6 - Denial of Service

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Denial-of-Service attack

An action that prevents or impairs the authorized use of
networks, systems, or applications by exhausting
resources such as central processing units (CPU), memory,
bandwidth, and disk space.

2
New cards

resources that would be attacked by DoS

-network badwith

-systems resources

-application resources

3
New cards

classic DoS atatcks

-flooding ping command

-SYN spoofing

-ddos attacks

4
New cards

-flooding ping command

Aim of this attack is to overwhelm the capacity of the network
connection to the target organization

5
New cards

-SYN spoofing

This attacks the ability of a network server to
respond to TCP connection requests by
overflowing the tables used to manage such
connections.

6
New cards

ddos attacks

use of multiple systems to generate attacks

7
New cards

VoIP Attack

flood a SIP proxy with several invite requests

8
New cards

http attack

An HTTP flood refers to an attack that bombards Web
servers with HTTP requests.

9
New cards

Slowloris

sends http requests that never complete

10
New cards

DNS reflection aomplification attack

Because of the amplification achieved, the attacker need only generate a
moderate flow of packets to cause a larger, amplified flow to flood and
overflow the link to the target system.

11
New cards

DoS attack prevention

-block spoofed source addresses

-use modified TCP connection handling code

-block ip directed broadcast

-block suspicious services and combinations

-manage application attacks with a form of graphical puzzle

-good general system security practices

12
New cards

How to Prevent

to DoS attacks

-anti-spoofing

-directed broadcast

-rate limiting filters

-network monitors

-IDS(DETEC AND NOTIFY ABNORMAL BEHAVIOR)

13
New cards

Responding to DoS

-identify type

-have ISP trace packet flow back to source

-implement contigency plan

-update incident response plan