Denial Of Service Attacks
From Computing and Software Wiki
(→Application front end hardware) |
|||
Line 1: | Line 1: | ||
+ | A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet. | ||
+ | |||
== Attack Methods == | == Attack Methods == | ||
=== ICMP flood === | === ICMP flood === | ||
+ | <ref>{{Cite web|url=http://anml.iu.edu/ddos/types.html|title=Types of DDoS Attacks|accessdate=April 11 2009}}</ref> | ||
=== Application level floods === | === Application level floods === | ||
+ | <ref>{{Cite web|url=http://www.irchelp.org/irchelp/mirc/flood.html|title=Flood Protection and Ignoring People|accessdate=April 11 2009}}</ref> | ||
=== Distributed attack === | === Distributed attack === | ||
+ | <ref>http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html</ref> | ||
=== Unintentional attack === | === Unintentional attack === |
Revision as of 01:08, 12 April 2009
A denial of service attack (DoS attack) is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.
Contents |
Attack Methods
ICMP flood
<ref>Template:Cite web</ref>
Application level floods
<ref>Template:Cite web</ref>
Distributed attack
<ref>http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html</ref>
Unintentional attack
Prevention and Protection
Firewalls
Switches and Routers
Application Level
See also
References
Template loop detected: Template:Reflist
External links
--Frostd 17:32, 3 April 2009 (EDT)