6 - Denial of Service

studied byStudied by 2 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 12

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

13 Terms

1

Denial-of-Service attack

An action that prevents or impairs the authorized use of
networks, systems, or applications by exhausting
resources such as central processing units (CPU), memory,
bandwidth, and disk space.

New cards
2

resources that would be attacked by DoS

-network badwith

-systems resources

-application resources

New cards
3

classic DoS atatcks

-flooding ping command

-SYN spoofing

-ddos attacks

New cards
4

-flooding ping command

Aim of this attack is to overwhelm the capacity of the network
connection to the target organization

New cards
5

-SYN spoofing

This attacks the ability of a network server to
respond to TCP connection requests by
overflowing the tables used to manage such
connections.

New cards
6

ddos attacks

use of multiple systems to generate attacks

New cards
7

VoIP Attack

flood a SIP proxy with several invite requests

New cards
8

http attack

An HTTP flood refers to an attack that bombards Web
servers with HTTP requests.

New cards
9

Slowloris

sends http requests that never complete

New cards
10

DNS reflection aomplification attack

Because of the amplification achieved, the attacker need only generate a
moderate flow of packets to cause a larger, amplified flow to flood and
overflow the link to the target system.

New cards
11

DoS attack prevention

-block spoofed source addresses

-use modified TCP connection handling code

-block ip directed broadcast

-block suspicious services and combinations

-manage application attacks with a form of graphical puzzle

-good general system security practices

New cards
12

Response to DoS attacks

-anti-spoofing

-directed broadcast

-rate limiting filters

-network monitors

-IDS(DETEC AND NOTIFY ABNORMAL BEHAVIOR)

New cards
13

Responding to DoS

-identify type

-have ISP trace packet flow back to source

-implement contigency plan

-update incident response plan

New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot