Denial of Service (DoS)

DoS is a common threat to the Internet Security# as the web grow larger and larger. DoS and its evolved descendants, Distributed Denial of Service (DDoS), can seriously undermine the network utilities by requesting excessive requests to the attack target (usually a server) and making it running out of resources to process those requests.

Links to this page
  • TNS3131 Chapter 7: Web Security
  • Scavenger QoS

    Scavenger QoS imposes a traffic limit on ports, and if the packets exceeding the limits, it will be marked to lower priority, and might be dropped eventually. If we know an application’s normal behaviour on a device and on the network, a safeguard could be built using Scavenger QoS to recognise and stop the application upon abnormal behaviours. It works in the opposite way of Quality of Service (QoS)#. It reduces Network Congestion and possible DDoS or worm attacks especially if the attacks create a traffic spike (exceeding bandwidth thresholds) for sustained periods.

  • Quality of Service (QoS)

    QoS is the ability of a network to provide improved service to selected network traffic over various underlying technologies. The increasing need for real-time traffics such as video streaming and VoIP has made QoS as an important requirement for a #reliable network. It decreases the Network Congestion# and the effect on the quality of the critical packets especially low delay and low jitter. QoS can potentially filter out malicious low prioritised packets (from unknown type or origin) as a policing mechanism, but it is still vulnerable to DDoS and concealed traffic.

  • Network External Threat
  • Interruption

    Interruption is a form of #Security Attack aims at disturbing the delivery of system utilities to the end users. It violates the availability# of the system service. This can be caused by hardware destruction, communication line cut, the disabling of file system, or Denial of Service (DoS)#.

  • Availability

    Availability is the ability of the loss or a reduction in accessibility of elements of a distributed system. By proper use of Data Integrity# and Authentication Exchange#, it could counter Denial of Service (DoS)#.

  • A Review on Android Malware: Attacks, Countermeassures and Challenges

    Botnet is a form of malware where the attacker can access and operate on the infected machine, with addition that it will listen the instructions from a command and a control server. The compromised machines usually refered to as zombies. A common use of botnet is to launch attacks via zombies to carry out Denial of Service (DoS)#, spam contents spreading and/or performing click frauds. Examples of botnet are Geost, Chaois, and Twitoor.

#networking #security