logo

Computer Security: Melbourne IT Attack

   

Added on  2023-06-07

10 Pages2318 Words138 Views
Running head: COMPUTER SECURITY
Computer Security: Melbourne IT Attack
Name of the Student
Name of the University
Author Note
Computer Security: Melbourne IT Attack_1
1
COMPUTER SECURITY
Table of Contents
Introduction..........................................................................................................................2
1. DDoS Attack....................................................................................................................2
2. Melbourne IT DDoS attack.............................................................................................5
Conclusion...........................................................................................................................7
References............................................................................................................................8
Computer Security: Melbourne IT Attack_2
2
COMPUTER SECURITY
Introduction
A distributed denial of service or DDoS attack can be described as a malicious attempt
that aims in disrupting the normal traffic of a particular network, server of its surrounding
infrastructure. A DDoS attack floods the surrounding network infrastructure with a flooded
internet traffic that disrupts the normal operation of that network or server. Effectiveness in
DDos attack is generally achieved by the making use of a number of compromised systems as a
source of attack traffic (Moustis & Kotzanikolaou, 2013). A high level DDoS attack can be
related to a traffic jam that prevents the regular movements of traffic. An attacker will need to
gain a complete control of a network to enforce a DDoS attack. The report will be discussing the
concepts of DDoS attack and will give an overview of the Melbourne IT attack that took place in
April 2017. The outcome and the impact of the Melbourne IT attack will be discussed in the
following sections.
1. DDoS Attack
Distributed denial of service attack is a primary concern associated with the use of
internet. It can be described as a cyber attack that is being attempted with an aim of
compromising the network traffic of an organization (Wang et al., 2015). The distributed denial
of service attack is a subclass of the denial of service attack and it involves a number of multiple
connected and online devices which is collectively known as botnet.
For enforcing a DDoS attack, the attacker needs to gain a complete control of a network
associated with online machines (Wong & Tan, 2014). After establishing the botnet, the attacker
gains a control on the machines associated with the server thus jamming the entire network. The
botnet that is created targets the IP address of the victim computer and sends out continuous
Computer Security: Melbourne IT Attack_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security: DDoS Attacks
|11
|2444
|233

DoS and DDoS: Modern Cyber-Attacks and Future Research
|3
|2615
|42

Understanding DoS and DDoS Attacks
|4
|834
|488

Denial-Of-Service and Distributed Denial-Of-Service Attacks
|5
|675
|90

Hackers Without Borders: A Legal Response
|11
|2715
|251

Security threats Assignment PDF
|17
|5254
|133