The packet stream can be disrupted by the victim by 'pretending' to go offline to the protocol receiving the bandwidth from that particular attack. The rerouting of using available bandwidth to other protocols via an alternative port can remove the ramifications of the attack.
Applying the aforementioned framework within the cloud environment offers an unprecedented level of security enabling the transmission and storage of information in an environment where DDoS is actively monitored and attacks are recognizable. The strategy of using the cloud ostensibly removes the bottleneck constriction due to the lack of physical infrastructure such as a server that purports a chokepoint should an attacker stream an abundance of packet information to the target server.
According to Koutepas, Stamatelopoulos, & Maglaris (2004), "Management-wise DDoS attacks present an interesting challenge since their nature makes them difficult to stop by the efforts of a single site. Factors that contribute to this are: (a) attackers most of the time spoof packet source IP's address; (b) the possibility of the attack initiating from a wide range of networks worldwide; and (c) the in ability of a domain to enforce incoming traffic shaping; detected malicious flows can be blocked locally but the assistance of the upstream network is still needed in order to free the resources occupied on the incoming link. (Koutepas, Stamatelopoulos, Maglaris, 2004)
When attempting to counter a DDoS, the specific attack characteristics have to be determined locally and communicated to networks on the attack path (possibly through attack-congested lines) in order to take appropriate measures. According to the site's security policies the typical reactions implemented usually consist of setting up tailor-made blocking or throttling filters on active network components. Still, no matter how effective this response will be, the bandwidth penalty is present on all the domains along the attack path. To alleviate the resulting congestion extra steps must be taken and contacts must be made between these networks. The further we move from the victim, the more dispersed this procedure becomes and there is less immediate interest from the domains to help." (Koutepas, Stamatelopoulos, Maglaris, 2004)
Security considerations, according to Koutepas, Stamatelopoulos, Maglaris (2004), include "An attacker orchestrating a DDoS attack could "tune into" the right Multicast group (the one used by the Entities) and listen for signs of detection and response communications. Knowing such information could make it possible to direct the hostile machines to new attack patterns so that the malicious traffic can elude any newly installed filters. Another concern is that fake alert messages describing nonexistent events could initiate Entity responses to hinder legitimate traffic." (Koutepas, Stamatelopoulos, Maglaris, 2003)
According to Fonseca (2001), "Asta Networks will unveil Vantage System, its new DDoS -- prevention offering, this month. Deployed at various points in an enterprise or service provider network, Vantage System is a hardware appliance that uses software to survey and "flag" traffic for known or unknown anomalies. The product features sensors, which direct suspicious activity, and the coordinator, which interfaces with a variety of sensors and reports back to the user. Devich says his defense system integrates with network management platforms through SNMP, as well as Cisco and Juniper routers. In the fight against DoS attacks, users may be able to deflect a deluge that could strike from any origination point through a managed service approach, says John Pescatore, vice president and research director of network security at Stamford, Conn.-based Gartner." (Fonseca, 2001)
According to Vijayan (2004), "The long-term answer to DDoS protection has to be in the [service provider] networks and backbones" said John Pescatore, an analyst at Stamford, Conn.-based Garnter, Inc. That's because upstream service providers are in a better position to detect and choke off traffic directed at a specific IP address, said Schneier. But putting in place extra server processing capacity to handle DDoS attacks can be expensive and is likely to make sense only for larger companies, Mockapetris said. "There's a bit of a digital divide when it comes to the ability of companies to defend themselves against these attacks," he said. As a result, it's a good idea to require service providers to offer some sort of guarantee against DDoS attacks, said Schneier. Gartner has in fact been advocating this for more than two years, urging users to include DDoS protection language in their service-level agreements with Internet service providers and data center hosting companies. But less than 1% of companies overall are buying such services, Pescatore said. "Most enterprises say, 'It isn't raining, so the roof isn't leaking. Why fix it?" he said." (Vijayan, 2004)
According to Gezelter (2000), "It has been reported that significant legal and technical hurdles prevent a quick, straightforward solution to DDoS attacks. It is often suggested that the anonymity offered by the Internet must be eliminated to prevent future attacks. Like a postcard, each message on the Internet, known...
Chase. Inside Wikileaks: My Time with Julian Assange at the World's Most Dangerous Website. New York, NY: Crown Publishers, 2011. Print. Retrieved on 21 February, 2013 from < http://www.amazon.co.uk/Inside-WikiLeaks-Assange-Dangerous- Website/dp/0224094017#reader_0224094017 Higgins, Melissa. Julian Assange: Wikileaks Founder. Edina, MI: ABDO Pub. Co, 2012. Internet resource. Retrieved on 21 February, 2013 from < http://books.google.co.uk/books?id=40YFSyEhBtMC&printsec=frontcover&dq=Julia n+Assange:+Wikileaks+Founder&hl=en&sa=X&ei=RwImUef5EsmqtAbiroGwAw& ved=0CC0Q6AEwAA#v=onepage&q=transparency&f=false Leigh, David, Luke Harding, Edward Pilkington, Robert Booth, and Charles Arthur. Wikileaks: Inside Julian Assange's War on Secrecy. New York: Public Affairs, 2011. Internet resource. Retrieved on
Wikileaks Ethics issues raised by the conduct of the American government in dealing with Wikileaks and Assange The behavior of the American government towards Wikileaks raises serious ethical issues related to government intimidation of the private company. The founder of Wikileaks has also experienced a great deal of harassment in light of the Wikileaks scandal which has called into question the integrity of the American government in pursuing justice through means that
Wikileaks "If I had to choose between government without newspapers, and newspapers without government, I wouldn't hesitate to choose the newspapers." Thomas Jefferson Founded in 2006, WikiLeaks is a non-profit organization that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks. Recently, the site has been responsible for publishing a multitude of military intelligence as well as diplomatic cables. For example, the Wikileaks Iraq War Logs showed
Banking and WikiLeaks WikiLeaks is a global non-profit media association that distributes acquiescence of otherwise unavailable documents from nameless sources and leaks. Its website, which was started in 2006, is run by The Sunshine Press (WikiLeaks, 2011). In 2010, the director of WikiLeaks, Julian Assange, said that he planned to take down a main American bank and make known a network of dishonesty with a collection of data from an executive's
Wiki Leaks The whistle-blowing WikiLeaks is an online organization situated in Sweden; this organization distributed records termed "the diplomatic cables" from U.S. foreign negotiators on November 28, 2010. Upon their distribution, lawmakers from all corners of the U.S. political space censured the organization (Steinmetz). Within a brief time period, WikiLeaks turned into the biggest and most famous whistle-blowing organization on the planet. Due partially to the release of huge amounts of
Cybersecurity In October 2010, Wikileaks, an international organization that publishes submissions of private, secret, and classified media ("leaks") by anonymous sources, released "the Iraq War Logs," almost 400,000 documents which allowed major media outlets to map every death that took place in Iraq or Iran during the recent conflict. In November 2010, Wikileaks, released U.S. State Department diplomatic cables, creating an international scandal. The recent media coverage of these events
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now