Wednesday, May 6, 2020

Fundamentals Of Network Security - 2504 Words

ICTN 6865: Fundamentals of Network Security Final Term Paper Professor’s Name: Dr. Phil Lunsford Student’s Name: Rahul Ravella Date: 10/25/14 Abstract Denial of Service also known as DoS is an attack that has been a part of cyber-attacks and cyber-terrorism for a long time. With the increase in the number of attacks on networks and websites, the need has come to implement better prevention systems to limit the number of attacks on the network. There are quite a few methods of countering these attacks that are already present but not a lot of networks have implemented them yet. This paper will talk about the different types of DoS attacks and their countermeasures. The paper will also talk about the advantages and†¦show more content†¦This causes the server to respond either really slowly or not at all, which causes the website to become unavailable or the service to not perform as it is supposed to. (Auburn University, 2009) The different type of Denial of Service attacks: Denial of Service attacks are characterized as an explicit attempt by a hacker so as to prevent a user from getting or using the desired resources. Examples of such an attack are: †¢ The prevention of legitimate network traffic by attempting to flood the network. †¢ Preventing access to a service by disrupting connections between the two machines. †¢ The prevention of accessing a service for a individual. †¢ The attempt to disrupt the services to a specific person or a system. (Lau, Simon Fraser Univ., Rubin, Smith, Trajkovic, 2000) Some of these attacks are as follows: ICMP Flood: There are many different types of these ICMP flood attacks. One of these attacks is called the Smurf attack. This attack creates a large amount of computer network traffic in the target’s network. It involves the sending of Internet Control Message Protocol (ICMP) or ping requests to the many broadcast addresses of the internet protocol (IP). These messages contain spoofed broadcast ping messages. When the host receives the ICMP echo request, they send an immediate reply to the source address upon acceptance. So therefore when there are multiple broadcast networks, there can be

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.