menu
QAmmunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
Register
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Explain how a Denial of Service (DoS) attack works. After describing a DoS conduct some research and provide an example of a real company or website that was brought down by a DoS. What was the motive
asked
May 1, 2021
12.3k
views
1
vote
Explain how a Denial of Service (DoS) attack works. After describing a DoS conduct some research and provide an example of a real company or website that was brought down by a DoS. What was the motive of the attackers).
Computers and Technology
college
Jihad Waspada
asked
by
Jihad Waspada
4.6k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
7
votes
Answer:
A Denial of Service(DoS) is a cyber attack in which the attacker makes a machine or network resource unavailable to its intended users by temporarily interrupting services of a host connected to the Internet.
It works by flooding the targeted system or resource with redundant requests or traffic to overload systems and prevent legitimate and valid requests from being accomplished.
Usually the user establishes a connection by sending a request to server to authenticate it and server responses back by giving authentication permission. This permission is acknowledged by the user and then is enabled on the server.
Contrary to this, in a DOS attach, users send multiple authentication requests to server and these requests contain wrong return addresses so server cant identify the user in order to send permission. The server waits for some time before attempting to close the connection but before it closes the connection the perpetrator sends new set of false requests and this process starts again.
DOS attacks can slow network performance, makes a certain website unavailable and not accessible.
BBC
was attacked with a DDoS attack measuring over 600 Gbps, The motive of the attackers who claimed responsibility, was that they were just
“testing.”
The
biggest DDoS attack
happened to target
GitHub
. This
politically motivated
attack lasted several days and adapted itself around implemented DDoS mitigation strategies. The DDoS traffic initiated in China and it is suspected that the Chinese Government oversaw the attack.
Wikipedia
was brought down by DDoS attack in Germany and some parts of Europe.
TalkTalk
a company which provides pay television, telecommunications, Internet access, and mobile network services to costumers in the United Kingdom was brought down by DDoS attack by a group of teenagers purely for their own
entertainment
.
In 2000 a 15-year-old hacker known as ‘
Mafiaboy
’ brought down several popular websites in the world including
CNN,
eBay, and Yahoo
, This attack had resulted chaos in stock market. Attacker was revealed to be a high school student named Michael Calce, attacked by hacking into the networks of several universities and using their servers to perform DDoS attack. His motive was to
intimidate other hacker groups
.
Alex Brasetvik
answered
May 7, 2021
by
Alex Brasetvik
5.1k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
5.2m
questions
6.7m
answers
Other Questions
What is the first step you would take to create a table of authorities?
In Java a final class must be sub-classed before it. ?? True ?? False
To apply a style to a paragraph, the first step is to position the insertion point in the paragraph. True or False
What machine listens for HTTP requests to come in to a website’s domain?
Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminated without a proper shutdown. a. Event log b. Password log c. Word log d.
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search QAmmunity.org