Difference between revisions of "DDoS Attack"

From ICANNWiki
Jump to navigation Jump to search
Line 4: Line 4:
 
'''DDoS''' is the acronym for '''Distributed Denial of Service.''' The [[Software Engineering Institute]] (SEI)- [[CERT]] at [[Carnegie Mellon University]] explained that the telephone system, computer system and the Domain Name System ([[DNS]]) sometimes become unusable during peak hours where consumers are having a hard time using the service or when an intruder or hacker interrupts the system making it unavaible to consumers. When a hacker sends a very large amount of email to someone which can not be handled by the recipients computer disk that saves e-mails, a '''Denial of Service (DoS) attack''' happens because the user can not use his or her computer until the situation is resolved. In terms of computer network, intruders send extraordinary amount of internet calls to computers  providing internet servicse  preventing users to get internet connection. Users whose networks are unable to use the internet because of intrusion become victims of '''Distributed Denial Of Service attack'''.<ref>[http://www.cert.org/homeusers/ddos.html What is a Distributed Denial of Service (DDoS) Attack and What Can I Do About It?]</ref>]
 
'''DDoS''' is the acronym for '''Distributed Denial of Service.''' The [[Software Engineering Institute]] (SEI)- [[CERT]] at [[Carnegie Mellon University]] explained that the telephone system, computer system and the Domain Name System ([[DNS]]) sometimes become unusable during peak hours where consumers are having a hard time using the service or when an intruder or hacker interrupts the system making it unavaible to consumers. When a hacker sends a very large amount of email to someone which can not be handled by the recipients computer disk that saves e-mails, a '''Denial of Service (DoS) attack''' happens because the user can not use his or her computer until the situation is resolved. In terms of computer network, intruders send extraordinary amount of internet calls to computers  providing internet servicse  preventing users to get internet connection. Users whose networks are unable to use the internet because of intrusion become victims of '''Distributed Denial Of Service attack'''.<ref>[http://www.cert.org/homeusers/ddos.html What is a Distributed Denial of Service (DDoS) Attack and What Can I Do About It?]</ref>]
  
==Targets Intruder Attacks==
+
==Frequent Targets of Intruder Attacks==
According to the CERT report, "Trends in Denial Service Attack Technology" the frequent targets of intruder activity are Windows end-users and Internet Routing Technology. Intruders primary intention in conducting DoS attack is to prevent the use of computer or network resources.  
+
According to the CERT report, "Trends in Denial Service Attack Technology" the frequent targets of intruder activity are Windows end-users and Internet Routing Technology. Intruders primary intention in conducting DoS attack is to prevent the use of computer or network resources.
  
 
==Reasons Why Internet is Vulnerable to Attacks==
 
==Reasons Why Internet is Vulnerable to Attacks==

Revision as of 02:15, 14 September 2011

UnderConstruction.png


DDoS is the acronym for Distributed Denial of Service. The Software Engineering Institute (SEI)- CERT at Carnegie Mellon University explained that the telephone system, computer system and the Domain Name System (DNS) sometimes become unusable during peak hours where consumers are having a hard time using the service or when an intruder or hacker interrupts the system making it unavaible to consumers. When a hacker sends a very large amount of email to someone which can not be handled by the recipients computer disk that saves e-mails, a Denial of Service (DoS) attack happens because the user can not use his or her computer until the situation is resolved. In terms of computer network, intruders send extraordinary amount of internet calls to computers providing internet servicse preventing users to get internet connection. Users whose networks are unable to use the internet because of intrusion become victims of Distributed Denial Of Service attack.[1]]

Frequent Targets of Intruder Attacks

According to the CERT report, "Trends in Denial Service Attack Technology" the frequent targets of intruder activity are Windows end-users and Internet Routing Technology. Intruders primary intention in conducting DoS attack is to prevent the use of computer or network resources.

Reasons Why Internet is Vulnerable to Attacks

Internet connected systems are still vulnerable to DoS/DDos attacks despite active security efforts is because of the following reasons:[2]

  • Internet is composed of limited and consumable resources
  • Internet security is highly interdependent



References