preview

Prevention Of Service Attacks And Remedies

Better Essays

Abstract
The purpose of this paper was to research denial-of service attacks and remedies that can be used as defense mechanisms to counter these attacks. A denial-of-service (DoS) attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service (Malliga & Tamilarasi, 2009). The attack demonstrates using both known and potential attack mechanisms. Along with this classification important features of each attack category that in turn define the challenges involved in combating these threats will be discussed. The typical defense system is using only the currently known approaches. A denial-of-service attack deploys multiple machines to avert attacks. Then the service is denied by …show more content…

A denial of service attack on a network could take one of three possible forms (Razmov & Juels, 2000). A malicious party (the attacker) could cause the network not to transmit messages it should be sending in order to offer service to a subset or all of its clients. On the other end of the spectrum, the network could be caused to send messages, which it should not be sending. By far the most common form of DoS in today’s networks is causing excessive bogus traffic (a.k.a. flooding the network) in the direction of a particular server, which in the end will prevent legitimate users from getting the service they could otherwise be receiving from that server. A simple DoS attack can be implemented by sending a multitude of simultaneous requests to a service which will saturate with network flows making it impossible for the server to answer the entire request. The attack continues to plague the internet protocol (IP) networks. DoS can result in significant loss of time and money got many user and organizations (Perrig & Song, 2001).
Wireless Local Area Networks (WLAN) have gained popularity compared to wired network due to its low cost and easy layouts. WLAN are used worldwide by users, corporations, and educational environments. Attackers can use any of several methods to get inside a computer with so many doors to protect and new hacking techniques constantly being developed, it’s difficult to keep safeguards

Get Access