Verified Document

DDOS Attacks Computers, Computer Networks, Term Paper

Internet-based DOS attacks can more easily be distributed, meaning there can be multiple machines (often hundreds or thousands, some of them "enslaved" through viruses) sending communications to a particular website -- or technically, to the server on which the site is stored -- that simply overload the server's capacity and could cause it to crash or simply to provide communications that are too slow to be intelligible (Roebuck, 2005; Cross, 2008; Raghavan & Dawson, 2011). The possibilities and the distance involved make Internet DOS attacks more complex, but with the proper know-how they can be easier to achieve consistently for attackers (Roebuck, 2005). Preventing DOS attacks can be all but impossible, especially in an Internet setting, but taking steps to ensure that a website/server can easily recover from a DOS attack and restore reliable service to users can help reduce the likelihood of that being targeted -- if the attack cannot have much of an effect, it isn't worth much effort (Vaughan-Nichols, 2010). In order to accomplish this, a consistent recommendation among it security experts is to have the latest and greatest technologies and services available, from hosting services to network gateways and firewalls and whatever other pieces of hardware and software architecture are involved in keeping a website live or a network running (Vaughan-Nichols, 2010; Schwartz, 2012). This, combined with planning that includes back-up means of serving consumer/business needs and an understanding of the lack of control when it comes to confronting...

Though they are not directly destructive, they can create enormous costs and losses for businesses and all manner of other organizations, and it is necessary to be prepared for the possibility of such an attack on any website or computer network. The research presented above yields recommendations of regularly updating all elements of a website or networks architecture and having a backup plan ready, but these are the only ways to effectively combat DOS attacks. For now, the attackers have the advantage.
References

Cross, M. (2008). Scene of the Cybercrime. Burlington, MA: Elsevier.

Roebuck, T. (2005). DoS and DDoS Attacks. Computer Crime Research Center. Accessed 8 September 2012. http://www.crime-research.org/articles/network-security-dos-ddos-attacks/

Raghavan, S. & Dawson, E. (2011). An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. New York: Springer.

Schwartz, M. (2012). 10 Strategies to Fight Anonymous DDoS Attacks. InformationWeek. Accessed 8 September 2012. http://www.informationweek.com/security/vulnerabilities/10-strategies-to-fight-anonymous-ddos-at/232600411?pgno=1

Vaughan-Nichols, S. (2010). How to try to stop DDoS Attacks. ZDNet. Accessed 8 September 2012. http://www.zdnet.com/blog/networking/how-to-try-to-stop-ddos-attacks/440

Sources used in this document:
References

Cross, M. (2008). Scene of the Cybercrime. Burlington, MA: Elsevier.

Roebuck, T. (2005). DoS and DDoS Attacks. Computer Crime Research Center. Accessed 8 September 2012. http://www.crime-research.org/articles/network-security-dos-ddos-attacks/

Raghavan, S. & Dawson, E. (2011). An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. New York: Springer.

Schwartz, M. (2012). 10 Strategies to Fight Anonymous DDoS Attacks. InformationWeek. Accessed 8 September 2012. http://www.informationweek.com/security/vulnerabilities/10-strategies-to-fight-anonymous-ddos-at/232600411?pgno=1
Vaughan-Nichols, S. (2010). How to try to stop DDoS Attacks. ZDNet. Accessed 8 September 2012. http://www.zdnet.com/blog/networking/how-to-try-to-stop-ddos-attacks/440
Cite this Document:
Copy Bibliography Citation

Related Documents

Strategies to Detect and Mitigate DDOS Attacks
Words: 2538 Length: 7 Document Type: Research Paper

Detecting, Preventing or Mitigating Distributed Dos (DDOS) Attacks The Internet continues to be a critical subject due to the increasing attacks based on the major universal communication infrastructures. This study identifies the one detection and two mitigation approaches in developing content to show that DDoS are becoming common in daily business operations. Rationale for selecting the papers The first research paper I selected is titled "Mitigating Dos Attacks Using Performance Model-Driven Adaptive Algorithms"

Computer Security Over the Last Several Years,
Words: 695 Length: 2 Document Type: Essay

Computer Security Over the last several years, cyber attacks have been continually rising. This is in response to emerging threats from nations such as China who are increasing their attacks on government and military installations. According to James Clapper (the Director of National Intelligence) these threats have become so severe that they are surpassing terrorism as the greatest challenge facing the nation. To fully understand what is occurring requires focusing on

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Cloud Computing to Combat DDOS
Words: 3088 Length: 10 Document Type: Research Paper

Monitoring the type of DDoS attack, the frequency of the attack, duration of attack, and the aggressiveness of the attack all provide clues as to whom may be instituting the attack. The packet stream can be disrupted by the victim by 'pretending' to go offline to the protocol receiving the bandwidth from that particular attack. The rerouting of using available bandwidth to other protocols via an alternative port can

2007 Estonia Cyber Attacks
Words: 2990 Length: 10 Document Type: Term Paper

Estonia Cyber Attacks 2007 2007 Estonian Cyber-war This is the information age. In this age, the Internet has smoothened the progress of spectacular increases in global interconnectivity and communication. This form of globalization also yielded benefits for Estonia by improving the standard of living of its people. However, other than benefits, it has also ascended the availability of new weapons of confrontation for groups who have been seeking and opposing certain Estonian

Business Environment and Attacks
Words: 2876 Length: 8 Document Type: Research Paper

Auditing, Monitoring, and Detecting of Dos or DDoS Attacks A Dos (denial of service attack) is an attempt to make network or machine resources non-available to legitimate users. Attackers use the Dos to accomplish their goals by flooding the target resources or machines with the superfluous requests or useless packets to overload the systems and prevent users to fulfill their legitimate requests. When Dos originates from a single network or host

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now