10.3 - Denial of Service

 10.3 - Denial of service 

 

Key Terms: 

    • Denial-of-service attack – An attack that floods a computer with more packets than it can handle. 
    • Distributed denial-of-service attack – An attack that uses multiple computers and internet connections to flood target systems. 

 

Denial of Service Attack (DoS) 

This is when a hacker purposefully overloads a target computer/server with more packets than it can handle. This causes the target to become unavailable to legitimate connections. A DoS attack uses a single computer to attack a single target. 

 

Distributed Denial of Service Attack (DDoS) 

A DDoS attack performs the same job as a DoS attack however, the packets are sent from lots of different connections. Usually this is in the form of a network that a hacker has control of, like a botnet. A hacker would distribute specially designed malware that gives them an access point to be able to control the device remotely. 

 

Damage 

Both DoS and DDoS attacks can cause lots of damage to the target system, especially if the business relies on a web server. If the web server is down or slow, customers may not be able to buy products/services from the business, causing a loss of revenue. 

 

Motivation 

A denial-of-service attack does not give the hacker access to any resources on the network. However, they can be used as distractions as the network administration team may be focused on fixing the attack which provides the hacker a blind spot to infiltrate the network without being compromised. Another motivation could include defamation where the attacker’s main goal is to make the business look bad to its customers. 

 

Denial-of-Service Attack Types: 

    • Fragmentation attacks – This attack prevents packets from being reassembled. 
    • Volumetric attacks – Blocks traffic by taking up all available bandwidth between the target and the internet. 
    • Amplification attacks – Attacks that exploit vulnerable protocols. 
    • Application attacks – These attacks use up all of the resources that an application needs to run. 
    • TCP state exhaustion – These attacks target load-balances and firewalls. 

Comments

Popular posts from this blog

OSA Assignment 1 - Task 3 GUIDE

OSA Assignment 1 - Task 1 GUIDE

OSA Summer 2023 Mock - Task 1, Assignment 1