Professional Documents
Culture Documents
Denial of Service: Written and Presented By: Craig Schweitzer
Denial of Service: Written and Presented By: Craig Schweitzer
SYN Attack
Network connectivity attack Begins when TCP is initiated Sends many requests to the connection Does not respond to reply Leaves the initial packet in buffer so that
other connections cannot be initiated
Other Attacks
Buffer Overflow Attack
Sending larger than anticipated amount of data Teardrop Attack Attacks the weakness of the IP address Divides large files into fragments Attaches confusing info to a later fragment
Altering routing information Altering registry values Basically, any outside alteration of
any significant configuration information
Means of Prevention
The first rule to combating a denial of
service attack is to plan ahead Without an initial plan, your system is wide open to imminent doom Do a cost benefit analysis on whether it would be worth while to secure your system before a problem occurs against the down-time due to a DoS attack
Summary
We now understand what a DoS Attack is We now know many different types of DoS
Attacks and a little about what they are meant to do We now understand how to combat DoS Attacks from harming our network, and know what to do if they occur
References