Sunday 31 July 2016

Unknown

What is Denial of Service (DoS) Attack?

Denial of Service

If you are working in the field of computer networks or an enthusiast in the field of network security, you are sure to have come across the term “Denial of Service attack” which is simply referred to as “DoS attack”. Today, this is one of the most common types of network attacks carried out on the Internet. In this post, I will try to explain DoS attack, its variants and methods involved to carry out the same in an easily understandable manner.


What is a DOS Attack?

Denial of Service or DoS attack is a type of network attack designed to flood the target network or machine with a large amount of useless traffic so as to overload it and eventually bring it down to its knees. The main intention behind DoS attack is to make the services running on the target machine (such as a website) temporarily unavailable to its intended users. DoS attacks are usually carried out on web servers that host vital services such as banking, e-commerce or credit card processing.
A common variant of DOS attack known as DDoS (Distributed Denial of Service) attack has become quite popular in the recent days as it is more powerful and hard to detect. A typical DoS attack has a single place of origin while a DDoS attack originates from multiple IP addresses distributed across two or more different network. The working of a DDoS attack is shown in the following diagram;
DDoS Attack
Unlike a DoS attack where the attacker uses one single computer or a network to attack the target, a DDoS the attack originates from different pre-compromised computers belonging to different networks. As the attacker uses a number of computer systems from different networks each residing in different geographical locations, the incoming traffic looks natural and therefore becomes hard to detect.

Protection Against DoS/DDoS Attacks:

DoS attacks can easily be handled by blacklisting the target IP (or range of IPs) that are found to be making too many requests/connections (in an unnatural way) to the server. However, DDoS attacks are complicated as the incoming requests seem more natural and distributed. In this case it is hard to find the difference between the genuine and malicious traffic. Taking an action at the firewall level to blacklist suspected IPs may result in false positives and therefore may affect the genuine traffic as well.

Methods Involved in DoS Attack:

The following are some of the commonly employed methods in carrying out a DoS attack:
  • SYN Flood Attack
  • Ping Flood Attack (Ping of Death)
  • Teardrop Attack
  • Peer-to-Peer Attacks

Unknown

About Unknown -

is a digital marketer/ethical hacker and top Blogger in Nigeria. He makes money from online businesses. You can connect with him on Fb, Twitter, LinkedIn,Instagram,YouTube and Google+.

Subscribe to this Blog via Email :

6 comments

Write comments
Anonymous
AUTHOR
19 August 2017 at 01:03 delete


If you need to hire a real hacker to help spy on your partner's cell phone remotely, change your grades or boost your credit score. Contact this helpline 347.857.7580 or the email address expressfoundations@gmail.com

Reply
avatar
Hilary Jonas
AUTHOR
27 August 2017 at 23:24 delete

I basically think we all dont have to face all the deceits and lies from our spouse…in a case of mine when i got sick and tired of all the lies and deceit i had to contact a friend of mine to get me the contact of one of the best hackers in the states ..then i met @ blackhatthacker@gmail.com..She saved me from the lies of my cheating girlfriend by hacking her phone number,Emial,Whatsapps and Facebook account. You can contact her for any hack problems and you consider it done soon as you send your first email to her. Tell her Keisha referred you to her

Reply
avatar
Anonymous
AUTHOR
18 July 2018 at 15:24 delete

VERIFIED HACKERS
Finding a true hacker could be almost an impossible task these days, but with the help of our over a decade survey you are 100% safe...
visit this site below so your not misled...Avoid being cheated, hire a VERIFIED HACKER only.
hireverifiedhacker . wordpress . com/hire-a-hacker/

HOW TO KNOW YOU HAVE BEEN HACKED AND WHAT TO DO
dont be among those whose devices have been hacked yet are ignorant of it
visit this link below to ensure your safe..
hireverifiedhacker . wordpress . com/how-to-know-you-have-been-hacked/

WORLD CLASS PEDIGREE HACKERS
times come when one seriously and urgently needs the services of a world class pedigree hacker
our research showed more than 70% end up in the hands of scammers,
25% gets tired of the search and give up while just less than 2% truely meet REAL HACKERS..
visit the link below would be of help to you....
hireverifiedhacker . wordpress . com/hire-a-hacker/

Reply
avatar
Unknown
AUTHOR
21 February 2019 at 13:44 delete

ARE YOU IN NEED OF A LEGIT HACKER THAT CHARGES LESS CONTACT ON INSTAGRAM @RASCO_INC OR WHATSAPP @+13159362995 THEY ARE THE BEST I KNOW

Reply
avatar
topley
AUTHOR
16 July 2019 at 11:53 delete

Money Transfer Service

Bank Transfers / Western Union Transfer / Wire Transfer / Bank Logins / PayPal Transfer / Money Gram are now available to the following countries :

USA, UK, EU, Canada, Australia, Russia, Netherlands, China, Malaysia, France, Thailand, Ukraine, Nigeria

Our Services for Worldwide and we exclusively deal with Western Union / Money Transfer / Bank Logins / CVV, Fullz / Money Gram. The global nature of our service enables us to interact with clients all over the world who have access to our services. Our proxy dealers process your transfer request(s) and we subsequently provide you with the details of your transfers the transactions are carried out in 1-2 hours. Our services are available 24/7/365 we strive to build a strong relationship with our clients.

Services We Provide to our valuable Clients:

Bitcoin Transfer
Wire Bank Transfer
Paypal Transfer
Western Union Transfer
Skrill Transfer
Carding
Credit Card (cc) for sale
Random CC for sale
Fullz for sale
Bank logins with High Balance selling
Teaching
GMAIL / Facebook
Whatsapp / Instagram

We also teaching all type of Hacking within a few days.
We are providing our work then make a deal.
Only serious / needy people contact us.

Support 24/7

Email - topley994@gmail.com

Reply
avatar
Cyber Zone
AUTHOR
26 August 2022 at 20:44 delete

Hello World !
Good Day !

Keep you services updated & reliable with my stuff
Huge stuff of Tools, E-boooks, Tutorials, Scripting, Viruses, Spying e.t.c

See Me On
I C Q :> 752822040
Tele-Gram :> @killhacks

Many other stuff like
SSN/DL
ID's
CC CVV
DUMPS
Combos/I.P's/Proxies
You can get from my collections :-)

No one TEACH you
No one GUIDE you
No one BOOST you
But I'm always here for you

Hit me up for you desired stuff
I C Q here :> 752 822 040
Tele-Gram here :> @killhacks

%Waiting for you guys%

Reply
avatar