Denial of Service and Distributed Denial of Service Attacks
Verified
Added on 2023/06/13
|4
|586
|366
AI Summary
This article discusses the types of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, their impact on network resources, and ways to mitigate them. It also highlights the differences between the two types of attacks and provides insights into various types of DDoS attacks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:DENIAL-OF-SERVICE AND AND DISTRIBUTED DENIAL-OF-SERVICE ATTACKS Denial of Service and Distributed Denial of Service Attacks [Name of the Student] [Name of the University] [Author note]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1DENIAL-OF-SERVICE AND AND DISTRIBUTED DENIAL-OF-SERVICE ATTACKS Denial-of-Service Attack: Denial-of-Service attack or DoS attack generally refers to the type of attack which is done so as to shut down a machine or a total network and initially making it inaccessible for the users who intends to use them (Zhang et al., 2015). This type of attack is generally done by flooding the targeted network or machine with traffic or by means of sending traffic so as to trigger the crash of the machine or the network. For both the cases the legitimate users are deprived from the using of the service of the resources they wish to use. DoS attacks can be classified into two types and this includes the flooding services and crashing services (Mantas et al., 2015). The flooding services are further classified into “Buffer overflow attacks”, “ICMP attack” and lastly “SYN attack”. Distributed Denial-of-Service Attack: Distributed Denial-of-Service attack or DDoS attack mainly refers to the attack that is associated with attacking a target by making use of multiple computer systems. The targets mainly include the server, website or other network resources (Yu, 2014). After selection of the target Denial of service attack is done for the users. In this type of attack the flooding of the target by messages, malformed packets or connections requests is done initially leading to the slowing down of the system. The system might even crash f shut down which is the main reason for denying of the services for the legitimate users (Osanaiye, Choo & Dlodlo, 2016). There are many types of DDoS attack and this includes the “Traffic attack”, “bandwidth attack”, “application attack”, “protocol attack” and many more. The basic difference between DoS and DDoS attack is that DoS attack makes use of one computer and one internet connection in order the flood the whole
2DENIAL-OF-SERVICE AND AND DISTRIBUTED DENIAL-OF-SERVICE ATTACKS system whereas in DDoS attack multiple computer and internet connections are used so as to flood the system.
3DENIAL-OF-SERVICE AND AND DISTRIBUTED DENIAL-OF-SERVICE ATTACKS References: Mantas, G., Stakhanova, N., Gonzalez, H., Jazi, H. H., & Ghorbani, A. A. (2015). Application- layerdenialofserviceattacks:taxonomyandsurvey.InternationalJournalof Information and Computer Security,7(2-4), 216-239. Osanaiye, O., Choo, K. K. R., & Dlodlo, M. (2016). Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework.Journal of Network and Computer Applications,67, 147-165. Yu, S. (2014).Distributed denial of service attack and defense(pp. 15-29). Springer New York. Zhang, H., Cheng, P., Shi, L., & Chen, J. (2015). Optimal denial-of-service attack scheduling with energy constraint.IEEE Transactions on Automatic Control,60(11), 3023-3028.