100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Mitigating Service Disruption through DoS protection. Exam Questions and Answers. Graded A+

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
25-09-2024
Written in
2024/2025

Denial-of-Service (DoS) Attacks - Answers - The NIST (National Institute of Standard and Technologies) Computer Security Incident Handling defines a DoS attack as: --"An action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space." - A form of attack on the availability of some service - Categories of resources that could be attacked are: 1. Network bandwith 2. System resources 3. Application resources Network bandwith - Answers - Relates to the capacity of the network links connecting a server to the Internet - For most organizations this is their connection to their Internet Service Provider (ISP) System resources - Answers Aims to overload or crash the network handling software Application resources - Answers - Typically involves a number of valid requests, each of which consumes significant resources

Show more Read less
Institution
Cyber Security
Course
Cyber Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Security
Course
Cyber Security

Document information

Uploaded on
September 25, 2024
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Mitigating Service Disruption through DoS protection. Exam Questions and Answers. Graded A+

Denial-of-Service (DoS) Attacks - Answers - The NIST (National Institute of Standard and Technologies)
Computer Security Incident Handling defines a DoS attack as:

--"An action that prevents or impairs the authorized use of networks, systems, or applications by
exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space."



- A form of attack on the availability of some service

- Categories of resources that could be attacked are:

1. Network bandwith

2. System resources

3. Application resources

Network bandwith - Answers - Relates to the capacity of the network links connecting a server to the
Internet

- For most organizations this is their connection to their Internet Service Provider (ISP)

System resources - Answers Aims to overload or crash the network handling software

Application resources - Answers - Typically involves a number of valid requests, each of which consumes
significant resources

--Thus limiting the availability of the Web server to respond to requests from other users

Types of DoS attacks - Answers 1. Classic Denial-of-Service attacks

2. Source address spoofing

3. SYN spoofing

4. Flooding attacks

1. Classic Denial-of-Service attacks - Answers - Flooding ping command

--By sending TCP/IP ICMP (Internet Control Message Protocol) echo request message (to measure the
time taken for the echo response packet to return)

--Flood victims network with request packets, knowing that the network will respond with an equal
number of reply packets

, - Aim of this attack is to overwhelm the capacity of the network connection to the target organization

- Traffic can be handled by higher capacity links on the path, but packets are discarded as capacity
decreases. Hence, valid traffic will have little chance of surviving discard.

- Source of the attack is clearly identified unless a spoofed address is used

2. Source address spoofing - Answers Use forged source addresses



- Attacker generates large volumes of packets that have the target system as the destination address

- Congestion would result in the router connected to the final, lower capacity link

- Identify source attackers require network engineers to specifically query flow information from their
routers

3. SYN spoofing - Answers - When a client attempts to start a TCP connection to a server, the client and
serve exchange a series of messages which normally runs like this:

1. The client requests a connection by sending a SYN (synchronize) message to the server

2. The server acknowledges this request by sending SYN-ACK back to the client (also record the details of
the TCP connection in a table)

3. The client responds with an ACK, and the connection is established

- This is called the TCP three-way handshake, and is the foundation for every connection established
using the TCP protocol



- Attacks the ability of a server to respond to future connection requests by overflowing the tables to
manage them

--Thus legitimate users are denied access to the server

- Hence an attack on system resources, specifically the network handling code in the operating system

4. Flooding attacks - Answers - Intent is to overload the network capacity on some link to a server
(combination of all techniques)

- Virtually any type of network packet can be used



1. ICMP flood

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
336
Member since
1 year
Number of followers
16
Documents
28319
Last sold
6 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions