6 - Denial of Service

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

13 Terms

1
New cards

Denial-of-Service attack

An action that prevents or impairs the authorized use of
networks, systems, or applications by exhausting
resources such as central processing units (CPU), memory,
bandwidth, and disk space.

2
New cards

resources that would be attacked by DoS

-network badwith

-systems resources

-application resources

3
New cards

classic DoS atatcks

-flooding ping command

-SYN spoofing

-ddos attacks

4
New cards

-flooding ping command

Aim of this attack is to overwhelm the capacity of the network
connection to the target organization

5
New cards

-SYN spoofing

This attacks the ability of a network server to
respond to TCP connection requests by
overflowing the tables used to manage such
connections.

6
New cards

ddos attacks

use of multiple systems to generate attacks

7
New cards

VoIP Attack

flood a SIP proxy with several invite requests

8
New cards

http attack

An HTTP flood refers to an attack that bombards Web
servers with HTTP requests.

9
New cards

Slowloris

sends http requests that never complete

10
New cards

DNS reflection aomplification attack

Because of the amplification achieved, the attacker need only generate a
moderate flow of packets to cause a larger, amplified flow to flood and
overflow the link to the target system.

11
New cards

DoS attack prevention

-block spoofed source addresses

-use modified TCP connection handling code

-block ip directed broadcast

-block suspicious services and combinations

-manage application attacks with a form of graphical puzzle

-good general system security practices

12
New cards

How to Prevent

to DoS attacks

-anti-spoofing

-directed broadcast

-rate limiting filters

-network monitors

-IDS(DETEC AND NOTIFY ABNORMAL BEHAVIOR)

13
New cards

Responding to DoS

-identify type

-have ISP trace packet flow back to source

-implement contigency plan

-update incident response plan

Explore top flashcards