MARTIN PAOLO A. LAPORGA
RICHARD GRIFFITHS
12/13/12
This paper provides a general overview of denial-of-service attacks in which the primary goal of the attack is to remove or limit the victim’s access to a particular service or resource. The paper also provides an overview of on methods of attack and its impacts. It also includes information that may assist you on how to respond to such an attack.
DESCRIPTION
"Denial-of-service" attacks are commonly characterized by an explicit attempt by hackers to prevent legitimate users of a service or resource from using them. It is also an effort to make one or more computer systems unavailable. It is typically targeted at web servers, but it can also be used on mail servers, name servers, and any other type of computer system. Denial of service (DoS) attacks may be started from a single machine, but they typically use many computers to carry out an attack. Since most servers have firewalls and other security software installed, it is easy to lock out individual systems. Therefore, distributed denial of service (DDoS) attacks are often used to coordinate multiple systems in a simultaneous attack. A distributed denial of service attack tells all coordinated systems to send a continuous stream of requests to a specific server all at the same time. These requests may be a simple ping or a more complex series of packets. If the server cannot respond to the large number of simultaneous requests, incoming requests will eventually become queued. This backlog of requests may result in a slow response time or a no response at all. When the server is unable to respond to legitimate requests, the denial of service attack has succeeded.
Examples include: * attempts to "flood" a network, thereby preventing or slowing legitimate network traffic * attempts to disrupt o prevent connections between two machines, thereby disrupting or preventing access to a service * attempts to stop a