logo

DoS and DDoS: Modern Cyber-Attacks and Future Research

Provide a complete report on denial of service and distributed denial of service attacks, including an overview of the technology involved, relevant technologies and applications, challenges/problems, identification of gaps in the literature, and future research directions.

3 Pages2615 Words42 Views
   

Added on  2022-12-29

About This Document

This report discusses the modern cyber-attacks of DoS and DDoS, their impact on organizations, and future research directions for detection and mitigation.

DoS and DDoS: Modern Cyber-Attacks and Future Research

Provide a complete report on denial of service and distributed denial of service attacks, including an overview of the technology involved, relevant technologies and applications, challenges/problems, identification of gaps in the literature, and future research directions.

   Added on 2022-12-29

ShareRelated Documents
DoS and DDoS
(Author)
(Please fill college details)
ABSTRACT – The below stated report will
deal with the modern ongoing cyber-attacks
focusing on the two types of attacks that are
DoS and DDoS. The important focus areas
are explained in the project along with the
future research methodologies.
Keywords DoS, DDoS, Applications,
Challenges, Future Aspects
INTRODUCTION
This report deals with the network
vulnerabilities that is mainly used by the hackers
mainly to extort money from certain organizations
that relies on the websites which are accessible.
Many legitimate businesses are facing this type of
problem in modern times. This report deals with
the two types of major network vulnerabilities that
persists now a days which are likely to be Denial
of Service and Distributed Denial of Service. The
further report will elaborately describe the various
aspects of these two attacks.
A. Explanation of the theories
The Denial of Service (DoS) attacks are said to
be the form of the cyber-attack in which hackers
makes the network environment or firewall of the
network to be temporarily useless as well as
unavailable to others by creating disruption,
jamming, flooding as well as crashing the server
to not using it (Zhang et al., 2015). The prevention
of the denial of service is mainly impossible. This
is due to the fact that the network is of distributed
structure that is each node of a network is
incorporated with other networks that further
connects to other networks. The control of a
firewall administrator is very limited to the local
elements present in the network.
Moreover the Distributed Denial of Service
(DDoS) works more commonly like a DoS attack
but the process of DoS follows the procedure of
the congestion to be distributed from one
computer whereas the DDoS sends the congestion
from many computers within the network
environment (Yi et al., 2016). This happens due to
the fact that most of the servers possess a
recognition system regarding pattern that
prevents many requests from a same source. The
DDoS is the attack has affected most of the great
web servers like Microsoft as well as Yahoo.
B. DoS Attack
DoS Attack may be categorized with the help of
two accurate approaches that is denying the
access through the crashing of a service by
exploitation or through flooding of the services to
that point which the system has no access. When
a denial of service attack happens the machine
gets automatic shutdown thus making it
inaccessible for the end users. The identified
victims of this attack is said to be the servers in
the fields of commerce, banking as well as media
companies. These attack also focused on the
government as well as trade organizations. The
most popular flood attacks include the stated
methodologies.
Attacks regarding buffer overflow: This is
stated as the most common DoS attack.
The concept of this type of attack is to
send maximum number of traffic to the
network environment thus providing
congestion to the network environment. It
also includes the designing of exploited
bugs for specific applications present in the
network environment.
ICMP Flood: This type of attack leverages
the misconfigured devices in the network
through continuous sending of spoofed
packets on the computers that are present
in the network which is targeted. The
amplification of the traffic is done by
triggering the network.
SYN Flood: This type of attack always
sends request regarding connection of the
server but the handshake is not completed.
Moreover DoS attacks basically exploits the
vulnerabilities that tends to crash the targeted
server. Due to this type of attack the systems
present in a network gets extremely destabilized
in such a manner that it can’t be accessed as well
as used.
C. DDoS Attack
Another elementary type of the DoS attack may
be stated as the Distributed Denial of Service. This
is an attack that is quite similar to DoS
(Alkasassbeh et al., 2016). In this attack multiple
systems are targeted by a single target. The host
distribution that mainly defines a DDoS attack,
helps the attacker with multiple advantages:
The attacker can leverage a maximum amount of
machine to create disruption to the systems.
The detection of the attack location is very difficult as
there are attacking systems distribution is done on a
random basis.
The shutting down of the multiple machines is not
possible at a single instance.
The identification of the real party that visualized the
attack is very difficult.
LITERATURE REVIEW
According to Yan et al., (2016), as Cloud
Computing is a technological field that is
continuously growing as well as it has become an
DoS and DDoS: Modern Cyber-Attacks and Future Research_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security: Understanding Distributed Denial of Service Attack
|13
|2230
|463

IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61

Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example
|10
|2158
|245

Hackers Without Borders: A Legal Response
|11
|2715
|251

Denial of Service and Distributed Denial of Service Attacks
|4
|586
|366

Network System Attacks Course 2022
|7
|1310
|21