Distributed Denial of Service Attacks Essay

Distributed Denial of Service Attacks Essay

Length: 627 words (1.8 double-spaced pages)

Rating: Better Essays

Open Document

Essay Preview



Within the last decade, the internet has proven to be the most efficient way to complete tasks in today’s society. Every major business in today’s society relies on the internet to conduct business. Though the internet is a useful tool, our reliability on it opens up the door for cyber-attacks that can be detrimental to business as a whole. One example of a cyber-attacks that have recently started becoming more prevalent are DDoS attacks. Recently, DDoS attacks have been a rising issue for businesses owners who run their own servers, such as video game companies and other high profile web servers, including banks and other credit card payment gateways.

A DDoS attack, distributed denial of service attack, is when one or more individuals
attempt to force a network offline and unavailable to its intended users. This process is typically performed by flooding a network with communication requests until the server cannot respond to the traffic, thus making the server go offline and become available. This process is relatively simple to perform to the average person through online programs. Since it is so easy perform, it has become a rising issue simply because anyone has the ability to hack into various servers. One example in recent news of DDoS attacks comes from Riot Games, developer of the popular online multiplayer video game League of Legends. After a month of inconsistency with their server stability and frequent shut downs, Riot Games reported that within the l...

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

UK Government Communications Headquarters' Distributed Denial of Service Attacks on Anonymous

- The United Kingdom intelligence has a branch of specialized hackers that is suspected to be using other questionable ways to track down its enemies and other enemies of British. This was revelation came out from Edward Snowden recent leaks. The leaks reveal that British intelligence GCHQ is in a fight with Anonymous and one LulzSec hacktivists using DDoS to attack. According to a classified report which was revealed through the NBC News coverage, the U.K secret agency (GCHQ) is came up with a special team called JTRIG (The Joint Threat Research Intelligence Group)....   [tags: hackers, intelligence, jamming]

Better Essays
627 words (1.8 pages)

Enhancing DNS Resilience against Denial of Service Attacks Essay

- Enhancing DNS Resilience against Denial of Service Attacks Abstract The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past few years, distributed denial of service (DDoS) attacks have targeted the DNS infrastructure and threaten to disrupt this critical service. In this paper we show that the existing DNS can gain significant resilience against DDoS attacks through a simple change to the current DNS operations, by setting longer time-to-live values for a special class of DNS resource records, the infrastructure records....   [tags: Internet Security]

Better Essays
1001 words (2.9 pages)

Denial of Service Attacks Essay

- Denial of Service attacks (DoS) or Distributed Denial of Service Attacks (DDoS), have been around for many years, but only in the past few years have the frequency and magnitude of these attacks increased. They are a significant problem because they can shut an organization off from the Internet for extended periods of time and little can be done to stop them. DoS attacks occur when computer resources become unavailable to legitimate users after being exhausted by false requests for information (Houle and Weaver 1)....   [tags: Computers]

Better Essays
2204 words (6.3 pages)

Essay about Denial of Service Attacks

- Denial of Service Attacks Definition: Denial of Service. A cracker attack that overloads a server to the point that it no longer responds or shuts down completely. To flood a network or individual server with huge amounts of data packets. How it Works In a typical connection, the user sends a message asking the server to authenticate it. The server returns the authentication approval to the user. The user acknowledges this approval and then is allowed onto the server. In a denial of service attack, the user sends several authentication requests to the server, filling it up....   [tags: Essays Papers]

Better Essays
877 words (2.5 pages)

Detecting and Mitigating DoS or Distributed DoS Attacks Essay

- Introduction Denial of service (DoS) and distributed DoS (DDoS) attack is a means to take control of a computer terminal or network resources to disrupt communications of a computer host with a connection to the Internet. A DDoS is an attack sent by more than two computer hosts or a coopted zombie computers in a botnet and DoS is an attack by one computer host. Either attack will flood an online computer or network with of incoming messages to overwhelm the targeted system thus denying service to the internet or communication with authorized users (US-CERT, 2013)....   [tags: Mitigating DoS Attacks]

Better Essays
2566 words (7.3 pages)

Voice Over Internet Protocol Attacks Essay

- Definition: VoIP or Voice over Internet Protocol, is a type of transmissions medium that is responsible for the delivery of real-time voice and data communication. Unlike its analog predecessor in which the transport functionality was routed via the public switched telephone network (PSTN), calls are now converted from an analog signal to a digital format, which is what the Internet Protocol (IP) uses for transmission and delivery, making VoIP possible. Several other key processes, such as signaling, authentication, security, call control, and voice compression, are established by VoIP prior to and during the call setup phase....   [tags: Information Technology ]

Better Essays
1060 words (3 pages)

Hacking Techniques Attackers Use Essay

- ... Cross-site scripting is a malicious web developer may attach a script to something sent to a web site, such as a URL, an element in a form, or a database inquiry. Later, when the web site responds to you, the malicious script is transferred to your browser. You can potentially expose your web browser to malicious scripts by following links in web pages, email messages, or newsgroup postings without knowing what they link to using interactive forms on an untrustworthy site viewing online discussion groups, forums, or other dynamically generated pages where users can post text containing HTML tags Packet sniffing is a packet sniffer is a program that captures data from information packets...   [tags: Trojan horse programs, Denial of Service]

Better Essays
1670 words (4.8 pages)

Essay on Denial of Service Attack

- Background Located in Seattle Washington, the iPremier company is a web-based commerce company founded in 1996 by two students from Swarthmore College. Since its founding, iPremier has registered a success story in e-commerce selling vintage, luxury and rare goods over the internet. Customers use their credit cards to transact business online. With impressive sales and profit margins, iPremier is among the few companies who survived the 2000 technical stock recession (Austin, 2007). Management at iPremier consists of young employees who were its pioneers and a number of experienced managers recruited over time....   [tags: Business Operations Analysis]

Better Essays
908 words (2.6 pages)

Internet - Tracing the Source of Denial of Service Attacks Essays

- Tracing the Source of Denial of Service Attacks        Abstract:  Denial of service attacks are becoming increasingly prevalent and serious, yet the anonymity that these attacks affords the hacker provides no means for a victim to trace the attack.  The weakness of the TCP/IP protocol allows for this anonymity, yet it would be very difficult to change this protocol.  Savage, Wetherall, Karlin, and Anderson present a method for tracing back the source IP address and network path of denial of service attacks....   [tags: Exploratory Essays Research Papers]

Free Essays
2010 words (5.7 pages)

Essay about Efficient Distributed Dynamic Load Balancing

- Introduction Load balancing is the strategy of load redistribution among the computational elements(CE) of a heterogeneous network where they work cooperatively so that large loads can be distributed among them in a fair and effective manner. Load Balancing strategies ensure that the workload is distributed over all CEs according to their processing speed and availability in such a way that the overall execution time is minimized. But there are a wide variety of issues that need to be considered for heterogeneous environment....   [tags: Distributed Load Balancing]

Free Essays
3035 words (8.7 pages)