Denial-of-service attack - Essay Example

Comments (0) Cite this document
Denial-of-service Attacks As the technological improvement is bringing more and more people benefit from them, there are some other people misusing these technologies. Computers and internet provide a platform to the users for transferring data, communication and ease of recording, executing and evaluating information…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Denial-of-service attack
Read TextPreview

Extract of sample "Denial-of-service attack"

Download file to see previous pages There are a number of network activities which people carry out in order to prevent users from working with a particular website or virtual organization effectively. Denial-of-service attacks are not a new phenomenon in the technological industry. These attacks are launched to slowdown or affect the smooth running of a particular website. These attacks are really troublesome for the users who have an immediate need to launch a website and retrieve information or process a transaction online (Morley & Parker 2009, pp. 383-384). Such attacks are, hence, widely discussed by researchers and the debate relating to the causes, effects and prevention of such attacks has been continuously given attention. This paper aims to analyze the causes, effects and reasons behind denial-of-service attacks. Denial-of-attack refers to a situation created by an attacker with an aim to stop or make difficult for the legitimate users from accessing the information they require or using services offered online (Komar et. Al., 2003, p. 99). An attacker may affect the performance of the network or the computer system of the user or the computers and network of the website that the user is trying to get access to (Zhang, Zheng & Ma 2008 p. 588). An attacker may be able to stop users from getting access to the emails, chat databases, websites, online services like banking, online educational websites etc and so on (Vacca 2007 p. 238). It is important to understand the ways in which an attacker manipulates or worsens the situation of the network and its working abilities. The most common method used by attackers of Denial-of-service attack is the use of massive amounts of information to slow down the network. The ‘flood’ of information or massive requests for access to a site for viewing the information uploaded there, prevents a number of legitimate users from gaining access (Das & Gulati 2004, p. 214). Servers are designed to process a limited number of access requests or information ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Denial-of-service attack Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from
(Denial-of-Service Attack Essay Example | Topics and Well Written Essays - 1500 Words)
“Denial-of-Service Attack Essay Example | Topics and Well Written Essays - 1500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Denial-of-service attack

Denial of service issues and solutions

...?Denial of Service Attacks I. Literature Review 1 Definition Denial of Service (DoS) is the disruption of an entire system, either by disabling thesystem or by overloading it with messages so as to degrade performance. (Stallings, 2006) In DoS attacks, attackers hold the data to modify or change it so that the data transfer time will be longer than usual to reach the intended websites or servers. 1.2 Purpose The major intention of DoS attacks is to hinder legitimate users from accessing the resources that they should be allowed to. It has been argued that DoS attacks usually consumes...
20 Pages(5000 words)Dissertation

Denial of service attacks (DoS)

...?Denial of Service Attacks (DoSs) By Table of Contents Introduction Denial of Service attack or simply DoS can be defined in many ways. And all the definitions refer to compromise of resource availability. In simple words, DoS is a security issue that stops legal users to get access to the resource, information or file that they need, when they need it (Chan et al., 2010). This paper presents an overview of DoS attacks. This paper will discuss different types of DoS attacks. This paper will also outline the ways to deal with this threat. Denial of Service...
5 Pages(1250 words)Essay


...? Attack Attack Arab-Israeli quest for peace is a worthy cause that has often been inhibited by both the Palestinians’ interests and the Israelis’ interests. Although both nationalities thirst for stability and security in the region, they are caught up fighting for their individual interests. Palestine fights for its nationalism. On the other hand, Israel maintains an iron fist in its bid to survive in a region where she is surrounded by her enemies. For that cause, Israel is willing to use oppressive and defensive measures to uphold and extend her territorial boundaries. Israel uses all possible means to ensure that the balance of power in the Middle East shifts in her favor. Palestine on the other hand...
4 Pages(1000 words)Essay

Denial of Service Attacks (DoSs)

...?DENIAL OF SERVICE ATTACK (DOS) Denial of Service Attacks (DoSs) Affiliation Three common Web server Security Attacks Buffer overflows One of the most well-known web server security attacks is known as a buffer overflow. Basically, a buffer overflow takes place when a software application attempts to store more data in a static buffer than its capacity to store or manage. In this scenario, this extra data is used to corrupt and overwrite the available memory. As a result it allows an attacker to put in random actions on the web server or destroy the system completely. It is commonly seen that the majority of web applications fails to effectively avoid the actions inserted or performed by random code into the system which can only... on the...
7 Pages(1750 words)Essay


3 Pages(750 words)Essay

Denial of Service Attacks

...Introduction: Denial of Service (DoS) attacks on Internet-connected systems can be particularly virulent. Agreed. DoS attacks can be termed both primitive and deadly. It is one of those diseases of the computer world that have been around for quite some time (in fact it is amongst the earliest and most well-known). This is not to say that there are no preventive measures but the preventive measures do not undermine the potency of DoS attacks. Quite simply a denial-of-service attack attempts to make computer resources unavailable to its intended users. DoS attacks are usually targeted at...
4 Pages(1000 words)Essay

Denial of service (dos) attacks

...DENIAL OF SERVICE (DOS) ATTACKS Denial of Service or in short DOS attacks has become easy tools for hackers to useagainst legitimate and authenticated users. Most of the hackers commit this type of offence to show off their skills to their friends and to gain respect in underground groups of Internet. The main goal of Denial of Service or DOS attack is to deny valid Internet and Network users from the services of the target system or Network or server. It launches an attack that prevents the use of services that are offered to the...
5 Pages(1250 words)Essay

Protagoras' Denial

...Protagoras’ Denial Introduction Protagoras’ denial centers on his conversation with Socrates. Socrates has initially asked Protagoras about the things that one could contribute with his teachings. Protagoras cited the importance of virtues that one could learn from him. With this, the present paper aims to know the major philosophical claim of Protagoras that was highly criticized by other Greek philosophers such as Aristotle. Criticism to Protagoras Philosophical Claim Protagoras assumed that the value of virtue could not be done with one’s inability of the wise men to accept suggestions and criticisms from others. With this assumption, Read points out that it is irrational to accept criticism and...
1 Pages(250 words)Essay

Denial Of Service

...Denial of Service Denial of Service Denial of service attack is a strategy that is used by malicious people to make a network resource or machine unavailable to its intended users. The methods used by these people to carry out an attack vary. However, they are similar in the sense that they consist of attempts to indefinitely or temporarily suspend or interrupt a host of service connected to the internet. In most of the cases, denial of service attacks is usually by one system or person. It is crucial to note that 2014 estimates show that...
2 Pages(500 words)Essay

Analyze and compare two companies strategic management areas

10 Pages(2500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Denial-of-service attack for FREE!

Contact Us