D.O.S (DENIAL OF SERVICE ATTACK) | LEGAL OR ILLEGAL ?


DENIAL OF


 SERVICE 


Welcome again guys to our blog. today we will learn a new thing which is about cyber security and cyber crime too. You may have seen sometimes that a website started responding error, this may be because of server issue or DOS/DDOS attack. Now you should get a hint about our today's topic. Yes !!! our topic is DOS(DENIAL OF SERVICE) or DDOS(DISTRIBUTED DENIAL OF SERVICE) attacks. It is an attack in which a website compromised for its speed. It actually stops or slows down the working of the target website. DOS attack is completed by accessing the excess amount of data. It actually makes an user unable to surf the website.It creates a fluctuation in working of website. This happens because of low bandwidth of a website. A low bandwidth of a website is responsible for the impact of DOS attack. 
Bandwidth is defined as a range within a band of frequencies or wavelengths. Bandwidth is also the amount of data that can be transmitted in a fixed amount of time.
Attackers of DoS attacks often target web servers of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations. DoS attacks do not typically result in the theft or loss of significant information or other assets, they can cost the victim a great deal of time and money to handle.


HISTORY

We should know the history of DOS/DDOS attacks. May be it will shock you but a 13 year old boy performed the first DOS attack IN 1974. His name is David Dennis. Dennis wrote a program using the “ext” command that forced some computers at a nearby university research lab to power off. It was not a major one but a stronger one. After that, many attacks was done by the people but the major DDOS attack was recorded in 2018 on code-hosting service GITHUB. Many attacks were executed alongwith the Denial Of Service attack. 

EXPLANATION

DOS attacks are performed in order to crash or slowing down the server or the website . It is done by sending many requests at a same time. So the server did not handle all the requests because it does not have sufficient bandwidth. There are many softwares launched for performing these kind of attacks. DOS attack is defined shortly on the beginning of the post. There are generally two methods : 

1 --> Flooding attacks


Flooding is the more common form of DOS attack. It occurs when the attacked system is frantic or scared by large amounts of traffic that the server is unable to handle. The weak system has no choice other than slowing down.


An ICMP flood also known as a ping flood. It is a type of DOS attack that sends spoofed packets of information that hit every computer in a targeted network.

The targeted server receives a request to begin the handshake. But in a SYN flood, the handshake is never completed. That leaves the connected port occupied and unavailable to process further requests. Meanwhile, the cybercriminals consecutively send more and more requests, overwhelming all open ports and shutting down the server.  

2 --> Crashing attacks

Crash attacks occur less often, when cybercriminals transmit bugs that exploit flaws in the targeted system. So the result will be crash of the system. 

Crash attacks and flooding attacks prevent legitimate users from accessing online services such as websites, gaming sites, email, and bank accounts websites.

Working 

Dos attack is not performed for any ransom money. It does not work as malware, virus because it does not need any code or scripts to perform it. It does not need any vulnerability to be found in the targeted system. It just need to check the communication of the websites which is network. If a website responds to your actions like clicking on the links then it means the communication is established. The attack is usually performed on organization websites.
D.O.S (DENIAL OF SERVICE ATTACK) | LEGAL OR ILLEGAL ? D.O.S (DENIAL OF SERVICE ATTACK) | LEGAL OR ILLEGAL ? Reviewed by Mr.Robot on November 29, 2019 Rating: 5

No comments:

Powered by Blogger.