Detection and Mitigation of Denial of Service (Dos) Attacks In Computer Networks

Exploring the Types and Techniques of DoS Attacks

Authors

  • Bhawna Sharma Author
  • S. K. Sharma Author

Keywords:

Detection, Mitigation, Denial of Service attacks, Computer Networks, DoS attacks, individual systems, Internet, bulk traffic, aggregated traffic, network resources, system resources, victim, network server, methods, flooding, malware, system configuration

Abstract

The basic idea behind DoS attacks is to force a largenumber of individual systems connected to the Internet, to send bulk traffic tothe same destination at the same time. The aggregated traffic that thosesystems produce can easily cripple the available network or system resources ofthe recipient. Thus the recipient, the victim, of this attack will no longer beable to have reliable network access or serve legitimate clients, if the victimis a network server. Mostly two methods are used for lunching DoS attacks. Oneof these methods is known as flooding, other is implementing a malware that canchange system configuration causing DoS attacks. Next subsections describe bothof these in detail.

Downloads

Download data is not yet available.

Downloads

Published

2014-02-01