SEC 572 WEEK 1 iLab

SEC 572 WEEK 1 iLab

  • Submitted By: JALLAH
  • Date Submitted: 11/01/2015 7:31 PM
  • Category: Technology
  • Words: 1360
  • Page: 6

SEC 572
iLAB 1

Denial of Service Attacks
Student Name: Aloysius Jallah
Professor: Mark Merkow

Name of the attack
Denial of service attack (DoS): According to Week 1 TCO, denial of service attack is an attack that considerably reduces the power of the network from appropriately communicating with other networks and/or endpoint users (Merkow 2015). Hence, the end result of the attack is the incapacitation of the target network … rendering it inaccessible to its anticipated end-users through the application of flooding technique. Additionally, if the attacker understands and/or discovers that an intermediary network can give off excessive traffic capacity than the victim network can manage and/or process, the attacker uses the flooding technique to transmit an enormous batch of UDP packets headed for the victim; thus, the end result of this activity can cause flooding traffic congestion and exhaustion of the connection resources of the victim. In cunning attacks, “attacking hosts can flood packets in a burst to congest and disrupt existing TCP connections” (Kuzmanovic et al, 2005). However, for every action, there is equal and opposite reaction. As knowing denial of service (DoS) attack comes into play, software developers and system administrators also come up with the mechanisms and/or solutions to combat, reduce and prevent the potential impact of malicious criminal and/or attackers.
Attack discovery and resolution dates: Denial of service (DoS) attacks can be identify whenever a service and/or network becomes bombarded with flooding. As a result, this can lead the packets to expel and/or initiate non-complete connection calls, which means that it cannot further manages and/or deals with legitimate networking and/or connection requests. In most cases, the attacker is aware that by flooding the host and/or server with incomplete connections that it will ultimately leads to flooding attack, which in the long run...

Similar Essays