logo

Computer Security: DDoS Attacks

Develop a detailed walkthrough of a chosen attack type (DDoS or Worm) and analyze a real-world incident of that attack type.

11 Pages2444 Words233 Views
   

Added on  2023-06-07

About This Document

This report discusses computer security and the significant cyber threat of distributed denial of service or DDoS attack. It includes a detailed walk-through of DDoS attacks, a real-world example of the 2016 Dyn Cyber Attack, and specific actions taken for addressing the issue. Subject: Computer Security, Course Code: N/A, Course Name: N/A, College/University: N/A

Computer Security: DDoS Attacks

Develop a detailed walkthrough of a chosen attack type (DDoS or Worm) and analyze a real-world incident of that attack type.

   Added on 2023-06-07

ShareRelated Documents
Running head: DDOS ATTACKS
Computer Security: DDoS Attacks
Name of the Student
Name of the University
Author’s Note:
Computer Security: DDoS Attacks_1
1
DDOS ATTACKS
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
1. Detailed Walk Through of Distributed Denial of Service Attack......................................2
2. Real World Example of DDoS Attack...............................................................................5
a) Occurrence of Attack with Specific Name....................................................................5
b) Outcome of the Selected Incident..................................................................................5
c) Impact of Selected Incident............................................................................................6
d) Aims of Security Breach with Consequences................................................................6
e) Specific Actions taken for Addressing the Issue...........................................................7
Conclusion..................................................................................................................................7
References..................................................................................................................................9
Computer Security: DDoS Attacks_2
2
DDOS ATTACKS
Introduction
The computer security can be significantly defined as the security or protectiveness of
various computer systems either from damage or from theft for the software, electronic data
or software (Von Solms & Van Niekerk, 2013). This type of security is also effective for the
misdirection or disruption of fewer services, provided by them. There is an incrementing
reliance on the computer systems, smart devices like smart televisions as well as smart
phones, and other tiny devices together comprise of the IoT or Internet of Things. The
computer security or IT security is for the protection of several computer systems from the
various cyber attacks. The computer security consists of the physical security and cyber
security. These two types of securities are utilized by the various companies for properly
protecting against the unauthenticated or unauthorized access for the data centres or other
digitalized systems (Wang & Lu, 2013). The confidentiality, integrity or availability of
information is well maintained with this computer security. The following report outlines a
brief discussion on the computer security and the significant cyber threat of distributed denial
of service or DDoS attack.
Discussion
1. Detailed Walk Through of Distributed Denial of Service Attack
The distributed denial of service attack or DDoS attack is the significant malicious
attempt for the purpose of disrupting the normal traffic of any targeted server, network or
service by the overwhelming target or infrastructure with the respective flood of this Internet
traffic (Hahn et al., 2013). These types of attacks solely achieve the effectiveness or
efficiency by the proper utilization of several compromised or dangerous computer based
systems as the typical sources of any attack traffic. The exploited machines could eventually
Computer Security: DDoS Attacks_3
3
DDOS ATTACKS
involve the networked resources or systems in this attack and the most targeted resources in
this case are devices of Internet of Things (Buczak & Guven, 2016). The distributed denial of
service attack subsequently jams the network traffic and hence the regular network traffic is
prevented from the packets reaching to the desired location.
Figure 1: Components of DDoS Attacks
(Source: Created by the Author in MS Word)
The DDoS attack needs a hacker for obtaining the complete control of the network for
executing the attack (Compagno et al., 2013). The entire procedure of this attack is quite
simplified. The computer systems as well as other machineries are at first infected with the
malware, hence turning the machines into bots. The significant hacker then comprises of the
remote control on the collection of bots, known as botnet. When this botnet is being
established, the hacker has the capability for directing the respective systems by simply
Attacker
Handler
Botnet Botnet
Handler
Botnet
Victim
Botnet
Computer Security: DDoS Attacks_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security: Melbourne IT Attack
|10
|2318
|138

Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example
|10
|2158
|245

Computer Security: Understanding Distributed Denial of Service Attack
|13
|2230
|463

DDoS Attack at GitHub: Details, Outcome, Impact, and Mitigation
|13
|2099
|392

Mitigation Strategies for Distributed Denial of Service (DDoS) Attack
|7
|1857
|53

Security Vulnerabilities Assignment | Network Performance
|4
|999
|333