dos attack, denial of service attack, what is dos, how to prevent dos attack
Home About Us Reference Product Service Sitemap

What is dos, denial of service attack, how to prevent dos attack?

What is dos attack?

DoS, denial-of-service, attack is an method used by attackers to make a computer resource unavailable to its intended users. Their intention is not targeted at stealing, modifying or destroying information. There are several kinds of dos attacks. They are TCP SYN Flood Attack, UDP Flood Attacks, Ping of Death Attacks, Smurf Attacks, Teardrop Attacks, Bonk Attacks, Land Attacks, and Distributed Denial of Service (DDoS) Attacks. Let's have a look at them one after another in the following

TCP SYN Flood Attack

The SYN flood attack sends TCP connections requests faster than a machine can process them. In a TCP SYN flood attack, the attacker creates half-open TCP connections by sending the initial SYN packet with a false IP address, and never acknowledges the SYN /ACK from the host with an ACK. This will eventually make the host reach a limit and stop accepting connections from other legitimate users.

UDP Flood Attacks

A UDP flood attack is one of denial-of-service (DoS) attacks used by attacks to use the User Datagram Protocol (UDP), a stateless computer networking protocol for its attack. A UDP flood attack can be initiated by sending a large number of UDP packets to random ports on a remote host. In this way, the target system will become unavailable for legitimate users.

Ping of Death Attacks

A ping of death or POD is a kind of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. The attacker sends an ICMP Echo request packet with a size larger than 65,535 bytes which will cause the target system crash.

Smurf Attacks

The Smurf attack is a method of generating huge computer network traffic on a targeted network. The purpose of this attack is to flood a target system via spoofed broadcast ping messages.

Teardrop Attacks

In the teardrop attack, packet fragments are sent in a jumbled and confused order, which causes the receiving device to be unable to handle the request.

Bonk Attacks

The Bonk attack is similar to a Teardrop attack. It modifies fields in TCP/IP packets. These fields normally inform a system how to reconstruct a packet that was fragmented. The Bonk attack, in turn, will modify the fields causing the target machine to crash when trying to reconstruct packets that are too big to be assembled.

Land Attacks

A LAND, Local Area Network Denial, attack is a another kind of DoS attack that sends a special poison spoofed packet to a computer and cause it to lock up.

Distributed Denial of Service (DDoS) Attacks

When an attacker attacks from multiple source systems, it is called a Distributed Denial of Service (DDoS) attack. The attacker organizes a large amount of users to connect to the same website at the same time and the web server will deny further connections because the maximum number of client connections reached.

©1994 - 2010 Edusoftmax Inc. All rights reserved. Questions? Comments?    Visitors: