Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

Denial-of-service attack (DoS)

Denial of Service

Name

Date

Denial of Service

Denial-of-service attack (DoS)

Dos refer to deliberate efforts by a person to temporarily or permanently suspend or interrupt services of a host connected to the internet. According to The United States Computer Emergency Readiness Team (US-CERT), this kind of attack has diverse effects on the computer system. Some of them include slow opening of the web sites; inability to open certain web sites; unavailability of certain web sites and a sharp increase in the total number of spasm emails received (Andress, M. et al., 2009).

How it works

In this kind of attacks, the attacker explicitly attempts to prevent the legitimate service users from using it. This can either lead to the crush or flooding of the service. However, it can be perpetrated through the following ways:

Consumption of bandwidth, compressor time, disk space or any other computational resources

Disruption of state data such s unsolicited resetting of the TCB sessions

Disruption of configuration data like routing

Disruption of the components of the physical networks

Blocking of the communication channel between the victim and the intended user in order to obstruct further communication

Prevention

Some of the ways through which this kind of attack can be prevented include the following:

Use of firewalls

The firewalls can be effectively applied here because of their ability to deny or allow IP addresses, ports or protocols. If properly used, they can help in effective prevention of the user from launching flooding attacks particularly from the machines located behind the firewall itself. However, the firewall may not effectively filter certain attacks because of their complexity and inability to distinguish the DoS attack traffic from the good ones (Yuval, F., 2004).

Switches

Switches can also be used to prevent these attacks because they have automatic, TCP splicing, Bogon filtering, wide rate limiting, deep packet inspection and traffic shaping. These enable it to detect and prevent service attack denial through balancing, automatic rate filtering or WAN Link failover. However, this is dependant on the type of attack experienced. For instance, in case of content attacks, deep packet inspection is used. If a proper selection is done, the attacks will be dealt with and prevented before they cause any damage to the computer.

Routers

Routers are manually set to help them prevent any attack to the computer network system. Even if DoS attacks can easily overwhelm them, they possess some ACL and limiting rate capacity which enable them to prevent flooding.

Distributed denial-of-service attacks (DDos)

DDoS refers to the type of attack that involves all computers within a network from any part of the world. In other words, unlike DoS which only involves one computer, the DDoS attack involves a lot of computers. This means that an attack on a single computer will eventually affect all the others in the same system globally (Kristoff, J., 2007).

According to series of researches, the DDoS attacks are so cheap to launch, but extremely expensive to stop. This is due to the complexities involved in it.

Prevention

Just like the DoS attacks, the DDoS attacks are also preventable. It is very important to take appropriate measures to prevent the occurrence of such attacks to a computer network. However, some of the preventive measures include, but not limited to the following:

Use of IP address

The IP address can be used in preventing it by verifying the reverse-path on the in put interface at the end of the router connection. This helps in stopping the SMURF attacks especially at the ISP’s POP. Hence, there is a full protection of all the users of the internet server.

Filtering

It is very simple to prevent DDoS attacks by filtering because they are very easy to spot. This is done by training routers to drop the DDoS connections, thus, preventing the attacks from slowing the server or network (Kristoff, J., 2007). If all the potential threats are spotted in time, it will be easier to deal with them and prevent any possible attack they may cause the user.

Black holing

This is a method of preventing DDoS attacks that help in the elimination of the flooding effects of attacks. It does this by channeling all the traffic to an address which does not exist from the site that is under attack. This eventually prevents the flood from impacting on other sites within the network or server. If this happens, the system will be protected from any attack that would cause unnecessary trouble to the user.

In conclusion, I would like to say that these types of attacks are very dangerous for any computer network system. The DoS attacks can cause a very big problem to all the people relying on a certain server which is affected. Meaning, unsuspecting users may be affected even if they are thousand of miles away from the attacker. Therefore, it is important to be cautious about the kind of server being used. In order to prevent such problems in time, each and every one should be careful. They should always understand that the exposures to such dangers are always there. Therefore, they should seek the advice of their technicians and take the necessary measures in case of attacks. This is the only way through which they will ensure that their data is safe from any corruption or loss.

Refernces

Andress, M. et al. (Eds.) (2009) CIW Security Professional. New York, NY: Hungry Minds, Inc.

Kristoff, J. (2007) Root DDoS Attack Analysis. DNS-OARC.

Yuval, F. (2004) Google Android: A Comprehensive Security Assessment. IEEE Security &

Privacy (IEEE).

WHAT OUR CURRENT CUSTOMERS SAY

  • Google
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!
Mindi D
Mindi D
Brilliant writers and awesome support team. You can tell by the depth of research and the quality of work delivered that the writers care deeply about delivering that perfect grade.
Samuel Y
Samuel Y
I really appreciate the work all your amazing writers do to ensure that my papers are always delivered on time and always of the highest quality. I was at a crossroads last semester and I almost dropped out of school because of the many issues that were bombarding but I am glad a friend referred me to you guys. You came up big for me and continue to do so. I just wish I knew about your services earlier.
Cindy L
Cindy L
You can't fault the paper quality and speed of delivery. I have been using these guys for the past 3 years and I not even once have they ever failed me. They deliver properly researched papers way ahead of time. Each time I think I have had the best their professional writers surprise me with even better quality work. Elite Academic Research is a true Gem among essay writing companies.
Got an A and plagiarism percent was less than 10%! Thanks!

ORDER NOW

CategoriesUncategorized

Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant
BSN

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts

See Why Our Clients Hire Us Again And Again!


OVER

10.3k
Reviews

RATING
4.89/5
Average

YEARS
13
Mastery

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!

Reliable

Professional

Affordable

Quick

Using this writing service is legal and is not prohibited by any law, university or college policies. Services of Elite Academic Research are provided for research and study purposes only with the intent to help students improve their writing and academic experience. We do not condone or encourage cheating, academic dishonesty, or any form of plagiarism. Our original, plagiarism-free, zero-AI expert samples should only be used as references. It is your responsibility to cite any outside sources appropriately. This service will be useful for students looking for quick, reliable, and efficient online class-help on a variety of topics.