Pages

Sunday, 31 July 2016

What is Denial of Service (DoS) Attack?

Denial of Service

If you are working in the field of computer networks or an enthusiast in the field of network security, you are sure to have come across the term “Denial of Service attack” which is simply referred to as “DoS attack”. Today, this is one of the most common types of network attacks carried out on the Internet. In this post, I will try to explain DoS attack, its variants and methods involved to carry out the same in an easily understandable manner.


What is a DOS Attack?

Denial of Service or DoS attack is a type of network attack designed to flood the target network or machine with a large amount of useless traffic so as to overload it and eventually bring it down to its knees. The main intention behind DoS attack is to make the services running on the target machine (such as a website) temporarily unavailable to its intended users. DoS attacks are usually carried out on web servers that host vital services such as banking, e-commerce or credit card processing.
A common variant of DOS attack known as DDoS (Distributed Denial of Service) attack has become quite popular in the recent days as it is more powerful and hard to detect. A typical DoS attack has a single place of origin while a DDoS attack originates from multiple IP addresses distributed across two or more different network. The working of a DDoS attack is shown in the following diagram;
DDoS Attack
Unlike a DoS attack where the attacker uses one single computer or a network to attack the target, a DDoS the attack originates from different pre-compromised computers belonging to different networks. As the attacker uses a number of computer systems from different networks each residing in different geographical locations, the incoming traffic looks natural and therefore becomes hard to detect.

Protection Against DoS/DDoS Attacks:

DoS attacks can easily be handled by blacklisting the target IP (or range of IPs) that are found to be making too many requests/connections (in an unnatural way) to the server. However, DDoS attacks are complicated as the incoming requests seem more natural and distributed. In this case it is hard to find the difference between the genuine and malicious traffic. Taking an action at the firewall level to blacklist suspected IPs may result in false positives and therefore may affect the genuine traffic as well.

Methods Involved in DoS Attack:

The following are some of the commonly employed methods in carrying out a DoS attack:
  • SYN Flood Attack
  • Ping Flood Attack (Ping of Death)
  • Teardrop Attack
  • Peer-to-Peer Attacks

6 comments:


  1. If you need to hire a real hacker to help spy on your partner's cell phone remotely, change your grades or boost your credit score. Contact this helpline 347.857.7580 or the email address expressfoundations@gmail.com

    ReplyDelete
  2. I basically think we all dont have to face all the deceits and lies from our spouse…in a case of mine when i got sick and tired of all the lies and deceit i had to contact a friend of mine to get me the contact of one of the best hackers in the states ..then i met @ blackhatthacker@gmail.com..She saved me from the lies of my cheating girlfriend by hacking her phone number,Emial,Whatsapps and Facebook account. You can contact her for any hack problems and you consider it done soon as you send your first email to her. Tell her Keisha referred you to her

    ReplyDelete
  3. VERIFIED HACKERS
    Finding a true hacker could be almost an impossible task these days, but with the help of our over a decade survey you are 100% safe...
    visit this site below so your not misled...Avoid being cheated, hire a VERIFIED HACKER only.
    hireverifiedhacker . wordpress . com/hire-a-hacker/

    HOW TO KNOW YOU HAVE BEEN HACKED AND WHAT TO DO
    dont be among those whose devices have been hacked yet are ignorant of it
    visit this link below to ensure your safe..
    hireverifiedhacker . wordpress . com/how-to-know-you-have-been-hacked/

    WORLD CLASS PEDIGREE HACKERS
    times come when one seriously and urgently needs the services of a world class pedigree hacker
    our research showed more than 70% end up in the hands of scammers,
    25% gets tired of the search and give up while just less than 2% truely meet REAL HACKERS..
    visit the link below would be of help to you....
    hireverifiedhacker . wordpress . com/hire-a-hacker/

    ReplyDelete
  4. ARE YOU IN NEED OF A LEGIT HACKER THAT CHARGES LESS CONTACT ON INSTAGRAM @RASCO_INC OR WHATSAPP @+13159362995 THEY ARE THE BEST I KNOW

    ReplyDelete
  5. Money Transfer Service

    Bank Transfers / Western Union Transfer / Wire Transfer / Bank Logins / PayPal Transfer / Money Gram are now available to the following countries :

    USA, UK, EU, Canada, Australia, Russia, Netherlands, China, Malaysia, France, Thailand, Ukraine, Nigeria

    Our Services for Worldwide and we exclusively deal with Western Union / Money Transfer / Bank Logins / CVV, Fullz / Money Gram. The global nature of our service enables us to interact with clients all over the world who have access to our services. Our proxy dealers process your transfer request(s) and we subsequently provide you with the details of your transfers the transactions are carried out in 1-2 hours. Our services are available 24/7/365 we strive to build a strong relationship with our clients.

    Services We Provide to our valuable Clients:

    Bitcoin Transfer
    Wire Bank Transfer
    Paypal Transfer
    Western Union Transfer
    Skrill Transfer
    Carding
    Credit Card (cc) for sale
    Random CC for sale
    Fullz for sale
    Bank logins with High Balance selling
    Teaching
    GMAIL / Facebook
    Whatsapp / Instagram

    We also teaching all type of Hacking within a few days.
    We are providing our work then make a deal.
    Only serious / needy people contact us.

    Support 24/7

    Email - topley994@gmail.com

    ReplyDelete
  6. Hello World !
    Good Day !

    Keep you services updated & reliable with my stuff
    Huge stuff of Tools, E-boooks, Tutorials, Scripting, Viruses, Spying e.t.c

    See Me On
    I C Q :> 752822040
    Tele-Gram :> @killhacks

    Many other stuff like
    SSN/DL
    ID's
    CC CVV
    DUMPS
    Combos/I.P's/Proxies
    You can get from my collections :-)

    No one TEACH you
    No one GUIDE you
    No one BOOST you
    But I'm always here for you

    Hit me up for you desired stuff
    I C Q here :> 752 822 040
    Tele-Gram here :> @killhacks

    %Waiting for you guys%

    ReplyDelete