Wednesday, December 11, 2019
Denial-of-Service
Questions: 1. What are the common tools used for Denial-of-Service? 2. How does a Virus spread? 3. What is a Buffer-Overflow attack? Answers: 1. The DoS attack usually consists of the efforts to do the momentarily interrupt of the services of the host computer connected to the internet (Distributed Denial of Services Attack Defense Using Proxy and Routing Algorithm, 2012). The two common tools used for the Denial of Services (DoS) attack are described: TFN and TFN2K: Tribal Flood Network which is known as TFN and the other TFN2K are not used as tools which is used to carry out the DDos. TFN and TFN2K perform the various attacks. Some of them are UDP flood attacks, TCP SYN flood attacks and ICMP flood attacks. It works like: The master gives the instruction to the agents to attack the list of the chosen target. The agent reacts by flooding the target with the storm of packets. There are some of the safety features that complicate the development of the efficient and the effective countermeasures of TFN2K. Communications of both the master to-agent and the attacks of themselves is sent by the randomized TCP, ICMP and the UDP packets. In spoofing the master falsify the IP address. The communication of the master to- agent are encrypted and mixed with a few number of decoy packets. Stacheldraht: It is a DDoS attack tool which combines the features of the Trinoo DDoS tool with the code which acts as source from the TFN DDoS attack tool. It performs the variety of the attacks which includes the UDP flood, TCP SYN flood, Smurf attacks and the ICMP flood. It enables and automatically detects the forgery of the source address (VivinSandar and Shenai, 2012). 2. Virus is the computer program which does the self replication. Viruses also have some of the other unpleasant functions among them self explicative and the rapid spread are the main thing of the virus. There are two ways through which the virus spread (Schmallenberg virus continuing to spread, says EFSA, 2012). In the first way it can simply scan the computer to get the connection of the network to get copy itself to the other computer which is present in the network through which the user computer gets the access. It is the most effective way for the virus to get spread (Sedwick, 2012). In this method there is the need of the skill of the programming rather than the other methods. The most frequent method is to get access of the email address and the email also to everyone of the address book (Friedman, 2010). The other method is the most common method for doing the propagation of the virus, and the Microsoft Outlook become the one email program which often hits with the virus attacks. For instance, a programmer write the application program me which access the word document, use the outlook to automatic the email resulting in the document to the interested parties and also import the excel spreadsheet(Mishra, n.d.). The majority of the virus attack spread by gets attached to the existing email address of the users, the recent outburst of the virus use the some other methods for doing the propagation. The other virus propagation method is by simply copying itself across the network. The outbreak of the virus spreads through the multiple routes which are become more common (Lussenhop, 2011). 3. An exploit which takes the advantages of the program that is waiting on the input of the users. The two main types of the attacks of the buffer overflow are: heap based and the stack based. The program becomes exploited uses the memory object which is known as stack to store the user input. In the stack based overrun, the program gets exploited which uses the memory object as a stack to store the user input (Gupta, 2012). In the normal case the stack remains empty up to when the programs needed the user input. In the heap based attacks the food of the memory space gets reserved for the program, in which the difficulty involved the performing such that the attacks create them rare. In the buffer overflow protection it refers to the some of the various methods which is used in the development of the software to improve the security of the program which are going to be executed by doing the detection of the buffer overflows on the stack allocated variables and also prevent them from causing the program misbehavior (WANG, WEI and LI, 2012). There are some of the implementations of the prevention of the buffer protection of the overflow which includes the GNU Compiler Collection, Microsoft visual studio, LLVM and the other compiler (Murugan and Alagarsamy, 2011). References Distributed Denial of Services Attack Defense Using Proxy and Routing Algorithm. (2012). IJACT, 4(14), pp.526-533. Friedman, S. (2010). How does the virus spread?. GeoJournal, 77(4), pp.449-449. Gupta, S. (2012). Buffer Overflow Attack. IOSRJCE, 1(1), pp.10-23. Lussenhop, C. (2011). Watching a Virus Begin Its Attack. Physics, 4. Mishra, U. (n.d.). How Do Viruses Attack Anti-Virus Programs. SSRN Journal. Murugan, P. and Alagarsamy, D. (2011). Buffer Overflow Attack Vulnerability in Stack. International Journal of Computer Applications, 13(5), pp.1-2. Schmallenberg virus continuing to spread, says EFSA. (2012). Veterinary Record, 171(23), pp.579-579. Sedwick, C. (2012). Lipids in HIV's Envelope Help the Virus to Spread. PLoS Biol, 10(4), p.e1001316. VivinSandar, S. and Shenai, S. (2012). Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks. International Journal of Computer Applications, 41(20), pp.11-16. WANG, L., WEI, G. and LI, Z. (2012). Research of defense scheme against buffer overflow attack in embedded system. Journal of Computer Applications, 32(12), pp.3449-3452.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.