Ddosing Research Paper

Superior Essays
Being a programmer requires a sense of self indulgence and creativity, for programmers are the deities of their programs and their programs are the product of their ideas. By taking pride in one's code, programmers can create something that others enjoy using, but this can be wiped like a hard drive in a matter of seconds when it comes to malicious users and attackers who seek to only benefit their personal selves. While the activist group, Anonymous, keyed the term “ddosing” by using software such as “Low Orbit Ion Cannon” to ddos certain companies, causing them to lose an average of $700 thousand dollars per year, this type of cyber warfare can be mitigated with the coalition of developers, publishers, and users, with, the use of application …show more content…
Take for instance the view counter on Youtube, the creators are paid based on the number of views. This is the same for other software development companies who get paid for every time a person comes to their website. Although, attackers such as Anonymous, use software like “Low Orbit Ion Cannon” to spoof legitimate traffic intentionally to take down company servers. This act is keyed as “ddosing,” which is the practice of taking down larger servers through botnets or compromising system resources to lock up the actual system. Ddosing comes in two different fashions, the first being that it exploits a system resource, causing the system to hang. The second is when a group of nodes are channeled together to ping a server repeatedly, causing all other legitimate traffic to not be able to access the website. On average, a company will have an attempted ddos happen roughly 4 times a day, 27 times per week, 117 times per month, and about 1400 times per year. The average successful act lasts for about 90 minutes, and in just those 90 minutes, a company loses $2000 dollars per day, this equates to be about $700 thousand dollars per …show more content…
By hardening source code on company system programs, ones that ddosers look to take advantage of, companies can do a number of things to harden their software. First of which is simply developing a better system in which applications are hardened. For instance, by developing an app that doesn’t need to use the entire hard drive to access files, but rather specify a single allocated folder for the application to access, the practice of least privilege can be enforced more efficiently. For an application with the possibility to see hidden files and go into to root directories of the os’s system, can cause exploits or backdoors for hackers. This is inherently important for the groundworks for any application because hackers generally use sql injections to cause buffer overflow exceptions, which lets attackers know that one's program in vulnerable. To which, sql injections can be also a helpful tool for developers because it can be a goal to create applications that won’t be affected by such attempts, and the injection would be contained to a single folder so the rest of the system wouldn’t be

Related Documents

  • Improved Essays

    Hacker Access: The team focused on patch management, firewall strictness, DNS redundancy, IDPS, authentication, and role-based access control to reduce network access…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Managing Threats to Data Common threats to data consist of Botnets, DDoS (Distributed denial of service), Hacking, etc. You can manage and prevent data threats with antivirus/malware/hacking/etc software. By downloading a legitimate program you can protect your computers data. The software will alert you if there is something out of place in your computer before it’s too late, so you can get it removed.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    In October 2001, just one month after the tragic September 11 attacks on the twin towers, Prime Minister Jean Chrétien pledged to support the United States. It was announced that Canada would join a UN-approved NATO coalition attack in Afghanistan (in order to support the United States). The purpose of this was to find and neutralize al-Qaeda which was a global militant Islamist organization. In addition, the main goal was to track and hunt down Osama Bin Laden, the leader of al-Qaeda, since the Taliban government refused to reveal Bin Laden’s hiding place. The province that Canada was responsible for was Kandahar, which was presumably the most dangerous province in Afghanistan.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Sadly, terrorism continued to occur almost 60 years later in 2001. Not only did 9/11 occur, but there was a chemical war on America's hands as well. The anthrax attacks occurred shortly after 9/11 in September, eighteen victims of the attacks were identified between October 3 and November 20. This was caused by dried spores of B. anthracis that were sent through letters by the public mail. Five people are known to have died from anthrax and The 2001 Anthrax Deception:…

    • 968 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Generally, a hacktivist attacks using a denial of service method. This technique overloads the server until it finally crashes. When a hacktivist targets a healthcare provider, he or she is looking to attain specific information about intellectual property, patient data or to embarrass the…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    9/11 Terrorism and Government Conspiracy Theory Terrorism has occurred for centuries and become a defining issue in the 21st century. The history of terrorism comes from the French revolution in 1789 due to the viciousness by the French government to enforce new command on the French society. Terrorism had always been an issue around the world for many years. Terrorism is known as an unlawful act of crime of viciousness.…

    • 1575 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    or she will exploit that vulnerability to his or her gain. The ability to know the code and see where the openings are in my opinion does open the system up to an assault. Sure there are multiple ways to distribute the information on how the vulnerabilities can be solved and patched, but the idea is to make it as difficult to get in and have less of a reaction to an assault when it happens and therefore help prevent the assault altogether. The assailants are out there and have the ability to put in an assault and modify it at any given time. The ability to prevent the assault in my opinion is the best defense.…

    • 1028 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    One of the dangers is that when a database/ PC crashes, information may be defiled or erased. Another danger is that it can be assaulted by infections and dark cap programmers. Likewise, the expense of upkeep is vast hence they ought to set up a major spending plan. Another danger is that only one mistake of information can influence the entire…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Lloyd Bank Attack

    • 423 Words
    • 2 Pages

    - Is there any way to detect DDoS attacks in real time and respond to them immediately to block botnet clients without banning legitimate users from access the website? As in, is there any type of active protection against DDoS attacks? - Do hackers use DDoS attacks to force institutions to pay? Much like ransomware would? Or do DDoS attacks only aim to shut down services without any direct monetary…

    • 423 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Dos Assault

    • 567 Words
    • 3 Pages

    Singular assailants can likewise abuse weakness, break into target servers, and after that cut down administrations. Since it is troublesome for assailants to over-burden the objective's asset from a solitary PC, numerous current DoS assaults were propelled through countless assaulting has in the Internet. These assaults are called disseminated dissent of administration (DDoS) assaults. In a DDoS assault, on the grounds that the total of the assaulting movement can be enormous contrasted with the casualty's asset, the assault can drive the casualty to altogether minimize its administration execution or even quit conveying any administration. Contrasted and routine DoS assaults that could be tended to by better securing administration frameworks or denying unapproved remote or nearby get to, DDoS assaults are more intricate and harder to counteract.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    America’s participation in global issues (wars) has resulted in changes for several groups of Americans whether political, social, and/or economic. These changes have had their effects on those/that group/s of Americans, and the American society in general. One war in particular, which has had it’s own devastating effects on Muslims, Sikhs, and anyone who resembles a person of Middle Eastern descent. this war is the “War on Terror.” It can also be argued that this war has even affected non-Arab Americans as well.…

    • 423 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    So ensuring that throughout the development lifecycle security is embedded and check can help to alleviate or at least minimize these…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    It seems every day there is a new headline in the news involving cyber warfare. Across the globe governments and their citizens are being affected by cyber warfare more than ever before. From the Ukraine to America’s very own elections anyone plugged into the internet is impacted by this new and mysterious form of attack. However, it seems to have become overshadowed by the recent presidential election and other major headlines and shoved into the back of the general public’s minds. This issue needs to be addressed as soon as possible or the fallout could be devastating.…

    • 1774 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Denial-Of-Service Attacks

    • 1844 Words
    • 8 Pages

    A Distributed-Denial-of-Service attack is simply a Denial-of-Service attack that is conducted by many computers at the same time. The computers conducting the Denial-of-Service attacks are generally PC’s that have been infected with a virus, and as such, the users of said PC’s are generally unaware that their computers are being utilized for malicious means. Due to this reason, it is very difficult to locate the true identity of the attacker in this type of attack (Evens et al., p. 350-351). C) DoS Vs DDoS Attacks: While DoS, and DDoS attacks are very similar in principle, a DDoS attack is far more powerful and damaging than a DoS attack.…

    • 1844 Words
    • 8 Pages
    Improved Essays