Denial Of Service - Essay Example

Comments (0) Cite this document
The methods used by these people to carry out an attack vary. However, they are similar in the sense that they consist of attempts to…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Denial Of Service
Read TextPreview

Extract of sample "Denial Of Service"

Denial of Service Denial of Service Denial of service attack is a strategy that is used by malicious people to make a network resource or machine unavailable to its intended users. The methods used by these people to carry out an attack vary. However, they are similar in the sense that they consist of attempts to indefinitely or temporarily suspend or interrupt a host of service connected to the internet. In most of the cases, denial of service attacks is usually by one system or person. It is crucial to note that 2014 estimates show that the number of denial of service attacks has reached 28 per hour (Yu, 2014). Denial of service attacks is common in businesses and organizational websites. Perpetrators of these attacks target services or sites that are hosted by high profile servers. These include credit card payment systems, banks and root name servers. The article on denial of service attacks that will be used is Dave Neal’s “Denial of Service Attacks Exploits White House Press Machine”. This article was published in The Inquirer on November 12, 2014.
According to this article, attackers used the White House press release machine as a way of gaining network trust. The White House made this discovery when it updated its internet report with a caution that attackers are exploiting the facility’s press release machine. These attackers are using content emanating from the White House to gain network trust. They are using DNS reflection attacks to exploit the press machine. Attackers who target the network at the White House are designing large DNS text records in order to increase amplification, and magnify their attacks. These attackers create their own text records to amplify the responses as required (Neal, 2014). This helps them to direct traffic to targeted sites. The targeted traffic, which is amplified overwhelms the targeted site and makes it unable to respond to requests. In this case, the attacks saturate the target network or machine with amplified external communication requests. These requests come in large numbers in order to prevent the machine from responding to legitimate traffic. They also cause the network or machine to respond slowly to legitimate traffic. Denial of service attacks eventually lead to server overload. This technique is effective because the text records have the ability to achieve the largest possible response. The attacks that were observed lasted for 5 hours and created a bandwidth load that peaked at 4.3Gbps (Neal, 2014). The text record technique has been extensively used to target entertainment websites, particularly video game websites. In other cases, the attacks may force a targeted computer to consume its resources or reset. As a result, the targeted computer is unable to provide its intended services. This also obstructs the communication media between the victim and intended user so that they no longer communicate effectively.
Denial of service attack is used to make a network resource or machine unavailable to its intended users. These attacks comprise of attempts to indefinitely or temporarily suspend or interrupt a host of service connected to the internet. According to Neal (2014), attackers are amplifying content from the White House and using the content to attack other networks. The targeted network, computer or website is overwhelmed with the incoming traffic to the extent that it cannot provide its intended service to users.
Neal, D. (2014). Denial Of Service Attack Exploit White House Press Machine. The Inquirer. Retrieved From <> Yu, S. (2014). Distributed Denial of Service Attack and Defense. New York, NY: Springer New York. Read More
Cite this document
  • APA
  • MLA
(“Denial Of Service Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Denial Of Service Essay Example | Topics and Well Written Essays - 500 words. Retrieved from
(Denial Of Service Essay Example | Topics and Well Written Essays - 500 Words)
Denial Of Service Essay Example | Topics and Well Written Essays - 500 Words.
“Denial Of Service Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Denial-of-service attack

...?Denial-of-service Attacks As the technological improvement is bringing more and more people benefit from them, there are some other people misusing these technologies. Computers and internet provide a platform to the users for transferring data, communication and ease of recording, executing and evaluating information. There are some users who create hurdles for others sometimes for fun purposes or to de-motivate users from working with a particular service or website. These people misuse the knowledge and worsen the reputation of certain organizations in the technological world. There are a number of network activities which people carry out in order to prevent users from working with a particular website or virtual organization... ...
6 Pages(1500 words)Essay

Denial of service issues and solutions

...?Denial of Service Attacks I. Literature Review 1 Definition Denial of Service (DoS) is the disruption of an entire system, either by disabling thesystem or by overloading it with messages so as to degrade performance. (Stallings, 2006) In DoS attacks, attackers hold the data to modify or change it so that the data transfer time will be longer than usual to reach the intended websites or servers. 1.2 Purpose The major intention of DoS attacks is to hinder legitimate users from accessing the resources that they should be allowed to. It has been argued that DoS attacks usually consumes software bugs to crash a service or network resource or even bandwidth...
20 Pages(5000 words)Dissertation

Denial of service attacks (DoS)

...?Denial of Service Attacks (DoSs) By Table of Contents Introduction Denial of Service attack or simply DoS can be defined in many ways. And all the definitions refer to compromise of resource availability. In simple words, DoS is a security issue that stops legal users to get access to the resource, information or file that they need, when they need it (Chan et al., 2010). This paper presents an overview of DoS attacks. This paper will discuss different types of DoS attacks. This paper will also outline the ways to deal with this threat. Denial of Service Attacks DoS attack (denial of service) can be...
5 Pages(1250 words)Essay

Denial of Service Attacks (DoSs)

...?DENIAL OF SERVICE ATTACK (DOS) Denial of Service Attacks (DoSs) Affiliation Three common Web server Security Attacks Buffer overflows One of the most well-known web server security attacks is known as a buffer overflow. Basically, a buffer overflow takes place when a software application attempts to store more data in a static buffer than its capacity to store or manage. In this scenario, this extra data is used to corrupt and overwrite the available memory. As a result it allows an attacker to put in random actions on the web server or destroy the system completely. It is commonly seen that the majority of web applications fails to effectively avoid the actions inserted or performed by random code into the system which can only... on the...
7 Pages(1750 words)Essay

Interantional Business

2 Pages(500 words)Essay

Denial of Service Attacks

...Introduction: Denial of Service (DoS) attacks on Internet-connected systems can be particularly virulent. Agreed. DoS attacks can be termed both primitive and deadly. It is one of those diseases of the computer world that have been around for quite some time (in fact it is amongst the earliest and most well-known). This is not to say that there are no preventive measures but the preventive measures do not undermine the potency of DoS attacks. Quite simply a denial-of-service attack attempts to make computer resources unavailable to its intended users. DoS attacks are usually targeted at major websites or services hosted on high-profile web servers such as...
4 Pages(1000 words)Essay

Denial of service (dos) attacks

...DENIAL OF SERVICE (DOS) ATTACKS Denial of Service or in short DOS attacks has become easy tools for hackers to useagainst legitimate and authenticated users. Most of the hackers commit this type of offence to show off their skills to their friends and to gain respect in underground groups of Internet. The main goal of Denial of Service or DOS attack is to deny valid Internet and Network users from the services of the target system or Network or server. It launches an attack that prevents the use of services that are offered to the legitimate and authenticated users by the Network. In other...
5 Pages(1250 words)Essay

Protagoras' Denial

...Protagoras’ Denial Introduction Protagoras’ denial centers on his conversation with Socrates. Socrates has initially asked Protagoras about the things that one could contribute with his teachings. Protagoras cited the importance of virtues that one could learn from him. With this, the present paper aims to know the major philosophical claim of Protagoras that was highly criticized by other Greek philosophers such as Aristotle. Criticism to Protagoras Philosophical Claim Protagoras assumed that the value of virtue could not be done with one’s inability of the wise men to accept suggestions and criticisms from others. With this assumption, Read points out that it is irrational to accept criticism and...
1 Pages(250 words)Essay

Proven Practices for Securing Your Website against Distributed Denial of Service Attacks - DDoS

...Full Paper DDOS Attacks There was an incident that took place on September 18th when a website of Motion Pictures Association suddenly stops responding. Technically, a huge number of request were received by the web server, as a result, the server crashed in a process of giving a response to thousands of request demanding web pages one after another. Likewise, the distributed denial of service attack halted the server to respond to legitimate user request for a period of twenty hours. Moreover, the DDOS attack also focused and attacked on recording industry association of American along with British photographic industry. It was identified that an Internet bulletin board called as 4chan initiated the attack by utilizing readers... , as again...
17 Pages(4250 words)Research Paper

The Prairie is My Garden and The Old Settlers

2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Denial Of Service for FREE!

Contact Us