Denial Of Service Attacks

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 22: Line 22:
== References ==
== References ==
-
# Types of DDoS Attacks. Retrieved April 11, 2009, http://anml.iu.edu/ddos/types.html
+
# Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html
-
# CERT/CC Denial of Service. Retrieved April 11, 2009, http://www.cert.org/tech_tips/denial_of_service.html
+
# CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html
-
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, http://www.irchelp.org/irchelp/mirc/flood.html
+
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html
-
# "Simple Nomad", Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html
+
# "Simple Nomad", Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&id=1439320
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&id=1439320
 +
# Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/
== External links ==
== External links ==
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)

Revision as of 17:46, 12 April 2009

A denial of service attack (DoS attack) is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.

Contents

Attack Methods

ICMP flood

Application level floods

Distributed attack

Unintentional attack

Prevention and Protection

Firewalls

Switches and Routers

Application Level

See also

References

  1. Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html
  2. CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html
  3. Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html
  4. "Simple Nomad", Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html
  5. Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&id=1439320
  6. Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/

External links

--Frostd 17:32, 3 April 2009 (EDT)

Personal tools