Question

In: Computer Science

Why are most network DoS attacks distributed? Please explain clearly! WILL BE UPVOTED!!!

Why are most network DoS attacks distributed?

Please explain clearly!

WILL BE UPVOTED!!!

Solutions

Expert Solution

Answer = DoS (Denial of Service) attacks are the attacks which are implemented by the attacker to make any website resources free and down. In this attacker sends multiple resource access request to server at same time, which exhaustes all the resources of the server and now server give denial of service error to all users who wants to access resources because all the resources of server are already used by another users which are basically bots.

Any server have a limit to provide resources to users at one time, so attackers send http request to get access of resources. This HTTP request is very complex for server because server needs to apply queries to database for every request and need to send data back to user, and if server needs to do it multiple times at same time, then it freezes the computation of server or make it slow, then server Deny all the services coming,which produces the DoS error.

This DoS attack must be Distributed because if it is from one system, then server found this and block that user. Every server have some rules that one client can request total 4 or 5 times at one time, if one client requests multiple times then server found that it may be DoS attack and server blocks it to make server fast for others, which fails the DoS attack completely. So for a successful DoS attack it must be Distributed, means requests are throwing from multiple systems at same time.


Related Solutions

What is Distributed Routing Algorithm? Explain clearly using a network (subnet) of your choice with appropriate...
What is Distributed Routing Algorithm? Explain clearly using a network (subnet) of your choice with appropriate routing tables at nodes. You must use a network that is different from the ones that I used in class to explain this concept. You must also draw your network graph and provide the routing table that you considered.
What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on...
What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on servers?
please explain as many as possible and as clearly as possible : 1. Why 5G will...
please explain as many as possible and as clearly as possible : 1. Why 5G will be a rollout rather than a launch? 2. What are the concerns about 5G in terms of privacy?
Cyber attacks: Explain what each of the following attacks is: Replay attacks Man-in-the-middle attacks Keylogging
Cyber attacks: Explain what each of the following attacks is: Replay attacks Man-in-the-middle attacks Keylogging
How Facebook's founder aims to use his network? explain as clearly as possible!
How Facebook's founder aims to use his network? explain as clearly as possible!
Server-Side Attacks In today’s globally connected cyber community, network and OS level attacks are well defended...
Server-Side Attacks In today’s globally connected cyber community, network and OS level attacks are well defended through the proper deployment of technical security controls such as, firewalls, IDS, Data Loss Prevention, Endpoint and security. However, web servers are accessible from anywhere on the web, making them vulnerable to attack. 1. What is the process called that cleans and scrubs user input in order to prevent it from exploiting security holes by proactively modifying user input. 2. Name the process that...
5. Why do most governments pursue policies aimed at reducing income inequality? Explain clearly.
5. Why do most governments pursue policies aimed at reducing income inequality? Explain clearly.
How would you use data about network traffic to deter attacks to the network? question based...
How would you use data about network traffic to deter attacks to the network? question based on computer forensics
find descriptions of different types of network attacks & share your results
find descriptions of different types of network attacks & share your results
     Please explain what is the business cycle. Explain it, refer to it and clearly cite the...
     Please explain what is the business cycle. Explain it, refer to it and clearly cite the authors covered in class 1. Please define, compare and contrast the meaning of: Expansion, recession, depression, manias, bubbles, boom, bust, and euphoria.      Please explain one factor that can be responsible for a crisis in trade and a crisis in finance/banking. 2. Please pick one country        Please plot/graph the business cycle. Make sure you cover at least the last cycle        Please chose at the following...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT