logo

Distributed Denial of Service

   

Added on  2023-06-06

10 Pages2237 Words162 Views
Theoretical Computer Science
 | 
 | 
 | 
Running Head: DDOS
1
Distributed Denial of Service
Distributed Denial of Service_1

DDOS
2
Contents
Introduction.................................................................................................................................................3
Overview of DDOS.......................................................................................................................................3
Steps involved in DDOS attack.................................................................................................................4
GitHub DDOS attack (Case study)................................................................................................................5
Methods to avoid DDOS attack....................................................................................................................7
Conclusion...................................................................................................................................................8
References...................................................................................................................................................9
Distributed Denial of Service_2

DDOS
3
Introduction
DDOS is defined as the distributed denial of service which is a part of a DOS assault.
It is one of the biggest security problems for any wireless and computer devices and the
rate of DDOS is growing rapidly since the last few years (Bawany, Shamsi, & Salah, 2017).
This type of attacks includes various hacking devices and algorithms which are also called
the botnet and in which hackers target online websites by sending traffic signals. The main
objective of this report is to understand the fundamental concept of DDOS and various
prevention techniques to reduce this type of problem (Bhuyan, Bhattacharyya, & Kalita,
2015). This report is divided into three parts, for example, the overview of DDOS, a recent
case study, and prevention methods.
Overview of DDOS
In a computer system, the distributed denial of services is a kind of attack in which
hacker design a network system that produces various traffic signals into user personal
servers. This is a very serious problem for an organization and it also impacts the user
personal information or data files (Kamikubo, & Saito, 2017). This type of security risk uses
flooding mechanism to block user’s computer systems and peripheral devices. DDOS
targets on business industries, banking servers, credit and debit cards, and online payment
methods (Kolias, Kambourakis, Stavrou, & Voas, 2017). A distributed denial of service
(DDoS) is a huge scale DoS assault where the culprit utilizes in excess of one remarkable IP
address, regularly a huge number of them (Mansfield, 2016). It likewise makes it very hard
to identify better client motion from attack movement when extend crosswise over such a
large number the source. As an option or enlargement of a DDoS, assaults may comprise
fashioning of IP dispatcher addresses additionally confusing recognizing and crushing the
assault (Modi, & Quadir, 2014).
Sometimes hacker utilizes a scheme of zombie PCs to undermine a meticulous Web
website. The attention is entirely clear that is hacker tells each one of the PCs on his botnet
to contact a exacting attendant (Saied, Overill, & Radzik, 2016). We judge this type of
Distributed Denial of Service_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Hackers Without Borders: A Legal Response
|11
|2715
|251

DDOS attack
|5
|1194
|491

Methods to Address Cybersecurity Issues in JL Organization
|13
|2416
|109

Computer Security: Melbourne IT Attack
|10
|2318
|138

Network Devices Security: Threats, Potential Damages, and Mitigation Strategies
|6
|1897
|178

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491