We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Denial-of-Service attacks

essay
The whole doc is available only for registered users
  • Pages: 2
  • Word count: 469
  • Category: Service

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

To develop network security strategies that will ensure that the organization’s network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.

Denial-of-service DoS attacks DoS attack is simply to send more traffic to a network address than the programmers who planned its data buffers anticipated someone might send. The attacker may be aware that the target system has a weakness that can be exploited or the attacker may simply try the attack in case it might work. According to AppliCure Technologies preventing Denial of Service Attack With dotDefender web application firewall you can avoid DoS attacks because dotDefender inspects your HTTP traffic and checks their packets against rules such as to allow or deny protocols, ports, or IP addresses to stop web applications from being exploited

Masquerade is a disguise. In terms of communications security issues, a masquerade is a type of attack where the attacker pretends to be an authorized user of a system in order to gain access to it or to gain greater privileges than they are authorized for. A standard strategy to resist this kind of attack is to create innovative algorithms that can efficiently detect the suspicious actions, which could result in the detection of imposters.

The concept of IP spoofing decreased due to the demise of the services they exploited, spoofing can still be used and needs to be addressed by all security administrators. According to Jonathan Hassell can prevent IP spoofing and its related attacks from affecting your network: Use an access control list to deny private IP addresses on your downstream interface.

SMURF attack, when your machine sends this spoofed packet to the broadcast address, all of the computers on the network will respond to the victim computers. However, there are a number of steps you can take to prevent this type of attack. One way is to ensure that routers are configured not to forward direct broadcasts.

Land.c is a DoS attack in which an attacker sends a host a TCP SYN packet with the source and destination IP address set to the host’s IP address. The source and destination port numbers are the same as well. Upon receiving a SYN packet, the host responds with a SYN-ACK to itself. Having sent this packet, the TCP routine normally expects an ACK packet to complete the TCP handshake.

A Man-in-the-middle attack According to Computer Hope it is an attack where a user gets between the sender and receiver of information and sniffs any information being sent to prevent man-in the-middle attacks we have to implement security and awareness training to ensure that our employees are not connecting to unsecure networks with their work devices.

Reference

http://www.applicure.com/solutions/prevent-denial-of-service-attacks

http://www.computerhope.com/jargon/m/mitma.htm

http://www.computerworld.com/article/2546050/network-security/the-top-five-ways-to-prevent-ip-spoofing.html

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59