Auditing, Monitoring, and Detecting of Dos or DDoS Attacks
A Dos (denial of service attack) is an attempt to make network or machine resources non-available to legitimate users. Attackers use the Dos to accomplish their goals by flooding the target resources or machines with the superfluous requests or useless packets to overload the systems and prevent users to fulfill their legitimate requests. When Dos originates from a single network or host node, it is termed a Dos attack, however, a distributed Dos is a more serious attack that attempts to consume computer resources to prevent the system from providing services. A DDoS occurs when there are multiple sources of attacks and often come from thousands of unique IP addresses. However, the rates of the DDoS have increased in the last few years, and criminals target high profile servers such as credit card payment gateways, banks other big corporations to achieve their criminal goals. An intruder may consume the disk's place by sending excessive email messages to create errors in the systems. Intruders can also implant a zombie software on the target websites to achieve direct Dos attack objectives. Often, the DDoS attacks may consist of two -level approach that include master zombies and slave zombies, where the master zombie uses the slave zombies to a create vulnerabilities across network resources using the malicious code to infect the distributed machines. The attackers can also use the malware to alter the system configuration to provoke the Dos attack. (Jain, Jain, & Gupta, 2011). When an attacker infects the target machine with malware or zombie software, the software will run on a large number of target machines.
Another attacking strategy is by scanning the machine with the zombie software to detect the vulnerable machines, launching the internet traffic through the infected machines. (Stallings, 2013). While web services provide critical functionalities to businesses, however, the Dos might inflict several damages to web services, which may lead to reputation and financial losses. Different research articles focus on the Dos or DDoS attacks, their preventions, detections, and mitigations. (Han, Shen, Duong, et al. 2014, Oliveira, Laranjeiro, & Vieira, 2015).
The objective of this paper is to analyze the main threats and attacks on TCP/IP protocols and the affect networks. Moreover, the study assesses the main attacks and threats on the wired and wireless networks from inside and outside an organization. The study discusses the current penetration testing tools, techniques, and procedures.
Detection, Prevention, and Mitigating Dos Attacks
The TCP/IP protocols are tools that assist in enhancing communication across the internet. The TCP/IP also provides a wide array of functionalities consisting of network layers, transport layers, link layers, and application layer. However, the TCP/IP have been a target of attacks in the contemporary business environment, and the Dos or DDoS attacks are major attacks on TCP/IP. (Steinke, Tundrea, & Kelly, 2011). A Dos attack can make the application layer of the TCP/IP unable to process requests because the attacks will make the server get swarmed by useless packets. Moreover, the attacker can target the TCP/IP network layer making the network system to slow down or drop packets and make the network unusable for the users. The study reviews three articles to demonstrate methods for preventing detecting and mitigating Dos and DDoS Distributed.
"Dos attack detection and mitigation utilizing Cross-Layer Design. Ad Hoc Networks." (Soryal, & Saadawi, 2014 p 71).
Soryal, & Saadawi, (2014) in their research article provide a comprehensive review on the detections and mitigation of Dos attacks using the cross layer designs. This study chooses the article for a review because the authors develop different algorithms for the Dos detections and mitigations, which can be applicable in the IT and business environments. Soryal, & Saadawi, (2014) argue that the Dos attack has become more...
Sainsbury's Business Environment Mission, vision, objectives, goals and core competence Sainsbury's chain of supermarkets is the leading store of food retailing in Britain. A single store offers approximately thirty-two thousand varieties of products among them fresh produce and own brand comprising of fifty percent total products. A variety of grocery products and quality foods are sold by the chain of supermarkets. Additionally, they offer other services and products such as petrol stations,
Shedd, P. Morehead, J. & Pagnattaro, M. 2008). The Court however, in absence of any special relationship between Burger King and Iannelli does use the Walls case to highlight "particular circumstances which can give rise to such duty" (Reed, O. Shedd, P. Morehead, J. & Pagnattaro, M. 2008). In deciding the case in favor of the plaintiffs, the court indicates that it was the duty of the Burger King establishment
D.). Socio-Cultural Environment Home to the world's tenth largest economy and second largest population, India defies swift generalization. It includes a vast range of developmental situations, cultures, languages, and climates. The country remains largely rural, with just 26% of its people living in cities. Yet in 1995 it had over 30 cities of one million or more residents, including three of the world's 20 largest cities -- Bombay, Calcutta, and Delhi --
The successful firms have the war chest, and often this was acquired through strong long-term planning. Thus, successful firms have the ability to build upon that success during economic downturns, which sets them up to be in an even stronger position when the next downturn strikes. Works Cited: Becton, B., & Schraeder, M. (2009, January). Strategic Human Resources Management. Journal for Quality & Participation, 31(4), 11-18. Retrieved May 5, 2009, from
Social Media and the Modern Business Environment The modern society has witnessed a phenomenon of ongoing and rapid growth in enhanced communication and interaction between people, especially through the Internet. Actually, the Internet has become the means for collaboration and resulted in the emergence of the social media concept and networking. The Internet has been characterized by the emergence of numerous social media networks that are increasingly used as the means
Business Risks -- Overview of the Risk Environment There are various types of business risks in the business environment, and these risks, of course, can differ from environment to environment depending on the type of business or organization. The severity and category of the risk also depends on the largeness of the organization and on various other factors, such as location, personality of employer, quantity of employees employed, and so forth
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now