Page 219 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 219

Unit 13: Wireless Networks Security




          DoS attacks can also target  tangible  system resources, such as computational resources   Notes
          (bandwidth, disk space, processor time); configuration information (routing information, etc.);
          state information (for example, unsolicited TCP session resetting). Moreover, a DoS attack can
          be designed to: execute malware that maxes out the processor, preventing usage; trigger errors
          in machine microcode or sequencing of instructions, forcing the computer into an unstable state;
          exploit  operating  system  vulnerabilities  to  sap  system  resources;  crash  the  operating  system
          altogether.
          The overriding similarity in these examples is that, as a result of the successful Denial of Service
          attack, the system in question does not respond as before, and service is either denied or severly
          limited.

          13.6.2 Distributed Denial of Service (DDoS) Attacks

          A DDOS attack (better known as a Distributed Denial of Service attack) is a type of web attack
          that seeks to disrupt the normal function of the targeted computer network. This is any type of
          attack that attempts to make this computer resource unavailable to its users. While this type of
          attack typically follows the same sorts of patterns, the definition of the term Distributed Denial
          of Service does not make any specific indications of how this type of attack is to be pulled off.
          What makes this type of attack "distributed" is the concerted efforts between a large number
          of disruptors all for the common goal of preventing web servers (and therefore websites) from
          functioning effectively at all. These users may be willing participants, or in some cases be tricked
          into downloading software that will use their terminal to aid in the offensive. All in all, regardless
          of the means, a DDOS attack is simply a combined effort to prevent computer systems from
          working as well as they should, typically from a remote location over the internet.
          The most common method of attack is to send a mass saturation of incessant requests for external
          communication to the target. These systems are flooded with requests for information from non-
          users, and often non-visitors to the website. The goal of this attack is to create a large enough
          presence of false traffic such that legitimate web traffic intended for actual web users is slowed
          down and delayed. If this type of service becomes too slow, time sensitive information such as
          live video footage may be rendered entirely useless to legitimate end users.

          For a DDOS to work effectively, the process has to be heavily automated on the attacker's end.
          Customized software is designed to flood these services with false traffic, and is run on as many
          computers as possible. There are a few instances in which this type of software was set up like
          a virus, infecting computers and taking control of their communication functions. These users
          unwillingly are aiding in a DDOS attack, sometimes without being the slightest bit aware of
          it. If there seems to be large delays in normal internet service, there may be outbound requests
          being made consuming your internet connections given throughput, and can sometimes be an
          indication of foul play. Users seeking to limit this risk should keep anti-virus software up to date,
          and scan frequently for these types of programs.
          While there are few court cases on the books of Distributed Denial of Service perpetrators being
          held accountable for their actions, as well as the potential lost income for commercial websites,
          this type of activity almost always violates the terms of service and acceptable use policies of
          internet service providers, as well as often violating individual communication law within the
          nation. These types of attacks have become more and more prevalent as time goes on, and in
          many nation legislation is in the works, with hopes of criminal penalties for those involved with
          this sort of attack.
          All in all, a DDOS attack is a very real threat to businesses and organizations across the world,
          and it's important that they be prepared in case some group of people decides to cause trouble
          for your organization. Being prepared to identify these types of threats is an important part of
          proper internet use, and should be a part of your daily life online.





                                           LOVELY PROFESSIONAL UNIVERSITY                                   213
   214   215   216   217   218   219   220   221   222   223   224