Monday, September 9, 2019
Denial Of Service Essay Example | Topics and Well Written Essays - 500 words
Denial Of Service - Essay Example Denial of service attacks is common in businesses and organizational websites. Perpetrators of these attacks target services or sites that are hosted by high profile servers. These include credit card payment systems, banks and root name servers. The article on denial of service attacks that will be used is Dave Nealââ¬â¢s ââ¬Å"Denial of Service Attacks Exploits White House Press Machineâ⬠. This article was published in The Inquirer on November 12, 2014. According to this article, attackers used the White House press release machine as a way of gaining network trust. The White House made this discovery when it updated its internet report with a caution that attackers are exploiting the facilityââ¬â¢s press release machine. These attackers are using content emanating from the White House to gain network trust. They are using DNS reflection attacks to exploit the press machine. Attackers who target the network at the White House are designing large DNS text records in order to increase amplification, and magnify their attacks. These attackers create their own text records to amplify the responses as required (Neal, 2014). This helps them to direct traffic to targeted sites. The targeted traffic, which is amplified overwhelms the targeted site and makes it unable to respond to requests. In this case, the attacks saturate the target network or machine with amplified external communication requests. These requests come in large number s in order to prevent the machine from responding to legitimate traffic. They also cause the network or machine to respond slowly to legitimate traffic. Denial of service attacks eventually lead to server overload. This technique is effective because the text records have the ability to achieve the largest possible response. The attacks that were observed lasted for 5 hours and created a bandwidth load that peaked at 4.3Gbps (Neal, 2014). The text record technique has been extensively used to target entertainment
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.