Denial Of Service Case Study

Decent Essays
Introduction
Recently, there have been security breaches in the form of Denial of Service (DoS) attacks on industries that prevented their customers the ability to access accounts and information on the organization’s websites via the Internet. Denial of Service occurs when cyber criminals create the inability to access either temporarily or indefinitely an organization’s Internet access. The attack includes taking down or offline the organization’s domain name which is hosted by an external company. This paper will provide a definition and description of denial-of- service (DoS) attacks; discuss two organizations recently attacked by this type of security breach and disruption, and provide an assessment of the types of defenses that could be implemented to prevent or minimize denial of service attacks from happening.
Twitter and Netflix Attacked
Denial of service happens when cyber criminals block access to networks or infrastructures by sending an abundance of false attempts overloading the system. The service is temporarily kicked offline by the attack with the customers receiving “404 Not Found” errors from host because the domain name is not found. Distributive Denial of Service (DDoS) is compared to hundreds of thousands of people trying to get through the airport check lines all at one time, and the real ticket holders
…show more content…
Dyn engineers discovered the botnet was partially due to monitoring or camera devices used on consumers’ computer devices. (Fox-Brewster & Solomon, 2016) Stated in their FORBES article that they had written about this type of vulnerability twice before in articles where they described hackers would have access to vast networks of computing devices that could generate huge traffic volumes which would be a primary key that could cause DDoS attacks (Fox-Brewster & Solomon,

Related Documents

  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hacker Access: The team focused on patch management, firewall strictness, DNS redundancy, IDPS, authentication, and role-based access control to reduce network access…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    2) Network traffic shows that hundreds of hosts are constantly sending only SYN packets to a single Web server on campus. a. This type of traffic suggests a SYN flood attack, which according to Techtarget (http://searchsecurity.techtarget.com/definition/SYN-flooding) is when half-open connections are attempted by the user only sending SYN packets. The server will respond with SYN/ACK packets (on open ports), but the client ignores them and re-sends SYN packets. This means the server cannot handle legitimate traffic when needed. Similar to #1 above, IDS and IPS devices can detect all of this traffic and an IPS can drop the packets before they get to the target server after the pattern is recognized as an attack.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Do You Know? EVERY 24 SECONDS A host accesses a malicious website EVERY 1 MINUTE A bot communicates with its command and control center…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Internal Bot If an attacker is attempting to breach the enterprise, they may attempt to insert a bot within the network which will wreak havoc on the organization’s system. The internal bot addresses security at the perimeter of the enterprise. The DPI (deep packet inspection) engine will identify network malware that’s attempting to penetrate the network.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Given the University’s many diverse systems and disparate departmental roles managing the various systems the overall information security plan was not update to date nor consistent. There were obvious holes in the security plan which allowed a hacker to infiltrate the main domain server. The hacker secured administration rights on the server and they managed to infect other systems attached to the network. Thankfully, a trail of clues were found by the administrators.…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Attackers are persistent and will continue until they reach their…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Meet Brian Thomas Mettenbrink, an unsuspecting 20-year-old computer geek from Nebraska. He looks just like you and me, acts just like you and me, but yet there is a defining difference about him that separates us: he will be serving a year sentencing in a federal prison for his relation to the 2008 DDoS (distributed denial-of-service) attack on the Church of Scientology’s website called Project Chanology. The goal of a DDoS attack is to overwhelm the targeted website with repeated access requests to the point where the website either slows down to a crawl or goes offline. Prior to the cyber-attack, a video from 2004 depicting actor, Tom Cruise, preaching the churches strange and creepy sentiments was leaked online and viewed millions of times.…

    • 1865 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    Net Neutrality Case Study

    • 238 Words
    • 1 Pages

    One current civil case that I am interested in is about net neutrality. Recently Federal Communications Commission won the fight to kill net neutrality. Net Neutrality is a principle which states that internet service provider must treat all the data on the internet equally. One of the current civil cases that I will be talking about is described in the article “Flurry of Lawsuits Filed to Fight Repeal of Net Neutrality”. In this article, two parties are F.C.C who is the defendant and 21 state attorneys general who is the plaintiff.…

    • 238 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Business Continuity Plan

    • 673 Words
    • 3 Pages

    This policy was designed to establish and implement a proper Disaster Recovery (DR) and Business Continuity plan (BCP) for the State Department. The State Department is a target for potential disaster events that can hinder its business operations. By creating and implementing a DR/BCP the state department will be in a better position to stay resilient through events like natural and environmental disasters, terrorist attacks, war, and general state of emergencies long or short term. Objective…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Gilgamesh Influence

    • 1675 Words
    • 7 Pages

    The frequency of attacks could be attributed to the fact that their…

    • 1675 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    National Security Agency

    • 1122 Words
    • 5 Pages

    Federal agencies have led law enforcement efforts against computer crime since these agencies hold the technical expertise and political influence to gather significant financial and operational resources at the national level. Thus, these agencies have progressively reorganized in an attempt to channel resources directly at preventing digital crimes and capturing computer criminals, including the creation of special sections within these organizations, employing of new personnel who have specialized technical skill in this area, and the creation of new collaborative sections that combine the resources of multiple agencies. Department of Justice (DOJ) United States Department of Justice was established in 1870.…

    • 1122 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays