webased online diary systems are the fastest growing form of webased online diary systeming in the U.S. Security issues continue to face Wi-Fi and other webased online diary system markets. By its nature, webased online diary system access opens up the potential for webased online diary system eavesdropping and data theft. Wi-Fi webased online diary systems have to be carefully encrypted to prevent unauthorized use. For example, people committing…
16 pages (4016 words)
Information, Security & Control
They embarked on a R&D program to develop a suite of Internet based enterprise application software. These applications would work perfectly with Oracle databases. This eradicated the need to hold large numbers of databases on a client/server architecture since the delivery could be achieved through an Internet browser. Having developed the tools, Ellison took another of his great strategic decisions and asked his people to implement the systems at Oracle 4.…
12 pages (3012 words)
Hacking and Hacktivism
Social movements and popular protest are integral parts of twenty-first-century societies. Hacktivism is activism gone electronic (Tim Jordan, Paul A. Taylor, 2004).…
12 pages (3012 words)
Firewall Architectures and Techniques A study on the high speed network security they provide.
Different firewall architectures and techniques provide different correlation of performance vs. security. When considering alternative firewall technologies, a common question is "what are the trade-offs between performance and security" (Cisco Systems, 2002) To answer to this question, various firewall architectures should be regarded and analysed.…
2 pages (502 words)