2 cissp ® Official Study Guide Eighth Edition


Denial-of-Service Attacks



Download 19,3 Mb.
Pdf ko'rish
bet695/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   691   692   693   694   695   696   697   698   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Denial-of-Service Attacks
Denial-of-service (DoS)
attacks are attacks that prevent a system from processing or 
responding to legitimate traffic or requests for resources and objects. A common form of a 


Implementing Detective and Preventive Measures 
749
DoS attack will transmit so many data packets to a server that it cannot process them all. 
Other forms of DoS attacks focus on the exploitation of a known fault or vulnerability in 
an operating system, service, or application. Exploiting the fault often results in a system 
crash or 100 percent CPU utilization. No matter what the actual attack consists of, any 
attack that renders its victim unable to perform normal activities is a DoS attack. DoS 
attacks can result in system crashes, system reboots, data corruption, blockage of services, 
and more. 
Another form of DoS attack is a
distributed denial-of-service (DDoS)
attack. A DDoS 
attack occurs when multiple systems attack a single system at the same time. For example, 
a group of attackers could launch coordinated attacks against a single system. More often 
today, though, an attacker will compromise several systems and use them as launching plat-
forms against the victims. Attackers commonly use botnets to launch DDoS attacks. 
DoS attacks are typically aimed at internet-facing system. In other words
if attackers can access a system via the internet, it is highly susceptible 
to a DoS attack. In contrast, DoS attacks are not common for internal sys-
tems that are not directly accessible via the internet. Similarly, many DDoS 
attacks target internet-facing systems.
A
distributed refl ective denial-of-service (DRDoS)
attack is a variant of a DoS. It uses 
a refl ected approach to an attack. In other words, it doesn’t attack the victim directly, but 
instead manipulates traffi c or a network service so that the attacks are refl ected back to 
the victim from other sources. Domain Name System (DNS) poisoning attacks (covered in 
Chapter 12) and smurf attacks (covered later in this chapter) are examples.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   691   692   693   694   695   696   697   698   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish