Understanding Distributed Denial-of-Service (DDoS) Attacks

Category: Internet
Last Updated: 31 Mar 2023
Pages: 1 Views: 374

A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. In a typical DDoS attack, the assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master, also known as the botmaster, identifies and identifies and infects other vulnerable systems with alware.

Eventually, the assailant Instructs the controlled machines to launch an attack against a specified target. There are two types of DDoS attacks: a network-centric attack which overloads a service by using up bandwidth and an application-layer attack which overloads a service or database with application calls. The Inundation of packets to the target causes a denial of service. While the media tends to focus on the target of a DDoS attack as the vlctlm, In reality there are many vlctlms In a DDoS attack the final arget and as well the systems controlled by the intruder.

Although the owners of co- opted computers are typically unaware that their computers have been compromised, they are nevertheless likely to suffer a degradation of service and not work well. A computer under the control of an intruder is known as a zombie or bot. A group of co-opted computers is known as a botnet or a zombie army. Both Kaspersky Labs and Symantec have identified botnets not spam, viruses, or worms as the biggest threat to Internet security

Order custom essay Understanding Distributed Denial-of-Service (DDoS) Attacks with free plagiarism report

feat icon 450+ experts on 30 subjects feat icon Starting from 3 hours delivery
Get Essay Help

Cite this Page

Understanding Distributed Denial-of-Service (DDoS) Attacks. (2018, Jul 21). Retrieved from https://phdessay.com/ddos-attack/

Don't let plagiarism ruin your grade

Run a free check or have your essay done for you

plagiarism ruin image

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Save time and let our verified experts help you.

Hire writer