.

Saturday, June 22, 2019

Detecting preventing or mitigating DoS or Distributed DoS attacks Research Paper

Detecting preventing or mitigating DoS or Distributed DoS attacks - Research Paper ExampleThis outgrowth requires a large network of computers running malicious program. To acquire the network, the assailant uses software that arouses vulnerable computers (Glen, 2013). That is, the computers with improperly patched antivirus, out of date antivirus and without antivirus (FU, 2012).To recruit weapons into his/her DDoS attack, the attacker may follow several processes. Firstly, the attacker may use a railroad car infected with malicious programs to search, find, and infect another machine (Patrikakis, Masikos, & Zouraraki, n.d.). The infected machine joins the previous in the haunt of the unprotected machine and infects them. Secondly, the attacker may create a long list of the machine he/she want to recruit before infecting them with the malicious software to make them join his/her army of attacking computers (Glen, 2013 Patrikakis, Masikos, & Zouraraki, n.d.).Notably, some publi c servers, when compromised, become effective to the attacker when creating the hit list (Patrikakis, Masikos, & Zouraraki, n.d.). For instance, the attacker may run topological scanning where one machine is infected and finds other machine to infect through url it stores (UMUC, 2012). Local subnet scanning uses a compromised army to attack another computer within its own network without firewall detection as it uses the information stored in the local addresses (UMUC, 2012). Lastly, permutation scanning infects the machines allocated a unremitting pseudorandom combination record of IP addresses (Patrikakis, Masikos, & Zouraraki, n.d.). It searches for uninfected machine in the IP addresses and infect it. When it identifies the infected machine, it jumps over it to the uninfected (UMUC, 2012). The process stops when the infected machine finds several infected machines while it scans (Patrikakis, Masikos, & Zouraraki, n.d.).There are various frames used in the wireless network as a way of

No comments:

Post a Comment