DoS Attacks
In a DoS (denial-of-service) attack the hacker or
group try to flood the network with so much traffic that it becomes slow or
inaccessible for legitimate users. They do this by taking control of many computers
(botnet) and targeting them all against
a certain network .
When this happens attackers prevent you from accessing your
email, social networking sites and other services. Servers can only handle a certain number of
requests so if it becomes flooded then user’s requests won’t be processed.
DoS attacks target sites that are of a high profile such as
banks, companies and even government websites and they send so much traffic
that their servers can’t respond to legitimate traffic. Denial-of-service attacks are considered
violations of the Internet Architecture Board's Internet proper use policy, and
also violate the acceptable use policies of virtually all Internet service
providers.
Here are a few methods of how these attacks are carried out.
- Ping of
Death - bots create huge electronic packets and sends them on to victims
- Mail bomb
- bots send a massive amount of e-mail, crashing e-mail servers
- Teardrop -
bots send pieces of an illegitimate packet; the victim system tries to
recombine the pieces into a packet and crashes as a result
- Max out
the processor's usage, preventing any work from
occurring.
- Trigger
errors in the sequencing of instructions, so as to force the computer into
an unstable state or lock-up.
- Crash the
operating system itself.
Here is one example of a DoS attack on a large
scale: July, 2009: Unknown vs. United
States & South Korea.
For three days in July, 2009, the web sites of
South Korean’s largest daily newspaper, a large-scale online auction house, a
bank, the country’s president, the White House, the Pentagon and U.S. Forces
Korea—to name a few—came under DDoS attack as upwards of 166,000 computers in a
botnet unleashed wave after wave after wave of a data-powered onslaught. Some
believed operatives at North Korea’s telecommunications ministry were to blame,
using a backdoor for the infamous Mydoom worm of 2004, but this has
never been proven.
If there a signs of a DoS attack that is happening a network
administrator can limit the number of traffic the server receives. This way can
even block the legitimate users. Network administrators can try a find out
where these attacks are coming from and try to filter and block these attacks.
Firewalls can be configured to block the DoS attacks.
http://computer.howstuffworks.com/zombie-computer3.htm
https://www.us-cert.gov/ncas/tips/ST04-015
http://www.thedailybeast.com/articles/2010/12/11/hackers-10-most-famous-attacks-worms-and-ddos-takedowns.html
No comments:
Post a Comment