logo

Distributed Denial of Service Attack

   

Added on  2023-04-07

12 Pages2202 Words350 Views
Running head: DISTRIBUTED DENIAL OF SERVICE ATTACK
Distributed Denial of Service Attack
Name of the student:
Name of the university:
Author note:

1DISTRIBUTED DENIAL OF SERVICE ATTACK
Abstract
The following report is prepared to discuss the effect of Distributed Denial of Service Attack
on different platforms. To analyse it, the most massive DDoS attack that took place on
GitHub is chosen. The main reason for the attack is thus reflected and based on it the impact,
and accordingly, the steps taken to prevent a data breach is pointed out. The last part of the
report focusses on some techniques by which the future DDoS attacks can be prevented.

2DISTRIBUTED DENIAL OF SERVICE ATTACK
Table of Contents
Introduction:...............................................................................................................................3
Operation of the attack in the real world:...................................................................................3
Real world example of NTP Amplification attack:....................................................................6
Impact of the attack:...................................................................................................................7
Actions taken against the attack:............................................................................................7
Conclusion:................................................................................................................................9
References:...............................................................................................................................10

3DISTRIBUTED DENIAL OF SERVICE ATTACK
Introduction:
DDoS or Distributed denial of service is a cyber-attack that is performed on an
explicit server or system with the envisioned purpose of unsettling the network’s regular
operation (Sonar, K., & Upadhyay, 2014). The Distributed denial of service attack occurs by
overflowing the beset network or server with a persistent flood of circulation such as
fraudulent requests which overpowers the system instigating a disturbance or denial of
service to relevant traffic (Kolias et al., 2017). Thus it prevents the users from accessing the
websites creating a bad user experience. Hackers generate these delays over resource fatigue
where they yield up or exhaust all available bandwidth, diskette space or memory volume. A
successful Distributed denial of service attack is very dangerous, and it can even harm the
organisation’s reputation causing damage to the relationship between clients and breaching
important information of the company and the client as well. Smaller business can face
enormous damage leading to the financial loss which may even result up to the closing of the
business organisation. This report focuses on the detailed operation of the Distributed denial
of service attack and the possible measures that can be taken against it to prevent the attack in
future.
Operation of the attack in the real world:
A denial of service could be in the form of hijacking webservers, overloading ports
with request rendering them unusable, denying wireless authentication and denying any
services provided on the internet (De Donno et al.,2017). Attacks of such intent can be
performed with the help of a single machine as they are much easier to execute and monitor.
They are also easy to detect and mitigate issues. As these attacks can take place over multiple
devices spreading across multiple areas, it becomes difficult to stop this attack pointing out
the main culprit behind the attack.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Contemporary Cyber Security Issues
|11
|2056
|79

Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example
|10
|2158
|245

DoS and DDoS: Modern Cyber-Attacks and Future Research
|3
|2615
|42

Denial-Of-Service and Distributed Denial-Of-Service Attacks
|5
|675
|90

Advanced Network Security - DDos Mechanism | Assignment
|5
|857
|149

An Active Defense Mechanism for TCP SYN flooding attacks
|6
|3528
|82