Computer Security: Understanding Distributed Denial of Service Attack

   

Added on  2023-06-07

13 Pages2230 Words463 Views
Running head: COMPUTER SECURITY
COMPUTER SECURITY
Computer Security: Understanding Distributed Denial of Service Attack_1
COMPUTER SECURITY
1
Executive Summary
This research sheds light on the distributed denial of service attack (DDoS) that happens at the
time when several systems flood the bandwidth of a targeted system. The use of this attack
mainly intends to slow down servers. According to the analysis it has been suggested that this
attack mainly commenced over a large group of computers. In this case, the attackers mainly use
a zombie network that are group of virus infected computers on which DOS attacking installed
silently. Vulnerability of such attacks is effective as infected machine gets completely
unprotected to the attackers. Necessary information is generally stole or accessed from the
storage.
Computer Security: Understanding Distributed Denial of Service Attack_2
COMPUTER SECURITY
2
Table of Contents
Introduction......................................................................................................................................4
1. Distributed Denial of Service operation and representation of its various stages.......................4
Stages of Dos attack are as follows.................................................................................................5
2. Selecting the type of attack and analysis of following questions................................................8
Conclusion and recommendation..................................................................................................10
Reference list.................................................................................................................................11
Computer Security: Understanding Distributed Denial of Service Attack_3
COMPUTER SECURITY
3
Introduction
The term cyber security refers to the process of protecting the various internet connected systems
and computer peripherals like software’s, hardware’s and various amount of data that is under
the threat of cyber attacks. In this study, the attack system of Denial of Service (DDoS) has been
selected. Hence, the entire procedure of attack along with specific example has been elaborated
in order to conduct the study in an appropriate manner.
The problem statement of study is to identify specific attack system of DDoS and effective
recommendation has been mentioned.
1. Distributed Denial of Service operation and representation of its various
stages
The term denial of service attack refers that cyber attack that makes the user’s machine and
network inaccessible. The dos attack fills the network with unwanted traffic and sending a
information which helps the system to crash totally. As mentioned by Yu, Tian, Guo, & Wu.
(2014), the users that are affected by dos attack are unable to use the internet services properly.
There are various types of dos attacks that can be used against the targeted users, they are as
follows.
Computer Security: Understanding Distributed Denial of Service Attack_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Denial of Service and Distributed Denial of Service Attacks
|4
|586
|366

ITC595 Research Project (Distributed Denial of Service Attacks)
|6
|3302
|205

Computer Security: DDoS Attacks
|11
|2444
|233

Computer Security: Melbourne IT Attack
|10
|2318
|138

Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example
|10
|2158
|245

Ransom DDoS Attacks on VMware based cloud systems and possible counter measures
|115
|22008
|154