9iceunity » Forum | What is Denial of Service (DoS) Attack?

Welcome Guest, Please REGISTER or LOGIN To View Hidden Items


AWOOF:- New MTN/ETISALAT/AIRTEL Unlimited Free Call/Browsing Code Now Available, Join Our WhatsApp Channel Asap to Get it CLICK HERE (C0022EF41)

CALL: 08088913875
WHATSAPP: 08088913875

Join 9iceunity On Whatsapp For Music, News, Videos Updates & Sure Betting Tips
Forum » WAPMASTER WEBDESIGN | SCRIPT CODING ZONE
What is Denial of Service (DoS) Attack?
Views: 1233  |  Comments: 2 |  Posted: 07:22 Fri, 25 Apr 2014
Photo Kunlessi (¥ 23611 NU)
Star:Ultimate ult
Created Topics: 2325
Replies: 119
Posted on: 07:22 Fri, 25 Apr 2014

If you are working in the field of computer networks or an enthusiast in the field of network security, you are sure to have come across the term “Denial of Service attack” which is simply referred to as “DoS attack”. Today, this is one of the most common types of network attacks carried out on the Internet. In this post, I will try to explain DoS attack, its variants and methods involved to carry out the same in an easily understandable manner.

What is a DOS Attack?

Denial of Service or DoS attack is a type of network attack designed to flood the target network or machine with a large amount of useless traffic so as to overload it and eventually bring it down to its knees. The main intention behind DoS attack is to make the services running on the target machine (such as a website) temporarily unavailable to its intended users. DoS attacks are usually carried out on web servers that host vital services such as banking, e-commerce or credit card processing.

A common variant of DOS attack known asDDoS (Distrbuted Denial of Service)attack has become quite popular in the recent days as it is more powerful and hard to detect. A typical DoS attack has a single place of origin while a DDoS attack originates from multiple IP addresses distributed across two or more different network. The working of a DDoS attack is shown in the following diagram:
Unlike a DoS attack where the attacker uses one single computer or a network to attack the target, a DDoS the attack originates from different pre-compromised computers belonging to different networks. As the attacker uses a number of computer systems from different networks each residing in different geographical locations, the incoming traffic looks natural and therefore becomes hard to detect.

Protection Against DoS/DDoS Attacks:

DoS attacks can easily be handled by blacklisting the target IP (or range of IPs) that are found to be making too many requests/connections (in an unnatural way) to the server. However, DDoS attacks are complicated as the incoming requests seem more natural and distributed. In this case it is hard to find the difference between the genuine and malicious traffic. Taking an action at the firewall level to blacklist suspected IPs may result in false positives and therefore may affect the genuine traffic as well.
Methods Involved in DoS Attack:
The following are some of the commonly employed methods in carrying out a DoS attack:

*.SYN Flood Attack
*.Ping Flood Attack (Ping of Death)
*.Teardrop Attack
*.Peer-to-Peer Attacks

owner
[download]
You Might Also Like This:-








Please dont forget to click the share button

Replies

Photo Razaki (¥ 3 NU)
Star: Novice
Created Topics: 0
Replies: 1
Posted on: 07:22 Fri, 25 Apr 2014
Gud
User

Photo Rmbj (¥ 45 NU)
Star: Enthusiast ent
Created Topics: 0
Replies: 15
Posted on: 07:22 Fri, 25 Apr 2014
Pls can I get tutorial on how to create a site? @ kunlessi
User


[1]

Please LOGIN or REGISTER To Add Replies