![]() ![]() 1, we have shown the simple architecture of Distributed Denial of Service (DoS) attack model. The DoS attacks can be classified into two main categories: (i) Flood attacks (ii) Logic or software attacks. Traceback mechanisms trace the true source of the attackers to stop the attack at the point nearest to its source to reduce waste of network resources and to find the attackers" identities. Recent studies show source address spoofing is still a major network problem. Some service providers do perform ingress filtering to check for valid source IP addresses coming into access routers, but this is not completely effective. Attackers use spoofed source addresses to hide their identity and location in Distributed Denial of Service (DDoS) attacks. The attack is "distributed" because the attacker is using multiple computers, including yours, to launch the denial-of- service attack. The attacker could then force a computer to send huge amounts of data to a website or send spam to particular email addresses. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of a computer. In distributed denial-of-service (DDoS) attack, an attacker may use a computer to attack another computer. ![]() network attack have emerged as an important field in the research areas. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |