Thursday, August 29, 2019
Detecting preventing or mitigating DoS or Distributed DoS attacks Research Paper
Detecting preventing or mitigating DoS or Distributed DoS attacks - Research Paper Example This process requires a large network of computers running malicious program. To acquire the network, the attacker uses software that recruits vulnerable computers (Glen, 2013). That is, the computers with improperly patched antivirus, out of date antivirus and without antivirus (FU, 2012). To recruit machines into his/her DDoS attack, the attacker may follow several processes. Firstly, the attacker may use a machine infected with malicious programs to search, find, and infect another machine (Patrikakis, Masikos, & Zouraraki, n.d.). The infected machine joins the previous in the haunt of the unprotected machine and infects them. Secondly, the attacker may create a long list of the machine he/she want to recruit before infecting them with the malicious software to make them join his/her army of attacking computers (Glen, 2013; Patrikakis, Masikos, & Zouraraki, n.d.). Notably, some public servers, when compromised, become effective to the attacker when creating the hit list (Patrikakis, Masikos, & Zouraraki, n.d.). For instance, the attacker may run topological scanning where one machine is infected and finds other machine to infect through url it stores (UMUC, 2012). Local subnet scanning uses a compromised host to attack another computer within its own network without firewall detection as it uses the information stored in the local addresses (UMUC, 2012). Lastly, permutation scanning infects the machines allocated a regular pseudorandom combination record of IP addresses (Patrikakis, Masikos, & Zouraraki, n.d.). It searches for uninfected machine in the IP addresses and infect it. When it identifies the infected machine, it jumps over it to the uninfected (UMUC, 2012). The process stops when the infected machine finds several infected machines while it scans (Patrikakis, Masikos, & Zouraraki, n.d.). There are various frames used in the wireless network as a way of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.