DDOS Attacks Computers, Computer Networks, Term Paper

PAGES
3
WORDS
861
Cite

Internet-based DOS attacks can more easily be distributed, meaning there can be multiple machines (often hundreds or thousands, some of them "enslaved" through viruses) sending communications to a particular website -- or technically, to the server on which the site is stored -- that simply overload the server's capacity and could cause it to crash or simply to provide communications that are too slow to be intelligible (Roebuck, 2005; Cross, 2008; Raghavan & Dawson, 2011). The possibilities and the distance involved make Internet DOS attacks more complex, but with the proper know-how they can be easier to achieve consistently for attackers (Roebuck, 2005). Preventing DOS attacks can be all but impossible, especially in an Internet setting, but taking steps to ensure that a website/server can easily recover from a DOS attack and restore reliable service to users can help reduce the likelihood of that being targeted -- if the attack cannot have much of an effect, it isn't worth much effort (Vaughan-Nichols, 2010). In order to accomplish this, a consistent recommendation among it security experts is to have the latest and greatest technologies and services available, from hosting services to network gateways and firewalls and whatever other pieces of hardware and software architecture are involved in keeping a website live or a network running (Vaughan-Nichols, 2010; Schwartz, 2012). This, combined with planning that includes back-up means of serving consumer/business needs and an understanding of the lack of control when it comes to confronting...

...

Though they are not directly destructive, they can create enormous costs and losses for businesses and all manner of other organizations, and it is necessary to be prepared for the possibility of such an attack on any website or computer network. The research presented above yields recommendations of regularly updating all elements of a website or networks architecture and having a backup plan ready, but these are the only ways to effectively combat DOS attacks. For now, the attackers have the advantage.

Sources Used in Documents:

References

Cross, M. (2008). Scene of the Cybercrime. Burlington, MA: Elsevier.

Roebuck, T. (2005). DoS and DDoS Attacks. Computer Crime Research Center. Accessed 8 September 2012. http://www.crime-research.org/articles/network-security-dos-ddos-attacks/

Raghavan, S. & Dawson, E. (2011). An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. New York: Springer.

Schwartz, M. (2012). 10 Strategies to Fight Anonymous DDoS Attacks. InformationWeek. Accessed 8 September 2012. http://www.informationweek.com/security/vulnerabilities/10-strategies-to-fight-anonymous-ddos-at/232600411?pgno=1
Vaughan-Nichols, S. (2010). How to try to stop DDoS Attacks. ZDNet. Accessed 8 September 2012. http://www.zdnet.com/blog/networking/how-to-try-to-stop-ddos-attacks/440


Cite this Document:

"DDOS Attacks Computers Computer Networks " (2012, October 09) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/ddos-attacks-computers-computer-networks-75835

"DDOS Attacks Computers Computer Networks " 09 October 2012. Web.18 April. 2024. <
https://www.paperdue.com/essay/ddos-attacks-computers-computer-networks-75835>

"DDOS Attacks Computers Computer Networks ", 09 October 2012, Accessed.18 April. 2024,
https://www.paperdue.com/essay/ddos-attacks-computers-computer-networks-75835

Related Documents

Detecting, Preventing or Mitigating Distributed Dos (DDOS) Attacks The Internet continues to be a critical subject due to the increasing attacks based on the major universal communication infrastructures. This study identifies the one detection and two mitigation approaches in developing content to show that DDoS are becoming common in daily business operations. Rationale for selecting the papers The first research paper I selected is titled "Mitigating Dos Attacks Using Performance Model-Driven Adaptive Algorithms"

Network Security
PAGES 8 WORDS 3486

Network Security History and Evolution of Network Security: The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include

Computer Security Over the last several years, cyber attacks have been continually rising. This is in response to emerging threats from nations such as China who are increasing their attacks on government and military installations. According to James Clapper (the Director of National Intelligence) these threats have become so severe that they are surpassing terrorism as the greatest challenge facing the nation. To fully understand what is occurring requires focusing on

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Network Security Systems for Accounting Firm Vulnerabilities Assessment In the contemporary IT environment, the implementation of the IT tools has become an effective strategy that organizations employ to achieve competitive market advantages. In other words, the IT tools have become an effective strategy that organizations can employ to be ahead of competitors, and be first in the market. One of the crucial features of the information systems is the network connectivity that

Monitoring the type of DDoS attack, the frequency of the attack, duration of attack, and the aggressiveness of the attack all provide clues as to whom may be instituting the attack. The packet stream can be disrupted by the victim by 'pretending' to go offline to the protocol receiving the bandwidth from that particular attack. The rerouting of using available bandwidth to other protocols via an alternative port can