Access over 20 million homework & study documents

20170321120247denial Of Service Attacks

Content type
User Generated
Subject
Management
Type
Homework
Rating
Showing Page:
1/7
Running head: DENIAL OF SERVICE ATTACKS 1
Denial of Service Attacks
Name
Institution

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/7
DENIAL OF SERVICE ATTACKS 2
Denial of Service Attacks
Introduction
Denial of service attack refers to a spiteful attack to particular network traffic in such a
way that the authorized persons have difficulty in accessing the web services. Unlike the
Distributed Denial of Service (DDoS), which is completed from several compromised devices
that are distributed globally but in a botnet, the denial of service attack is technically launched
from a distinct point. The latter can be very costly if it is handled inappropriately (Santanna et
al., 2015). For example, in the event that a legitimate user fails to access the service he or she
needs, he or she can be very disorganized and disillusioned. In addition, the attacker may set up
harmful content the systems just to manipulate a disk space and finally render the network
inoperative for all users.
Attack Types in an IT Company
Application Layer Attacks
These attacks have a key goal of crashing a web server by sending various GET and
POST requests that appear to be legitimate when in actual sense they are not. Such attacks may
include GET/POST floods, numerous attacks targeting the OpenBSD vulnerabilities and also
Apache, very low and slow attacks among others. The magnitude of such kind of attacks gets
measured regarding requests per second. The higher the number of requests per second that are
sent, the more a severe an attack appears to be.
Volume Based Attacks
The aim of these attacks is contained in the bandwidth of a network. The attacks may
crowd the bandwidth saturating it to prevent other users from getting access. Such attacks
include spoofed packet floods, the ICMP and also UDP floods. The magnitude of such an attack

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/7

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 7 pages?
Access Now
Unformatted Attachment Preview
Running head: DENIAL OF SERVICE ATTACKS Denial of Service Attacks Name Institution 1 DENIAL OF SERVICE ATTACKS 2 Denial of Service Attacks Introduction Denial of service attack refers to a spiteful attack to particular network traffic in such a way that the authorized persons have difficulty in accessing the web services. Unlike the Distributed Denial of Service (DDoS), which is completed from several compromised devices that are distributed globally but in a botnet, the denial of service attack is technically launched from a distinct point. The latter can be very costly if it is handled inappropriately (Santanna et al., 2015). For example, in the event that a legitimate user fails to access the service he or she needs, he or she can be very disorganized and disillusioned. In addition, the attacker may set up harmful content the systems just to manipulate a disk space and finally render the network inoperative for all users. Attack Types in an IT Company Application Layer Attacks These attacks have a key goal of crashing a web server by sending various GET and POST requests that appear to be legitimate when in actual sense they are not. Such attacks may include GET/POST floods, numerous attacks targeting the OpenBSD vulnerabilities and also Apache, very low and slow attacks among others. The magnitude of such kind of attacks gets measured regarding requests per second. The higher the number of requests per second that are sent, the more a severe an attack appears to be. ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4