Denial-of-service (DDoS) attack fundamental

One of the term mentioned quite often in IT security industry is DoS or Denial of Service Attack. It is good to have some basic understanding on DoS. Following are some of the key ideas of this security attack found in resources available in the Internet.

Basically DoS attack is an attempt to make a machine or network resource unavailable to its intended users and can interrupt network service for a long period of time.

The common form of DoS attacks is Distributed Denial-of-Service attack (DDoS attack). DDoS can completely bar access to Internet for an organization and hinder its productive operations. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of a computer and launch large-scale attacks. He or she could then force the computer to send huge amounts of data to a website or send spam to particular email addresses. The attack is "distributed" because the attacker is using multiple computers, including yours, to launch the denial-of-service attack.

The United States Computer Emergency Readiness Team (US-CERT) defines symptoms of denial-of-service attacks to include:

- Unusually slow network performance (opening files or accessing web sites)
- Unavailability of a particular web site
- Inability to access any web site
- Dramatic increase in the number of spam emails received

The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information and usually lead to a server overload. When you type a URL for a particular website into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.

Common methods of DoS attacks include syn attack, UDP flood, syn flood attack, Http get attacks, UDP attack, Web application attack and many more. In general terms, the attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

When the DoS Attacker sends many packets of information and requests to a single network adapter, the bandwidth of a router between the Internet and a LAN may be consumed by an attack, compromising not only the intended computer, but also the entire network. In this case, each computer in the network would experience effects from the DoS attack.

Comments

Popular Posts