StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Denial of service attacks (DoS) - Essay Example

Cite this document
Summary
Denial of Service Attacks (DoSs) By Student Date Table of Contents Introduction Denial of Service attack or simply DoS can be defined in many ways. And all the definitions refer to compromise of resource availability. In simple words, DoS is a security issue that stops legal users to get access to the resource, information or file that they need, when they need it (Chan et al., 2010)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Denial of service attacks (DoS)
Read Text Preview

Extract of sample "Denial of service attacks (DoS)"

Download file to see previous pages

Additionally, DoS attack is sometimes called distributed denial-of-service attack (DDoS attack). This sort of attacks (denial of service attack) may target users in an attempt to stop them from creating links on the network. However these connections may include outgoing transmission. In addition, a DoS attack may also target a whole corporation. In this scenario, it can stop incoming traffic or to prevent outgoing traffic towards network related applications. In this way this attack tries best to stop the victim from being usage of network links.

Moreover, denial of service attack is straightforward in accomplishment as compared to gaining managerial access to a specific system from distant location. That’s why DoS attack gains popularity on the Internet (Chan et al., 2010) and (Tech-FAQ, 2011). DoS attacks can easily halt our computer machine or our network connection. However, it totally depends on the overall enterprise nature; it may efficiently disable our corporation network that may result in overall network failure. Thus it is true fact that some of the DoS attacks can easily be executed through inadequate possessions beside a huge sophisticated environment.

We can clarify this situation with an example of an attacker having old personal computer along with a deliberate modem (that might be internal or external). This slow modem may perhaps be capable to halt our personal computers machines, hardware and sophisticated networks in a short time. Therefore we categorize this sort of attack as an asymmetric attack. Moreover, it totally depends on the attacker that which type of standard technique he/she adopts for the attack. For instance, if the attacker is a skilled person then he will create more problems for the firm.

In this scenario, one of the major techniques that an attacker can use is about email messages which are known as spam. These phenomena will result in similar attack launching on our electronic mail account. In this situation, it does not matter that whether the e-mail account we are using is provided by our company or we got it from a complimentary service that is provided to us by Hotmail, Gmail or Yahoo. In this scenario, another important factor for attacking on our computer is that sometimes services like Hotmail, Gmail or Yahoo provide us a limited storage (specific quota) which restricts the quantity of information that we can store in our account according to organizational rules and regulations.

Hence storage space perhaps will be different at any certain time. In addition, this storage space will be consumed in a short amount of time as a result of sending a lot of large e-mail posts to the account; In this way an attacker can devour our storage space (specific quota), that prevents us from getting valid, useful or useful mails (TechTarget, 2007; Carnegie Mellon University , 2001; McDowell, 2009). Modes of attack A DoS attack can appear in different forms and varies in multiplicity of services.

However, we can discuss modes of attack in following terms: Attacks due to Buffer Overflow Buffer Overflow is one of the most common types of Denial of service attack. It works simply by sending extra traffic towards a network. A thing that is necessary to define here is that networks are basically sophisticated in nature.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Denial of service attacks (DoS) Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1415112-denial-of-service-attacks-dos
(Denial of Service Attacks (DoS) Essay Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/environmental-studies/1415112-denial-of-service-attacks-dos.
“Denial of Service Attacks (DoS) Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/environmental-studies/1415112-denial-of-service-attacks-dos.
  • Cited: 0 times

CHECK THESE SAMPLES OF Denial of service attacks (DoS)

Electronic communication

The assaults and severity associated with such threats as spam, viruses and network attacks have risen to the extent that it threatens the viability of electronic communication.... Apart from the leakage of confidential user data, such attacks and threats causes increased and unpredictable hardware and software costs, disruption to email delivery and depletion of IT resources.... System and Application Threats There is a possibility that data and information sent through electronic communication can be intercepted, copied and modified by unauthorized persons through such attacks as man-in-the-middle attack....
4 Pages (1000 words) Essay

Denial of Service Attacks (DoSs)

Denial of service attacks DoS attack (denial of service) can be defined as an event that prevents un-authorized access to the resources or make interruption in those operations that are critical with time factor.... hellip; denial of service attacks (DoSs) One of the most well-known web server security attacks is known as a buffer overflow.... This sort of attacks (denial of service attack) may target users in an attempt to stop them from creating links on the network....
7 Pages (1750 words) Essay

How ISPs Can Help Fight Botnets and Cybe

They are the basis of many internet crimes like spam, phishing, denial of service attacks etc.... Some of the users started developing scripts to attempt denial of service and distributed denial of service attacks on the servers to crash them.... They adopt a distributed approach due to which it becomes difficult to control or detect them....
14 Pages (3500 words) Essay

Cyber Terrorisum Past Present and Future

However, among all the definitions given, there is no universally accepted definition of cyber terrorism.... Cyber terrorism results from the act of violence when technology is used in order to generate fear among the civilians,… The political and social agenda is the main objective of cyber terrorists....
10 Pages (2500 words) Research Paper

A Network Intrusion Detection System and Security Attacks

The paper "A Network Intrusion Detection System and Security attacks" gives detailed information about the mark IDS technique, a system based interruption recognition framework.... A Network Intrusion Detection System monitors networks for intrusions and attacks reporting any anomalies to the administrator.... However, the more network technologies have developed, the more network attacks have increased in severity and numbers.... Intrusion detection systems (IDS) can effectively provide network security by preventing, detecting, and possibly fighting attacks....
7 Pages (1750 words) Assignment

Technology and Crime

In this paper, the writer aims to discuss crimes with respect to technology.... Several particular examples of pieces of technology and its applications are analyzed.... Additionally, the paper "Technology and Crime" describes various areas of technology-based crimes....   … The variety of technology-based crime is always growing, both as a result of technological alteration and in terms of social interactions with new technologies....
7 Pages (1750 words) Term Paper

Security Flaws of IPSec

In this research “Security Flaws of IPSec” the author will present a detailed analysis of some of the main security aspects and role of IPSec in securing a network from inside as well as outer threats.... It will assess and broadly study the IPSec and the impact of how does IPSec implement security....
8 Pages (2000 words) Assignment

IT Risk Analysis

This case study "IT Risk Analysis" analyzes the IT risks involved in the Wolves Techs Limited Company and conduct an IT risk assessment for the company with detailed report and recommendations.... nbsp;The main business of Wolves Techs Limited is to process data for retailers.... hellip; Risk analysis involves the techniques used in the identification and assessment of factors that may jeopardize the success of achieving business goals....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us