SE 4C03 Winter 2005

نویسنده

  • Chris Christodoulou
چکیده

A DOS attack consists of rendering a network unable to carry legitimate user data. This can be done via attacking routers directly or by flooding the network with excessive traffic. Router attacks restrict the router’s ability to forward as many packets or its ability to forward them properly. This can be achieved by abusing known vulnerabilities to modify routing tables (using protocols such as RIP-2 or OSPF) or bombarding the router with illegitimate or forged packets that exploit a flaw in the Transmission Control Protocol (TCP) and can cause excessive retransmissions towards a desired target. Resource consumption attacks can involve using excessive traffic or half-open connections to tie up the router’s buffers. The same such attacks can be carried out on whole networks as well by setting the packets to broadcast [1]. This report focuses on resource consumption attacks as they are more prevalent. DOS attacks can be carried out using commonly available PC hardware and an Internet Service Provider (ISP). An operating system providing raw sockets such as Unix/Linux (with root privileges) or Windows 2000/XP, and a C compiler are about all that is needed to orchestrate a DOS attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SE 4C03 Winter 2005

The common trend in the new century has been for wireless computer networks to replace wired ones, due to increased mobility and greater convenience. Since the wireless network is simply broadcasting a signal, which anyone can connect to this Wireless Local Area Network (WLAN) and receive the signal with the proper equipment. Thus, these types of networks are fundamentally less secure than the ...

متن کامل

SE 4C03 Winter 2004

Imagine being able to break any classical encryption algorithm in a matter of seconds. Some would say that this statement is impossible, and it is in a classical sense. But with the advent of quantum computational theory, new methods of computation and algorithms are being developed that are making this statement more realistic. Quantum computation threatens classical encryption algorithms as i...

متن کامل

SE 4C03 Winter 2004

Ensuring that p and q are very large prime numbers ensures the security of the system. Although multiplying large prime numbers is equivalent to multiplying any two large numbers, a trivial operation on a computer, its inverse is practically impossible. This operation is thus called a one-way function. This ensures that although one is given n, the product of the two prime numbers, discovering ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005