logo

Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example

Develop a detailed walkthrough of a chosen attack type (DDoS or Worm) and analyze a real-world incident of that attack type.

10 Pages2158 Words245 Views
   

Added on  2023-06-07

About This Document

This report provides an overview of Distributed Denial of Service (DDoS) attack, its working, components, and a real world example of Operation Ababil. It emphasizes the importance of computer security and ways to mitigate DDoS attacks. The report covers the impact of DDoS attacks on the availability of data and how it affects the brand image. It also discusses the need to maintain confidentiality, integrity, and availability of information.

Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example

Develop a detailed walkthrough of a chosen attack type (DDoS or Worm) and analyze a real-world incident of that attack type.

   Added on 2023-06-07

ShareRelated Documents
[Type the company name]
Computer security
Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example_1
1 | P a g e
Table of Contents
Introduction................................................................................................................................1
An overview on DDoS...............................................................................................................1
Working of the attack.............................................................................................................2
One real world example.............................................................................................................4
Conclusion..................................................................................................................................6
References..................................................................................................................................7
Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example_2
2 | P a g e
Introduction
Computer security is a protection that safeguards the system, hardware, software and
networks from all the malicious attacks. The need of computer security is increasing day by
day because cyber-crimes are also increasing. Thus, it is necessary to protect all the
information as organisations and enterprises completely rely over network for keeping their
information private (Schwartz, 2017). The role of computer security is to maintain
confidentiality, availability and integrity of information. The vulnerabilities and attacks are
increasing day by day. One such attack that is considered in this report is distributed denial
of service. It is an attack that makes the resources and services unavailable from the valid
user. DDoS attack is difficult to detect as in this system is fooled from the attacker by
sending huge amount of traffic to the victims computer. In this report, one real life example
of DDoS that is operation ababil is discussed.
An overview on DDoS
Distributed denial of service is an attack that has penetrated in the real world. It
makes many web applications and services unavailable from the user for a time slot. It is
caused due to many infected computers on the internet that are under the control of hackers
(Alieyan, Kadhum, Anbar, Rehman & Alajmi, 2016). It basically targets servers and do not
allow legitimate users to access the information. Theses attacks take place silently as even
the owners of computer are not aware that their system is being access by third party
(Alieyan, Kadhum, Anbar, Rehman & Alajmi, 2016). This attack is carried by increasing
eth traffic over the web or flooding it with many requests in order to degrade the service.
Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security: DDoS Attacks
|11
|2444
|233

Computer Security: Melbourne IT Attack
|10
|2318
|138

ITC595 Research Project (Distributed Denial of Service Attacks)
|6
|3302
|205

Computer Security: Understanding Distributed Denial of Service Attack
|13
|2230
|463

An Active Defense Mechanism for TCP SYN flooding attacks
|6
|3528
|82

Information Security Management: Network Attacks and Ransomware Attack
|8
|2655
|84