1.4.1 Denial of Service (DoS) / Distributed Denial of Service (DDoS)
One of the more popular attacks of recent times is the DoS attack, or Denial of Service. A DoS attack does just what its name suggests denies legitimate users access to some network or system service. Its based on a simple premise the attacker attempts to flood the target with large amounts of data, with one of two results:
A variant on this attack DDoS, or Distributed Denial of Service produces the same result by sending a coordinated flood of data from multiple hosts, generally from multiple locations around the Internet. These hosts are usually machines that the attacker has previously broken into and Trojaned with a DDoS client such as Trinoo, whose purpose is to stage a DoS attack on a target system. At the attackers signal, these hosts spring into life and start sending data to the target as quickly as possible. This type of attack is becoming more of a concern as more home users gain broadband connections and place systems on public networks without properly securing them first. Even todays wireless phones are subject to a DoS attack65.
Home - Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.